Total
2906 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2007-5593 | 2 Drupal, Fedoraproject | 2 Drupal, Fedora | 2021-04-19 | 6.8 MEDIUM | N/A |
install.php in Drupal 5.x before 5.3, when the configured database server is not reachable, allows remote attackers to execute arbitrary code via vectors that cause settings.php to be modified. | |||||
CVE-2021-1362 | 1 Cisco | 4 Prime License Manager, Unified Communications Manager, Unified Communications Manager Im \& Presence Service and 1 more | 2021-04-15 | 9.0 HIGH | 8.8 HIGH |
A vulnerability in the SOAP API endpoint of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, Cisco Unity Connection, and Cisco Prime License Manager could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper sanitization of user-supplied input. An attacker could exploit this vulnerability by sending a SOAP API request with crafted parameters to an affected device. A successful exploit could allow the attacker to execute arbitrary code with root privileges on the underlying Linux operating system of the affected device. | |||||
CVE-2014-0602 | 1 Microfocus | 1 Security Manager | 2021-04-13 | 7.5 HIGH | N/A |
Directory traversal vulnerability in the DumpToFile method in the NQMcsVarSet ActiveX control in NetIQ Security Manager through 6.5.4 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-3460. | |||||
CVE-2012-5932 | 1 Microfocus | 1 Privileged User Manager | 2021-04-13 | 10.0 HIGH | N/A |
Eval injection vulnerability in the ldapagnt_eval function in ldapagnt.dll in unifid.exe in NetIQ Privileged User Manager 2.3.x before 2.3.1 HF2 allows remote attackers to execute arbitrary Perl code via a crafted application/x-amf request. | |||||
CVE-2007-5331 | 2 Broadcom, Ca | 6 Brightstor Arcserve Backup, Brightstor Enterprise Backup, Business Protection Suite and 3 more | 2021-04-09 | 10.0 HIGH | N/A |
Queue.dll for the message queuing service (LQserver.exe) in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to execute arbitrary code via a malformed ONRPC protocol request for operation 0x76, which causes ARCserve Backup to dereference arbitrary pointers. | |||||
CVE-2016-7102 | 1 Owncloud | 1 Owncloud Desktop Client | 2021-04-09 | 4.6 MEDIUM | 8.4 HIGH |
ownCloud Desktop before 2.2.3 allows local users to execute arbitrary code and possibly gain privileges via a Trojan library in a "special path" in the C: drive. | |||||
CVE-2012-2971 | 1 Microsoft | 1 Windows | 2021-04-07 | 7.5 HIGH | N/A |
The server in CA ARCserve Backup r12.5, r15, and r16 on Windows does not properly process RPC requests, which allows remote attackers to execute arbitrary code or cause a denial of service via a crafted request. | |||||
CVE-2009-3705 | 1 Achievo | 1 Achievo | 2021-04-07 | 7.5 HIGH | N/A |
PHP remote file inclusion vulnerability in debugger.php in Achievo before 1.4.0 allows remote attackers to execute arbitrary PHP code via a URL in the config_atkroot parameter. | |||||
CVE-2017-14077 | 1 Phpcaptcha | 1 Securimage | 2021-03-30 | 4.3 MEDIUM | 6.1 MEDIUM |
HTML Injection in Securimage 3.6.4 and earlier allows remote attackers to inject arbitrary HTML into an e-mail message body via the $_SERVER['HTTP_USER_AGENT'] parameter to example_form.ajax.php or example_form.php. | |||||
CVE-2007-4596 | 1 Php | 1 Php | 2021-03-29 | 7.5 HIGH | N/A |
The perl extension in PHP does not follow safe_mode restrictions, which allows context-dependent attackers to execute arbitrary code via the Perl eval function. NOTE: this might only be a vulnerability in limited environments. | |||||
CVE-2017-7402 | 1 Lucidcrew | 1 Pixie | 2021-03-29 | 7.5 HIGH | 9.8 CRITICAL |
Pixie 1.0.4 allows remote authenticated users to upload and execute arbitrary PHP code via the POST data in an admin/index.php?s=publish&x=filemanager request for a filename with a double extension, such as a .jpg.php file with Content-Type of image/jpeg. | |||||
CVE-2010-1299 | 1 Dynpg | 1 Dynpg | 2021-03-25 | 5.1 MEDIUM | N/A |
Multiple PHP remote file inclusion vulnerabilities in DynPG CMS 4.1.0, and possibly earlier, when magic_quotes_gpc is disabled and register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) DefineRootToTool parameter to counter.php, (2) PathToRoot parameter to plugins/DPGguestbook/guestbookaction.php and (3) get_popUpResource parameter to backendpopup/popup.php. NOTE: some of these details are obtained from third party information. | |||||
CVE-2020-28502 | 1 Xmlhttprequest Project | 1 Xmlhttprequest | 2021-03-16 | 6.8 MEDIUM | 8.1 HIGH |
This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run. | |||||
CVE-2021-23344 | 1 Totaljs | 1 Total.js | 2021-03-05 | 7.5 HIGH | 9.8 CRITICAL |
The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set. | |||||
CVE-2021-3273 | 1 Nagios | 1 Nagios Xi | 2021-03-02 | 9.0 HIGH | 7.2 HIGH |
Nagios XI below 5.7 is affected by code injection in the /nagiosxi/admin/graphtemplates.php component. To exploit this vulnerability, someone must have an admin user account in Nagios XI's web system. | |||||
CVE-2014-6287 | 1 Rejetto | 1 Http File Server | 2021-02-26 | 10.0 HIGH | 9.8 CRITICAL |
The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search action. | |||||
CVE-2021-26551 | 1 Smartfoxserver | 1 Smartfoxserver | 2021-02-18 | 6.0 MEDIUM | 8.8 HIGH |
An issue was discovered in SmartFoxServer 2.17.0. An attacker can execute arbitrary Python code, and bypass the javashell.py protection mechanism, by creating /config/ConsoleModuleUnlock.txt and editing /config/admin/admintool.xml to enable the Console module. | |||||
CVE-2021-25251 | 2 Microsoft, Trendmicro | 9 Windows, Antivirus\+ Security 2020, Antivirus\+ Security 2021 and 6 more | 2021-02-16 | 6.5 MEDIUM | 7.2 HIGH |
The Trend Micro Security 2020 and 2021 families of consumer products are vulnerable to a code injection vulnerability which could allow an attacker to disable the program's password protection and disable protection. An attacker must already have administrator privileges on the machine to exploit this vulnerability. | |||||
CVE-2021-21477 | 1 Sap | 1 Commerce | 2021-02-16 | 9.0 HIGH | 9.9 CRITICAL |
SAP Commerce Cloud, versions - 1808,1811,1905,2005,2011, enables certain users with required privileges to edit drools rules, an authenticated attacker with this privilege will be able to inject malicious code in the drools rules which when executed leads to Remote Code Execution vulnerability enabling the attacker to compromise the underlying host enabling him to impair confidentiality, integrity and availability of the application. | |||||
CVE-2021-25770 | 1 Jetbrains | 1 Youtrack | 2021-02-05 | 7.5 HIGH | 9.8 CRITICAL |
In JetBrains YouTrack before 2020.5.3123, server-side template injection (SSTI) was possible, which could lead to code execution. |