Total
2906 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-14965 | 1 Frappe | 1 Frappe | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in Frappe Framework 10 through 12 before 12.0.4. A server side template injection (SSTI) issue exists. | |||||
CVE-2019-15087 | 1 Prise | 1 Adas | 2020-08-24 | 6.5 MEDIUM | 7.2 HIGH |
An issue was discovered in PRiSE adAS 1.7.0. An authenticated user can change the function used to hash passwords to any function, leading to remote code execution. | |||||
CVE-2019-12844 | 1 Jetbrains | 1 Teamcity | 2020-08-24 | 4.3 MEDIUM | 6.1 MEDIUM |
A possible stored JavaScript injection was detected on one of the JetBrains TeamCity pages. The issue was fixed in TeamCity 2018.2.3. | |||||
CVE-2018-16975 | 1 Elefantcms | 1 Elefant | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in Elefant CMS before 2.0.7. There is a PHP Code Execution Vulnerability in /designer/add/stylesheet.php by using a .php extension in the New Stylesheet Name field in conjunction with <?php content, because of insufficient input validation in apps/designer/handlers/csspreview.php. | |||||
CVE-2019-15318 | 1 Yikesinc | 1 Easy Forms For Mailchimp | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
The yikes-inc-easy-mailchimp-extender plugin before 6.5.3 for WordPress has code injection via the admin input field. | |||||
CVE-2018-1207 | 1 Dell | 2 Emc Idrac7, Emc Idrac8 | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain CGI injection vulnerability which could be used to execute remote code. A remote unauthenticated attacker may potentially be able to use CGI variables to execute remote code. | |||||
CVE-2019-15388 | 1 Coolpad | 2 Mega 5, Mega 5 Firmware | 2020-08-24 | 9.3 HIGH | 8.1 HIGH |
The Coolpad 1851 Android device with a build fingerprint of Coolpad/android/android:8.1.0/O11019/1534834761:userdebug/release-keys contains a pre-installed platform app with a package name of com.lovelyfont.defcontainer (versionCode=7, versionName=7.1.13). This app contains an exported service named com.lovelyfont.manager.FontCoverService that allows any app co-located on the device to supply arbitrary commands to be executed as the system user. This app cannot be disabled by the user and the attack can be performed by a zero-permission app. In addition to the local attack surface, its accompanying app with a package name of com.ekesoo.lovelyhifonts makes network requests using HTTP and an attacker can perform a Man-in-the-Middle (MITM) attack on the connection to inject a command in a network response that will be executed as the system user by the com.lovelyfont.defcontainer app. Executing commands as the system user can allow a third-party app to video record the user's screen, factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the Graphical User Interface (GUI), and obtains the user's text messages, and more. Executing commands as the system user can allow a third-party app to factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the GUI, change the default Input Method Editor (IME) (e.g., keyboard) with one contained within the attacking app that contains keylogging functionality, and obtains the user's text messages, and more. | |||||
CVE-2019-11594 | 1 Getadblock | 1 Adblock | 2020-08-24 | 6.8 MEDIUM | 8.1 HIGH |
In AdBlock before 3.45.0, the $rewrite filter option allows filter-list maintainers to run arbitrary code in a client-side session when a web service loads a script for execution using XMLHttpRequest or Fetch, and the script origin has an open redirect. | |||||
CVE-2019-9891 | 1 Tldp | 1 Advanced Bash-scripting Guide | 2020-08-24 | 10.0 HIGH | 9.8 CRITICAL |
The function getopt_simple as described in Advanced Bash Scripting Guide (ISBN 978-1435752184) allows privilege escalation and execution of commands when used in a shell script called, for example, via sudo. | |||||
CVE-2019-11642 | 1 Oneshield | 1 Oneshield Policy | 2020-08-24 | 6.5 MEDIUM | 8.8 HIGH |
A log poisoning vulnerability has been discovered in the OneShield Policy (Dragon Core) framework before 5.1.10. Authenticated remote adversaries can poison log files by entering malicious payloads in either headers or form elements. These payloads are then executed via a client side debugging console. This is predicated on the debugging console and Java Bean being made available to the deployed application. | |||||
CVE-2018-20988 | 1 Google Forms Project | 1 Google Forms | 2020-08-24 | 5.0 MEDIUM | 7.5 HIGH |
The wpgform plugin before 0.94 for WordPress has eval injection in the CAPTCHA calculation. | |||||
CVE-2019-7871 | 1 Magento | 1 Magento | 2020-08-24 | 6.5 MEDIUM | 8.8 HIGH |
A security bypass exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 that could be abused to execute arbitrary PHP code. An authenticated user can bypass security protections that prevent arbitrary PHP script upload via form data injection. | |||||
CVE-2019-8324 | 4 Debian, Opensuse, Redhat and 1 more | 4 Debian Linux, Leap, Enterprise Linux and 1 more | 2020-08-24 | 6.8 MEDIUM | 8.8 HIGH |
An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check. | |||||
CVE-2019-7692 | 1 Cim Project | 1 Cim | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
install/install.php in CIM 0.9.3 allows remote attackers to execute arbitrary PHP code via a crafted prefix value because of configuration file mishandling in the N=83 case, as demonstrated by a call to the PHP fputs function that creates a .php file in the public folder. | |||||
CVE-2018-21005 | 1 Bbpress Move Topics Project | 1 Bbpress Move Topics | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
The bbp-move-topics plugin before 1.1.6 for WordPress has code injection. | |||||
CVE-2018-14716 | 1 Nystudio107 | 1 Seomatic | 2020-08-24 | 5.0 MEDIUM | 7.5 HIGH |
A Server Side Template Injection (SSTI) was discovered in the SEOmatic plugin before 3.1.4 for Craft CMS, because requests that don't match any elements incorrectly generate the canonicalUrl, and can lead to execution of Twig code. | |||||
CVE-2018-18319 | 1 Asuswrt-merlin Project | 28 Rt-ac1900, Rt-ac1900 Firmware, Rt-ac2900 and 25 more | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
** DISPUTED ** An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An attacker can execute arbitrary commands because api.php has an eval call, as demonstrated by the /6/api.php?function=command&class=remote&Cc='ls' URI. NOTE: the vendor indicates that Merlin.PHP is designed only for use on a trusted intranet network, and intentionally allows remote code execution. | |||||
CVE-2018-18836 | 1 My-netdata | 1 Netdata | 2020-08-24 | 4.3 MEDIUM | 6.5 MEDIUM |
An issue was discovered in Netdata 1.10.0. JSON injection exists via the api/v1/data tqx parameter because of web_client_api_request_v1_data in web/api/web_api_v1.c. | |||||
CVE-2018-7950 | 1 Huawei | 40 1288h V5, 1288h V5 Firmware, 2288h V5 and 37 more | 2020-08-24 | 9.0 HIGH | 8.8 HIGH |
The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have a JSON injection vulnerability due to insufficient input validation. An authenticated, remote attacker can launch a JSON injection to modify the password of administrator. Successful exploit may allow attackers to obtain the management privilege of the system. | |||||
CVE-2019-5509 | 1 Netapp | 1 Ontap Select Deploy Administration Utility | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
ONTAP Select Deploy administration utility versions 2.11.2 through 2.12.2 are susceptible to a code injection vulnerability which when successfully exploited could allow an unauthenticated remote attacker to enable and use a privileged user account. |