Total
2906 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-6012 | 1 Rainmachine | 2 Mini-8, Mini-8 Firmware | 2019-02-22 | 7.5 HIGH | 9.8 CRITICAL |
The 'Weather Service' feature of the Green Electronics RainMachine Mini-8 (2nd generation) allows an attacker to inject arbitrary Python code via the 'Add new weather data source' upload function. | |||||
CVE-2018-3700 | 2 Intel, Microsoft | 2 Usb 3.0 Extensible Host Controller Driver, Windows 7 | 2019-02-20 | 4.6 MEDIUM | 6.7 MEDIUM |
Code injection vulnerability in the installer for Intel(R) USB 3.0 eXtensible Host Controller Driver for Microsoft Windows 7 before version 5.0.4.43v2 may allow a user to potentially enable escalation of privilege via local access. | |||||
CVE-2019-7720 | 1 Taogogo | 1 Taocms | 2019-02-13 | 7.5 HIGH | 9.8 CRITICAL |
taocms through 2014-05-24 allows eval injection by placing PHP code in the install.php db_name parameter and then making a config.php request. | |||||
CVE-2018-20768 | 1 Xerox | 58 Workcentre 3655, Workcentre 3655 Firmware, Workcentre 3655i and 55 more | 2019-02-13 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on Xerox WorkCentre 3655, 3655i, 58XX, 58XXi, 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi, 78XX, 78XXi, 7970, 7970i, EC7836, and EC7856 devices before R18-05 073.xxx.0487.15000. An attacker can execute PHP code by leveraging a writable file. | |||||
CVE-2019-7719 | 1 Nibbleblog | 1 Nibbleblog | 2019-02-11 | 7.5 HIGH | 9.8 CRITICAL |
Nibbleblog 4.0.5 allows eval injection by placing PHP code in the install.php username parameter and then making a content/private/shadow.php request. | |||||
CVE-2018-20775 | 1 Frog Cms Project | 1 Frog Cms | 2019-02-11 | 6.5 MEDIUM | 7.2 HIGH |
admin/?/plugin/file_manager in Frog CMS 0.9.5 allows PHP code execution by creating a new .php file containing PHP code, and then visiting this file under the public/ URI. | |||||
CVE-2018-20773 | 1 Frog Cms Project | 1 Frog Cms | 2019-02-11 | 6.5 MEDIUM | 7.2 HIGH |
Frog CMS 0.9.5 allows PHP code execution by visiting admin/?/page/edit/1 and inserting additional <?php lines. | |||||
CVE-2018-20772 | 1 Frog Cms Project | 1 Frog Cms | 2019-02-11 | 6.5 MEDIUM | 7.2 HIGH |
Frog CMS 0.9.5 allows PHP code execution via <?php to the admin/?/layout/edit/1 URI. | |||||
CVE-2019-7580 | 1 Thinkcmf | 1 Thinkcmf | 2019-02-08 | 6.5 MEDIUM | 8.8 HIGH |
ThinkCMF 5.0.190111 allows remote attackers to execute arbitrary PHP code via the portal/admin_category/addpost.html alias parameter because the mishandling of a single quote character allows data/conf/route.php injection. | |||||
CVE-2017-18356 | 1 Automattic | 1 Woocommerce | 2019-02-07 | 6.5 MEDIUM | 8.8 HIGH |
In the Automattic WooCommerce plugin before 3.2.4 for WordPress, an attack is possible after gaining access to the target site with a user account that has at least Shop manager privileges. The attacker then constructs a specifically crafted string that will turn into a PHP object injection involving the includes/shortcodes/class-wc-shortcode-products.php WC_Shortcode_Products::get_products() use of cached queries within shortcodes. | |||||
CVE-2018-20129 | 1 Dedecms | 1 Dedecms | 2019-02-05 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in DedeCMS V5.7 SP2. uploads/include/dialog/select_images_post.php allows remote attackers to upload and execute arbitrary PHP code via a double extension and a modified ".php" substring, in conjunction with the image/jpeg content type, as demonstrated by the filename=1.jpg.p*hp value. | |||||
CVE-2018-20300 | 1 Phome | 1 Empirecms | 2019-02-05 | 7.5 HIGH | 9.8 CRITICAL |
Empire CMS 7.5 allows remote attackers to execute arbitrary PHP code via the ftemp parameter in an enews=EditMemberForm action because this code is injected into a memberform.$fid.php file. | |||||
CVE-2018-19127 | 1 Phpcms | 1 Phpcms | 2019-02-04 | 7.5 HIGH | 9.8 CRITICAL |
A code injection vulnerability in /type.php in PHPCMS 2008 allows attackers to write arbitrary content to a website cache file with a controllable filename, leading to arbitrary code execution. The PHP code is sent via the template parameter, and is written to a data/cache_template/*.tpl.php file along with a "<?php function " substring. | |||||
CVE-2018-19520 | 2 Php, Sdcms | 2 Php, Sdcms | 2019-02-04 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in SDCMS 1.6 with PHP 5.x. app/admin/controller/themecontroller.php uses a check_bad function in an attempt to block certain PHP functions such as eval, but does not prevent use of preg_replace 'e' calls, allowing users to execute arbitrary code by leveraging access to admin template management. | |||||
CVE-2018-20717 | 1 Prestashop | 1 Prestashop | 2019-02-04 | 6.5 MEDIUM | 8.8 HIGH |
In the orders section of PrestaShop before 1.7.2.5, an attack is possible after gaining access to a target store with a user role with the rights of at least a Salesman or higher privileges. The attacker can then inject arbitrary PHP objects into the process and abuse an object chain in order to gain Remote Code Execution. This occurs because protection against serialized objects looks for a 0: followed by an integer, but does not consider 0:+ followed by an integer. | |||||
CVE-2018-2491 | 1 Sap | 1 Fiori Client | 2019-02-01 | 6.8 MEDIUM | 7.8 HIGH |
When opening a deep link URL in SAP Fiori Client with log level set to "Debug", the client application logs the URL to the log file. If this URL contains malicious JavaScript code it can eventually run inside the built-in log viewer of the application in case user opens the viewer and taps on the hyperlink in the viewer. SAP Fiori Client version 1.11.5 in Google Play store addresses these issues and users must update to that version. | |||||
CVE-2019-3575 | 1 Sqla Yaml Fixtures Project | 1 Sqla Yaml Fixtures | 2019-01-31 | 4.6 MEDIUM | 7.8 HIGH |
Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load. | |||||
CVE-2019-0247 | 1 Sap | 1 Cloud Connector | 2019-01-17 | 7.5 HIGH | 9.8 CRITICAL |
SAP Cloud Connector, before version 2.11.3, allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application. | |||||
CVE-2016-9651 | 2 Google, Redhat | 4 Chrome, Enterprise Linux Desktop, Enterprise Linux Server and 1 more | 2019-01-16 | 6.8 MEDIUM | 8.8 HIGH |
A missing check for whether a property of a JS object is private in V8 in Google Chrome prior to 55.0.2883.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. | |||||
CVE-2018-16168 | 1 Jpcert | 1 Logontracer | 2019-01-15 | 7.5 HIGH | 9.8 CRITICAL |
LogonTracer 1.2.0 and earlier allows remote attackers to conduct Python code injection attacks via unspecified vectors. |