Total
3506 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2015-4642 | 2 Microsoft, Php | 2 Windows, Php | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
The escapeshellarg function in ext/standard/exec.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 on Windows allows remote attackers to execute arbitrary OS commands via a crafted string to an application that accepts command-line arguments for a call to the PHP system function. | |||||
CVE-2015-4330 | 1 Cisco | 1 Telepresence Video Communication Server Software | 2024-11-21 | 6.9 MEDIUM | N/A |
A local file script in Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 allows local users to gain privileges for OS command execution via invalid parameters, aka Bug ID CSCuv10556. | |||||
CVE-2015-4279 | 1 Cisco | 1 Unified Computing System | 2024-11-21 | 7.2 HIGH | N/A |
The Manager component in Cisco Unified Computing System (UCS) 2.2(3b) on B Blade Server devices allows local users to gain privileges for executing arbitrary CLI commands by leveraging access to the subordinate fabric interconnect, aka Bug ID CSCut32778. | |||||
CVE-2015-4244 | 1 Cisco | 1 Asr 5000 Series Software | 2024-11-21 | 7.2 HIGH | N/A |
The boot implementation on Cisco ASR 5000 and 5500 devices with software 14.0 allows local users to execute arbitrary Linux commands by leveraging administrative privileges for storage of these commands in a Compact Flash (CF) file, aka Bug ID CSCuu75278. | |||||
CVE-2015-4237 | 1 Cisco | 38 Mds 9100, Mds 9140, Mds 9500 and 35 more | 2024-11-21 | 4.6 MEDIUM | N/A |
The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv08434, and CSCuv08436. | |||||
CVE-2015-4224 | 1 Cisco | 1 Wireless Lan Controller Software | 2024-11-21 | 7.2 HIGH | N/A |
Cisco Wireless LAN Controller (WLC) devices with software 7.0(240.0) allow local users to execute arbitrary OS commands in a privileged context via crafted CLI commands, aka Bug ID CSCuj39474. | |||||
CVE-2015-4186 | 1 Cisco | 1 Virtualization Experience Client 6000 Series Firmware | 2024-11-21 | 7.2 HIGH | N/A |
The diagnostics subsystem in the administrative web interface on Cisco Virtualization Experience (aka VXC) Client 6215 devices with firmware 11.2(27.4) allows local users to gain privileges for OS command execution via a crafted option value, aka Bug ID CSCug54412. | |||||
CVE-2015-4183 | 1 Cisco | 1 Unified Computing System | 2024-11-21 | 7.2 HIGH | N/A |
Cisco UCS Central Software 1.2(1a) allows local users to gain privileges for OS command execution via a crafted CLI parameter, aka Bug ID CSCut32795. | |||||
CVE-2015-2980 | 1 Yodobashi | 1 Yodobashi | 2024-11-21 | 6.8 MEDIUM | N/A |
The Yodobashi application 1.2.1.0 and earlier for Android allows remote attackers to execute arbitrary Java methods, and consequently obtain sensitive information or execute OS commands, via a crafted HTML document. | |||||
CVE-2015-2979 | 1 Webservice-dic | 1 Yoyaku | 2024-11-21 | 7.5 HIGH | N/A |
Webservice-DIC yoyaku_v41 allows remote attackers to execute arbitrary OS commands via unspecified vectors. | |||||
CVE-2015-2955 | 1 Igreks | 3 Milkystep Light, Milkystep Professional, Milkystep Professional Oem | 2024-11-21 | 7.5 HIGH | N/A |
Igreks MilkyStep Light 0.94 and earlier and Professional 1.82 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors. | |||||
CVE-2015-2845 | 1 Goautodial | 1 Goadmin Ce | 2024-11-21 | 10.0 HIGH | N/A |
The cpanel function in go_site.php in GoAutoDial GoAdmin CE before 3.3-1421902800 allows remote attackers to execute arbitrary commands via the $type portion of the PATH_INFO. | |||||
CVE-2015-2844 | 1 Goautodial | 1 Goadmin Ce | 2024-11-21 | 10.0 HIGH | N/A |
The cpanel function in go_site.php in GoAutoDial GoAdmin CE before 3.3-1420434000 allows remote attackers to execute arbitrary commands via the $action portion of the PATH_INFO. | |||||
CVE-2015-1388 | 1 Arubanetworks | 1 Arubaos | 2024-11-21 | 7.2 HIGH | N/A |
The "RAP console" feature in ArubaOS 5.x through 6.2.x, 6.3.x before 6.3.1.15, and 6.4.x before 6.4.2.4 on Aruba access points in Remote Access Point (AP) mode allows remote attackers to execute arbitrary commands via unspecified vectors. | |||||
CVE-2015-0977 | 1 Network Vision | 1 Intravue | 2024-11-21 | 10.0 HIGH | N/A |
Network Vision IntraVue before 2.3.0a14 on Windows allows remote attackers to execute arbitrary OS commands via unspecified vectors. | |||||
CVE-2015-0691 | 1 Cisco | 1 Secure Desktop | 2024-11-21 | 9.3 HIGH | N/A |
A certain Cisco JAR file, as distributed in Cache Cleaner in Cisco Secure Desktop (CSD), allows remote attackers to execute arbitrary commands via a crafted web site, aka Bug ID CSCup83001. | |||||
CVE-2015-0525 | 1 Emc | 1 Secure Remote Services | 2024-11-21 | 7.5 HIGH | N/A |
The Gateway Provisioning service in EMC Secure Remote Services Virtual Edition (ESRS VE) 3.02 and 3.03 allows remote attackers to execute arbitrary OS commands via unspecified vectors. | |||||
CVE-2014-9727 | 1 Avm | 1 Fritz\!box | 2024-11-21 | 10.0 HIGH | N/A |
AVM Fritz!Box allows remote attackers to execute arbitrary commands via shell metacharacters in the var:lang parameter to cgi-bin/webcm. | |||||
CVE-2014-9284 | 1 Buffalotech | 14 Bhr-4grv2, Bhr-4grv2 Firmware, Wex-300 and 11 more | 2024-11-21 | 7.7 HIGH | N/A |
The Buffalo WHR-1166DHP 1.60 and earlier, WSR-600DHP 1.60 and earlier, WHR-600D 1.60 and earlier, WHR-300HP2 1.60 and earlier, WMR-300 1.60 and earlier, WEX-300 1.60 and earlier, and BHR-4GRV2 1.04 and earlier routers allow remote authenticated users to execute arbitrary OS commands via unspecified vectors. | |||||
CVE-2014-8387 | 1 Advantech | 2 Eki-6340, Eki-6340 Firmware | 2024-11-21 | 9.0 HIGH | N/A |
cgi/utility.cgi in Advantech EKI-6340 2.05 Wi-Fi Mesh Access Point allows remote authenticated users to execute arbitrary commands via shell metacharacters in the pinghost parameter to ping.cgi. |