Vulnerabilities (CVE)

Filtered by CWE-94
Total 4821 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-12548 1 Bludit 1 Bludit 2024-11-21 6.5 MEDIUM 8.8 HIGH
Bludit before 3.9.0 allows remote code execution for an authenticated user by uploading a php file while changing the logo through /admin/ajax/upload-logo.
CVE-2019-12120 1 Onap 1 Open Network Automation Platform 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in ONAP VNFSDK through Dublin. By accessing port 8000 of demo-vnfsdk-vnfsdk, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.
CVE-2019-12119 1 Onap 1 Open Network Automation Platform 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in ONAP SDC through Dublin. By accessing port 7000 of demo-sdc-sdc-wfd-fe pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.
CVE-2019-12118 1 Onap 1 Open Network Automation Platform 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in ONAP SDC through Dublin. By accessing port 7001 of demo-sdc-sdc-wfd-be pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.
CVE-2019-12117 1 Onap 1 Open Network Automation Platform 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in ONAP SDC through Dublin. By accessing port 4001 of demo-sdc-sdc-onboarding-be pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.
CVE-2019-12116 1 Onap 1 Open Network Automation Platform 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in ONAP SDC through Dublin. By accessing port 6000 of demo-sdc-sdc-fe pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.
CVE-2019-12115 1 Onap 1 Open Network Automation Platform 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in ONAP SDC through Dublin. By accessing port 4000 of demo-sdc-sdc-be pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.
CVE-2019-12114 1 Onap 1 Open Network Automation Platform 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in ONAP HOLMES before Dublin. By accessing port 9202 of dep-holmes-engine-mgmt pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.
CVE-2019-11642 1 Oneshield 1 Oneshield Policy 2024-11-21 6.5 MEDIUM 8.8 HIGH
A log poisoning vulnerability has been discovered in the OneShield Policy (Dragon Core) framework before 5.1.10. Authenticated remote adversaries can poison log files by entering malicious payloads in either headers or form elements. These payloads are then executed via a client side debugging console. This is predicated on the debugging console and Java Bean being made available to the deployed application.
CVE-2019-11594 1 Getadblock 1 Adblock 2024-11-21 6.8 MEDIUM 8.1 HIGH
In AdBlock before 3.45.0, the $rewrite filter option allows filter-list maintainers to run arbitrary code in a client-side session when a web service loads a script for execution using XMLHttpRequest or Fetch, and the script origin has an open redirect.
CVE-2019-11593 1 Adblockplus 1 Adblock Plus 2024-11-21 6.8 MEDIUM 8.1 HIGH
In Adblock Plus before 3.5.2, the $rewrite filter option allows filter-list maintainers to run arbitrary code in a client-side session when a web service loads a script for execution using XMLHttpRequest or Fetch, and the script origin has an open redirect.
CVE-2019-11552 1 Code42 2 Code42 For Enterprise, Crashplan For Small Business 2024-11-21 4.4 MEDIUM 7.0 HIGH
Code42 Enterprise and Crashplan for Small Business Client version 6.7 before 6.7.5, 6.8 before 6.8.8, and 6.9 before 6.9.4 allows eval injection. A proxy auto-configuration file, crafted by a lesser privileged user, may be used to execute arbitrary code at a higher privilege as the service user.
CVE-2019-11526 1 Softing 2 Uagate Si, Uagate Si Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
An issue was discovered in Softing uaGate SI 1.60.01. A maintenance script, that is executable via sudo, is vulnerable to file path injection. This enables the Attacker to write files with superuser privileges in specific locations.
CVE-2019-11376 1 Brassica 1 Soy Cms 2024-11-21 6.5 MEDIUM 7.2 HIGH
** DISPUTED ** SOY CMS v3.0.2 allows remote attackers to execute arbitrary PHP code via a <?php substring in the second text box. NOTE: the vendor indicates that there was an assumption that the content is "made editable on its own."
CVE-2019-11201 1 Dolibarr 1 Dolibarr Erp\/crm 2024-11-21 8.5 HIGH 8.0 HIGH
Dolibarr ERP/CRM 9.0.1 provides a module named website that provides for creation of public websites with a WYSIWYG editor. It was identified that the editor also allowed inclusion of dynamic code, which can lead to code execution on the host machine. An attacker has to check a setting on the same page, which specifies the inclusion of dynamic content. Thus, a lower privileged user of the application can execute code under the context and permissions of the underlying web server.
CVE-2019-10863 1 Combodo 1 Teemip 2024-11-21 6.5 MEDIUM 7.2 HIGH
A command injection vulnerability exists in TeemIp versions before 2.4.0. The new_config parameter of exec.php allows one to create a new PHP file with the exception of config information. The malicious PHP code sent is executed instantaneously and is not saved on the server.
CVE-2019-10842 1 Getbootstrap 1 Bootstrap-sass 2024-11-21 10.0 HIGH 9.8 CRITICAL
Arbitrary code execution (via backdoor code) was discovered in bootstrap-sass 3.2.0.3, when downloaded from rubygems.org. An unauthenticated attacker can craft the ___cfduid cookie value with base64 arbitrary code to be executed via eval(), which can be leveraged to execute arbitrary code on the target system. Note that there are three underscore characters in the cookie name. This is unrelated to the __cfduid cookie that is legitimately used by Cloudflare.
CVE-2019-10760 1 Safer-eval Project 1 Safer-eval 2024-11-21 6.5 MEDIUM 9.9 CRITICAL
safer-eval before 1.3.2 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-10759 1 Safer-eval Project 1 Safer-eval 2024-11-21 6.5 MEDIUM 9.9 CRITICAL
safer-eval before 1.3.4 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-10684 1 74cms 1 74cms 2024-11-21 7.5 HIGH 9.8 CRITICAL
Application/Admin/Controller/ConfigController.class.php in 74cms v5.0.1 allows remote attackers to execute arbitrary PHP code via the index.php?m=Admin&c=config&a=edit site_domain parameter.