Total
3574 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-5401 | 1 Hospira | 1 Mednet | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
Hospira MedNet software version 5.8 and prior uses vulnerable versions of the JBoss Enterprise Application Platform software that may allow unauthenticated users to execute arbitrary code on the target system. Hospira has developed a new version of the MedNet software, MedNet 6.1. Existing versions of MedNet can be upgraded to MedNet 6.1. | |||||
CVE-2019-7932 | 1 Magento | 1 Magento | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
A remote code execution vulnerability exists in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with admin privileges to create sitemaps can execute arbitrary PHP code by creating a malicious sitemap file. | |||||
CVE-2019-8371 | 1 Open-emr | 1 Openemr | 2024-02-04 | 9.0 HIGH | 7.2 HIGH |
OpenEMR v5.0.1-6 allows code execution. | |||||
CVE-2019-0222 | 4 Apache, Debian, Netapp and 1 more | 8 Activemq, Debian Linux, E-series Santricity Web Services and 5 more | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive. | |||||
CVE-2019-11201 | 1 Dolibarr | 1 Dolibarr Erp\/crm | 2024-02-04 | 8.5 HIGH | 8.0 HIGH |
Dolibarr ERP/CRM 9.0.1 provides a module named website that provides for creation of public websites with a WYSIWYG editor. It was identified that the editor also allowed inclusion of dynamic code, which can lead to code execution on the host machine. An attacker has to check a setting on the same page, which specifies the inclusion of dynamic content. Thus, a lower privileged user of the application can execute code under the context and permissions of the underlying web server. | |||||
CVE-2018-18836 | 1 My-netdata | 1 Netdata | 2024-02-04 | 4.3 MEDIUM | 6.5 MEDIUM |
An issue was discovered in Netdata 1.10.0. JSON injection exists via the api/v1/data tqx parameter because of web_client_api_request_v1_data in web/api/web_api_v1.c. | |||||
CVE-2019-14282 | 1 Simple Captcha2 Project | 1 Simple Captcha2 | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
The simple_captcha2 gem 0.2.3 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. | |||||
CVE-2019-0308 | 1 Sap | 1 E-commerce | 2024-02-04 | 3.5 LOW | 6.8 MEDIUM |
An authenticated attacker in SAP E-Commerce (Business-to-Consumer application), versions 7.3, 7.31, 7.32, 7.33, 7.54, can change the price of the product to zero and also checkout, by injecting an HTML code in the application that will be executed whenever the victim logs in to the application even on a different machine, leading to Code Injection. | |||||
CVE-2019-15087 | 1 Prise | 1 Adas | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
An issue was discovered in PRiSE adAS 1.7.0. An authenticated user can change the function used to hash passwords to any function, leading to remote code execution. | |||||
CVE-2019-11642 | 1 Oneshield | 1 Oneshield Policy | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
A log poisoning vulnerability has been discovered in the OneShield Policy (Dragon Core) framework before 5.1.10. Authenticated remote adversaries can poison log files by entering malicious payloads in either headers or form elements. These payloads are then executed via a client side debugging console. This is predicated on the debugging console and Java Bean being made available to the deployed application. | |||||
CVE-2019-6823 | 1 Schneider-electric | 1 Proclima | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
A CWE-94: Code Injection vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0. | |||||
CVE-2019-13372 | 1 Dlink | 1 Central Wifimanager | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
/web/Lib/Action/IndexAction.class.php in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 allows remote attackers to execute arbitrary PHP code via a cookie because a cookie's username field allows eval injection, and an empty password bypasses authentication. | |||||
CVE-2017-14853 | 1 Orpak | 1 Siteomat | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
The Orpak SiteOmat OrCU component is vulnerable to code injection, for all versions prior to 2017-09-25, due to a search query that uses a direct shell command. By tampering with the request, an attacker is able to run shell commands and receive valid output from the device. | |||||
CVE-2019-15001 | 1 Atlassian | 2 Jira Data Center, Jira Server | 2024-02-04 | 9.0 HIGH | 7.2 HIGH |
The Jira Importers Plugin in Atlassian Jira Server and Data Cente from version with 7.0.10 before 7.6.16, from 7.7.0 before 7.13.8, from 8.0.0 before 8.1.3, from 8.2.0 before 8.2.5, from 8.3.0 before 8.3.4 and from 8.4.0 before 8.4.1 allows remote attackers with Administrator permissions to gain remote code execution via a template injection vulnerability through the use of a crafted PUT request. | |||||
CVE-2019-7903 | 1 Magento | 1 Magento | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with admin privileges to email templates can execute arbitrary code by previewing a malicious template. | |||||
CVE-2019-10863 | 1 Combodo | 1 Teemip | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
A command injection vulnerability exists in TeemIp versions before 2.4.0. The new_config parameter of exec.php allows one to create a new PHP file with the exception of config information. The malicious PHP code sent is executed instantaneously and is not saved on the server. | |||||
CVE-2019-9829 | 1 Maccms | 1 Maccms | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
Maccms 10 allows remote attackers to execute arbitrary PHP code by entering this code in a template/default_pc/html/art Edit action. This occurs because template rendering uses an include operation on a cache file, which bypasses the prohibition of .php files as templates. | |||||
CVE-2019-0304 | 1 Sap | 5 Advanced Business Application Programming Platform Kernel, Advanced Business Application Programming Platform Krnl32nuc, Advanced Business Application Programming Platform Krnl32uc and 2 more | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
FTP Function of SAP NetWeaver AS ABAP Platform, versions- KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, allows an attacker to inject code or specifically manipulated command that can be executed by the application. An attacker could thereby control the behaviour of the application. | |||||
CVE-2018-20988 | 1 Google Forms Project | 1 Google Forms | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
The wpgform plugin before 0.94 for WordPress has eval injection in the CAPTCHA calculation. | |||||
CVE-2019-15490 | 1 It-novum | 1 Openitcockpit | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
openITCOCKPIT before 3.7.1 allows code injection, aka RVID 1-445b21. |