Total
3677 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-7691 | 1 Sap | 1 Trex | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
A code injection vulnerability exists in SAP TREX / Business Warehouse Accelerator (BWA). The vendor response is SAP Security Note 2419592. | |||||
CVE-2017-7625 | 1 Fiyo | 1 Fiyo Cms | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
In Fiyo CMS 2.x through 2.0.7, attackers may upload a webshell via the content parameter to "/dapur/apps/app_theme/libs/save_file.php" and then execute code. | |||||
CVE-2017-7570 | 1 Pivotx | 1 Pivotx | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
PivotX 2.3.11 allows remote authenticated Advanced users to execute arbitrary PHP code by performing an upload with a safe file extension (such as .jpg) and then invoking the duplicate function to change to the .php extension. | |||||
CVE-2017-7494 | 2 Debian, Samba | 2 Debian Linux, Samba | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it. | |||||
CVE-2017-7411 | 1 Enalean | 1 Tuleap | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in Enalean Tuleap 9.6 and prior versions. The vulnerability exists because the User::getRecentElements() method is using the unserialize() function with a preference value that can be arbitrarily manipulated by malicious users through the REST API interface, and this can be exploited to inject arbitrary PHP objects into the application scope, allowing an attacker to perform a variety of attacks (including but not limited to Remote Code Execution). | |||||
CVE-2017-7402 | 1 Lucidcrew | 1 Pixie | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Pixie 1.0.4 allows remote authenticated users to upload and execute arbitrary PHP code via the POST data in an admin/index.php?s=publish&x=filemanager request for a filename with a double extension, such as a .jpg.php file with Content-Type of image/jpeg. | |||||
CVE-2017-7324 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
setup/templates/findcore.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the core_path parameter. | |||||
CVE-2017-7321 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
setup/controllers/welcome.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the config_key parameter to the setup/index.php?action=welcome URI. | |||||
CVE-2017-6782 | 1 Cisco | 1 Prime Infrastructure | 2024-11-21 | 4.9 MEDIUM | 5.4 MEDIUM |
A vulnerability in the administrative web interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to modify a page in the web interface of the affected application. The vulnerability is due to improper sanitization of parameter values by the affected application. An attacker could exploit this vulnerability by injecting malicious code into an affected parameter and persuading a user to access a web page that triggers the rendering of the injected code. Cisco Bug IDs: CSCve47074. Known Affected Releases: 3.2(0.0). | |||||
CVE-2017-6455 | 1 Ntp | 1 Ntp | 2024-11-21 | 4.4 MEDIUM | 7.0 HIGH |
NTP before 4.2.8p10 and 4.3.x before 4.3.94, when using PPSAPI, allows local users to gain privileges via a DLL in the PPSAPI_DLLS environment variable. | |||||
CVE-2017-6325 | 1 Symantec | 1 Messaging Gateway | 2024-11-21 | 6.0 MEDIUM | 6.6 MEDIUM |
The Symantec Messaging Gateway can encounter a file inclusion vulnerability, which is a type of vulnerability that is most commonly found to affect web applications that rely on a scripting run time. This issue is caused when an application builds a path to executable code using an attacker-controlled variable in a way that allows the attacker to control which file is executed at run time. This file inclusion vulnerability subverts how an application loads code for execution. Successful exploitation of a file inclusion vulnerability will result in remote code execution on the web server that runs the affected web application. | |||||
CVE-2017-6186 | 1 Bitdefender | 3 Antivirus Plus, Internet Security, Total Security | 2024-11-21 | 7.2 HIGH | 6.7 MEDIUM |
Code injection vulnerability in Bitdefender Total Security 12.0 (and earlier), Internet Security 12.0 (and earlier), and Antivirus Plus 12.0 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Bitdefender process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Image File Execution Options in the registry; (2) the self-protection mechanism is intended to block all local processes (regardless of privileges) from modifying Image File Execution Options for these products; and (3) this mechanism can be bypassed by an attacker who temporarily renames Image File Execution Options during the attack. | |||||
CVE-2017-5543 | 1 Intelliants | 1 Subrion | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
includes/classes/ia.core.users.php in Subrion CMS 4.0.5 allows remote attackers to conduct PHP Object Injection attacks via crafted serialized data in a salt cookie in a login request. | |||||
CVE-2017-4964 | 1 Cloudfoundry | 1 Bosh Azure Cpi | 2024-11-21 | 4.6 MEDIUM | 8.8 HIGH |
Cloud Foundry Foundation BOSH Azure CPI v22 could potentially allow a maliciously crafted stemcell to execute arbitrary code on VMs created by the director, aka a "CPI code injection vulnerability." | |||||
CVE-2017-3967 | 1 Mcafee | 1 Network Security Manager | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
Target influence via framing vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows remote attackers to inject arbitrary web script or HTML via application pages inability to break out of 3rd party HTML frames. | |||||
CVE-2017-3907 | 1 Mcafee | 1 Mcafee Threat Intelligence Exchange | 2024-11-21 | 7.5 HIGH | 5.4 MEDIUM |
Code Injection vulnerability in the ePolicy Orchestrator (ePO) extension in McAfee Threat Intelligence Exchange (TIE) Server 2.1.0 and earlier allows remote attackers to execute arbitrary HTML code to be reflected in the response web page via unspecified vector. | |||||
CVE-2017-3897 | 1 Mcafee | 2 Livesafe, Security Scan Plus | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
A Code Injection vulnerability in the non-certificate-based authentication mechanism in McAfee Live Safe versions prior to 16.0.3 and McAfee Security Scan Plus (MSS+) versions prior to 3.11.599.3 allows network attackers to perform a malicious file execution via a HTTP backend-response. | |||||
CVE-2017-3753 | 1 Lenovo | 219 63, 63 Firmware, H50-30g and 216 more | 2024-11-21 | 7.2 HIGH | 6.8 MEDIUM |
A vulnerability has been identified in some Lenovo products that use UEFI (BIOS) code developed by American Megatrends, Inc. (AMI). With this vulnerability, conditions exist where an attacker with administrative privileges or physical access to a system may be able to run specially crafted code that can allow them to bypass system protections such as Device Guard and Hyper-V. | |||||
CVE-2017-2968 | 1 Adobe | 1 Campaign | 2024-11-21 | 7.5 HIGH | 9.1 CRITICAL |
Adobe Campaign versions 16.4 Build 8724 and earlier have a code injection vulnerability. | |||||
CVE-2017-2809 | 1 Ansible-vault Project | 1 Ansible-vault | 2024-11-21 | 6.8 MEDIUM | 7.5 HIGH |
An exploitable vulnerability exists in the yaml loading functionality of ansible-vault before 1.0.5. A specially crafted vault can execute arbitrary python commands resulting in command execution. An attacker can insert python into the vault to trigger this vulnerability. |