Vulnerabilities (CVE)

Filtered by CWE-94
Total 3677 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-7691 1 Sap 1 Trex 2024-11-21 7.5 HIGH 9.8 CRITICAL
A code injection vulnerability exists in SAP TREX / Business Warehouse Accelerator (BWA). The vendor response is SAP Security Note 2419592.
CVE-2017-7625 1 Fiyo 1 Fiyo Cms 2024-11-21 7.5 HIGH 9.8 CRITICAL
In Fiyo CMS 2.x through 2.0.7, attackers may upload a webshell via the content parameter to "/dapur/apps/app_theme/libs/save_file.php" and then execute code.
CVE-2017-7570 1 Pivotx 1 Pivotx 2024-11-21 6.5 MEDIUM 8.8 HIGH
PivotX 2.3.11 allows remote authenticated Advanced users to execute arbitrary PHP code by performing an upload with a safe file extension (such as .jpg) and then invoking the duplicate function to change to the .php extension.
CVE-2017-7494 2 Debian, Samba 2 Debian Linux, Samba 2024-11-21 10.0 HIGH 9.8 CRITICAL
Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.
CVE-2017-7411 1 Enalean 1 Tuleap 2024-11-21 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Enalean Tuleap 9.6 and prior versions. The vulnerability exists because the User::getRecentElements() method is using the unserialize() function with a preference value that can be arbitrarily manipulated by malicious users through the REST API interface, and this can be exploited to inject arbitrary PHP objects into the application scope, allowing an attacker to perform a variety of attacks (including but not limited to Remote Code Execution).
CVE-2017-7402 1 Lucidcrew 1 Pixie 2024-11-21 7.5 HIGH 9.8 CRITICAL
Pixie 1.0.4 allows remote authenticated users to upload and execute arbitrary PHP code via the POST data in an admin/index.php?s=publish&x=filemanager request for a filename with a double extension, such as a .jpg.php file with Content-Type of image/jpeg.
CVE-2017-7324 1 Modx 1 Modx Revolution 2024-11-21 7.5 HIGH 9.8 CRITICAL
setup/templates/findcore.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the core_path parameter.
CVE-2017-7321 1 Modx 1 Modx Revolution 2024-11-21 7.5 HIGH 9.8 CRITICAL
setup/controllers/welcome.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the config_key parameter to the setup/index.php?action=welcome URI.
CVE-2017-6782 1 Cisco 1 Prime Infrastructure 2024-11-21 4.9 MEDIUM 5.4 MEDIUM
A vulnerability in the administrative web interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to modify a page in the web interface of the affected application. The vulnerability is due to improper sanitization of parameter values by the affected application. An attacker could exploit this vulnerability by injecting malicious code into an affected parameter and persuading a user to access a web page that triggers the rendering of the injected code. Cisco Bug IDs: CSCve47074. Known Affected Releases: 3.2(0.0).
CVE-2017-6455 1 Ntp 1 Ntp 2024-11-21 4.4 MEDIUM 7.0 HIGH
NTP before 4.2.8p10 and 4.3.x before 4.3.94, when using PPSAPI, allows local users to gain privileges via a DLL in the PPSAPI_DLLS environment variable.
CVE-2017-6325 1 Symantec 1 Messaging Gateway 2024-11-21 6.0 MEDIUM 6.6 MEDIUM
The Symantec Messaging Gateway can encounter a file inclusion vulnerability, which is a type of vulnerability that is most commonly found to affect web applications that rely on a scripting run time. This issue is caused when an application builds a path to executable code using an attacker-controlled variable in a way that allows the attacker to control which file is executed at run time. This file inclusion vulnerability subverts how an application loads code for execution. Successful exploitation of a file inclusion vulnerability will result in remote code execution on the web server that runs the affected web application.
CVE-2017-6186 1 Bitdefender 3 Antivirus Plus, Internet Security, Total Security 2024-11-21 7.2 HIGH 6.7 MEDIUM
Code injection vulnerability in Bitdefender Total Security 12.0 (and earlier), Internet Security 12.0 (and earlier), and Antivirus Plus 12.0 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Bitdefender process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Image File Execution Options in the registry; (2) the self-protection mechanism is intended to block all local processes (regardless of privileges) from modifying Image File Execution Options for these products; and (3) this mechanism can be bypassed by an attacker who temporarily renames Image File Execution Options during the attack.
CVE-2017-5543 1 Intelliants 1 Subrion 2024-11-21 7.5 HIGH 9.8 CRITICAL
includes/classes/ia.core.users.php in Subrion CMS 4.0.5 allows remote attackers to conduct PHP Object Injection attacks via crafted serialized data in a salt cookie in a login request.
CVE-2017-4964 1 Cloudfoundry 1 Bosh Azure Cpi 2024-11-21 4.6 MEDIUM 8.8 HIGH
Cloud Foundry Foundation BOSH Azure CPI v22 could potentially allow a maliciously crafted stemcell to execute arbitrary code on VMs created by the director, aka a "CPI code injection vulnerability."
CVE-2017-3967 1 Mcafee 1 Network Security Manager 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Target influence via framing vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows remote attackers to inject arbitrary web script or HTML via application pages inability to break out of 3rd party HTML frames.
CVE-2017-3907 1 Mcafee 1 Mcafee Threat Intelligence Exchange 2024-11-21 7.5 HIGH 5.4 MEDIUM
Code Injection vulnerability in the ePolicy Orchestrator (ePO) extension in McAfee Threat Intelligence Exchange (TIE) Server 2.1.0 and earlier allows remote attackers to execute arbitrary HTML code to be reflected in the response web page via unspecified vector.
CVE-2017-3897 1 Mcafee 2 Livesafe, Security Scan Plus 2024-11-21 7.5 HIGH 9.8 CRITICAL
A Code Injection vulnerability in the non-certificate-based authentication mechanism in McAfee Live Safe versions prior to 16.0.3 and McAfee Security Scan Plus (MSS+) versions prior to 3.11.599.3 allows network attackers to perform a malicious file execution via a HTTP backend-response.
CVE-2017-3753 1 Lenovo 219 63, 63 Firmware, H50-30g and 216 more 2024-11-21 7.2 HIGH 6.8 MEDIUM
A vulnerability has been identified in some Lenovo products that use UEFI (BIOS) code developed by American Megatrends, Inc. (AMI). With this vulnerability, conditions exist where an attacker with administrative privileges or physical access to a system may be able to run specially crafted code that can allow them to bypass system protections such as Device Guard and Hyper-V.
CVE-2017-2968 1 Adobe 1 Campaign 2024-11-21 7.5 HIGH 9.1 CRITICAL
Adobe Campaign versions 16.4 Build 8724 and earlier have a code injection vulnerability.
CVE-2017-2809 1 Ansible-vault Project 1 Ansible-vault 2024-11-21 6.8 MEDIUM 7.5 HIGH
An exploitable vulnerability exists in the yaml loading functionality of ansible-vault before 1.0.5. A specially crafted vault can execute arbitrary python commands resulting in command execution. An attacker can insert python into the vault to trigger this vulnerability.