Total
3688 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2013-2267 | 1 Fudforum | 1 Fudforum | 2024-11-21 | 9.0 HIGH | 7.2 HIGH |
PHP Code Injection vulnerability in FUDforum Bulletin Board Software 3.0.4 could allow remote attackers to execute arbitrary code on the system. | |||||
CVE-2013-2208 | 1 Andreas Krennmair | 1 Tpp | 2024-11-21 | 6.8 MEDIUM | N/A |
tpp 1.3.1 allows remote attackers to execute arbitrary commands via a --exec command in a TPP template file. | |||||
CVE-2013-2161 | 2 Openstack, Opensuse | 4 Folsom, Grizzly, Havana and 1 more | 2024-11-21 | 7.5 HIGH | N/A |
XML injection vulnerability in account/utils.py in OpenStack Swift Folsom, Grizzly, and Havana allows attackers to trigger invalid or spoofed Swift responses via an account name. | |||||
CVE-2013-2135 | 1 Apache | 1 Struts | 2024-11-21 | 9.3 HIGH | N/A |
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice. | |||||
CVE-2013-2134 | 1 Apache | 1 Struts | 2024-11-21 | 9.3 HIGH | N/A |
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted action name that is not properly handled during wildcard matching, a different vulnerability than CVE-2013-2135. | |||||
CVE-2013-2121 | 2 Redhat, Theforeman | 2 Openstack, Foreman | 2024-11-21 | 6.0 MEDIUM | N/A |
Eval injection vulnerability in the create method in the Bookmarks controller in Foreman before 1.2.0-RC2 allows remote authenticated users with permissions to create bookmarks to execute arbitrary code via a controller name attribute. | |||||
CVE-2013-2115 | 1 Apache | 1 Struts | 2024-11-21 | 9.3 HIGH | 8.1 HIGH |
Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. NOTE: this issue is due to an incomplete fix for CVE-2013-1966. | |||||
CVE-2013-2035 | 1 Redhat | 1 Hawtjni | 2024-11-21 | 4.4 MEDIUM | N/A |
Race condition in hawtjni-runtime/src/main/java/org/fusesource/hawtjni/runtime/Library.java in HawtJNI before 1.8, when a custom library path is not specified, allows local users to execute arbitrary Java code by overwriting a temporary JAR file with a predictable name in /tmp. | |||||
CVE-2013-1966 | 1 Apache | 1 Struts | 2024-11-21 | 9.3 HIGH | N/A |
Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. | |||||
CVE-2013-1965 | 1 Apache | 2 Struts, Struts2-showcase | 2024-11-21 | 9.3 HIGH | N/A |
Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect. | |||||
CVE-2013-1899 | 2 Canonical, Postgresql | 2 Ubuntu Linux, Postgresql | 2024-11-21 | 6.5 MEDIUM | N/A |
Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a "-" (hyphen). | |||||
CVE-2013-1898 | 1 Digineo | 1 Thumbshooter | 2024-11-21 | 7.5 HIGH | N/A |
lib/thumbshooter.rb in the Thumbshooter 0.1.5 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL. | |||||
CVE-2013-1875 | 1 Rubygems | 1 Command Wrap | 2024-11-21 | 7.5 HIGH | N/A |
command_wrap.rb in the command_wrap Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL or filename. | |||||
CVE-2013-1850 | 1 Owncloud | 1 Owncloud | 2024-11-21 | 6.5 MEDIUM | N/A |
Multiple incomplete blacklist vulnerabilities in (1) import.php and (2) ajax/uploadimport.php in apps/contacts/ in ownCloud before 4.0.13 and 4.5.x before 4.5.8 allow remote authenticated users to execute arbitrary PHP code by uploading a .htaccess file. | |||||
CVE-2013-1777 | 2 Apache, Ibm | 2 Geronimo, Websphere Application Server | 2024-11-21 | 10.0 HIGH | N/A |
The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object. | |||||
CVE-2013-1762 | 1 Stunnel | 1 Stunnel | 2024-11-21 | 6.6 MEDIUM | N/A |
stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow. | |||||
CVE-2013-1756 | 2 Mark Evans, Ruby On Rails | 2 Dragonfly Gem, Ruby On Rails | 2024-11-21 | 7.5 HIGH | N/A |
The Dragonfly gem 0.7 before 0.8.6 and 0.9.x before 0.9.13 for Ruby, when used with Ruby on Rails, allows remote attackers to execute arbitrary code via a crafted request. | |||||
CVE-2013-1688 | 1 Mozilla | 1 Firefox | 2024-11-21 | 9.3 HIGH | N/A |
The Profiler implementation in Mozilla Firefox before 22.0 parses untrusted data during UI rendering, which allows user-assisted remote attackers to execute arbitrary JavaScript code via a crafted web site. | |||||
CVE-2013-1666 | 1 Foswiki | 1 Foswiki | 2024-11-21 | 6.8 MEDIUM | 9.8 CRITICAL |
Foswiki before 1.1.8 contains a code injection vulnerability in the MAKETEXT macro. | |||||
CVE-2013-1647 | 1 Open-xchange | 1 Open-xchange Server | 2024-11-21 | 5.0 MEDIUM | N/A |
Multiple CRLF injection vulnerabilities in Open-Xchange Server before 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 allow remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted parameter, as demonstrated by (1) the location parameter to ajax/redirect or (2) multiple infostore URIs. |