Vulnerabilities (CVE)

Filtered by CWE-94
Total 4530 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-9774 1 Horde 1 Horde Image Api 2025-04-20 6.5 MEDIUM 8.8 HIGH
Remote Code Execution was found in Horde_Image 2.x before 2.5.0 via a crafted GET request. Exploitation requires authentication.
CVE-2015-2252 1 Huawei 2 Oceanstor Uds, Oceanstor Uds Firmware 2025-04-20 9.3 HIGH 8.8 HIGH
Huawei OceanStor UDS devices with software before V100R002C01SPC102 might allow remote attackers to execute arbitrary code with root privileges via a crafted UDS patch with shell scripts.
CVE-2017-7911 1 Cybervision 1 Kaa Iot Platform 2025-04-20 6.5 MEDIUM 8.8 HIGH
A Code Injection issue was discovered in CyberVision Kaa IoT Platform, Version 0.7.4. An insufficient-encapsulation vulnerability has been identified, which may allow remote code execution.
CVE-2017-6186 1 Bitdefender 3 Antivirus Plus, Internet Security, Total Security 2025-04-20 7.2 HIGH 6.7 MEDIUM
Code injection vulnerability in Bitdefender Total Security 12.0 (and earlier), Internet Security 12.0 (and earlier), and Antivirus Plus 12.0 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Bitdefender process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Image File Execution Options in the registry; (2) the self-protection mechanism is intended to block all local processes (regardless of privileges) from modifying Image File Execution Options for these products; and (3) this mechanism can be bypassed by an attacker who temporarily renames Image File Execution Options during the attack.
CVE-2017-7402 1 Lucidcrew 1 Pixie 2025-04-20 7.5 HIGH 9.8 CRITICAL
Pixie 1.0.4 allows remote authenticated users to upload and execute arbitrary PHP code via the POST data in an admin/index.php?s=publish&x=filemanager request for a filename with a double extension, such as a .jpg.php file with Content-Type of image/jpeg.
CVE-2017-1336 1 Ibm 1 Infosphere Biginsights 2025-04-20 3.6 LOW 4.4 MEDIUM
IBM Infosphere BigInsights 4.2.0 could allow an attacker to inject code that could allow access to restricted data and files. IBM X-Force ID: 126244.
CVE-2014-9463 2 Vbseo, Vbulletin 2 Vbseo, Vbulletin 2025-04-20 9.0 HIGH 8.8 HIGH
functions_vbseo_hook.php in the VBSEO module for vBulletin allows remote authenticated users to execute arbitrary code via the HTTP Referer header to visitormessage.php.
CVE-2017-11459 1 Sap 1 Trex 2025-04-20 7.5 HIGH 9.8 CRITICAL
SAP TREX 7.10 allows remote attackers to (1) read arbitrary files via an fget command or (2) write to arbitrary files and consequently execute arbitrary code via an fdir command, aka SAP Security Note 2419592.
CVE-2016-6175 1 Php-gettext Project 1 Php-gettext 2025-04-20 7.5 HIGH 9.8 CRITICAL
Eval injection vulnerability in php-gettext 1.0.12 and earlier allows remote attackers to execute arbitrary PHP code via a crafted plural forms header.
CVE-2017-14764 1 Genixcms 1 Genixcms 2025-04-20 6.5 MEDIUM 8.8 HIGH
In the Upload Modules page in GeniXCMS 1.1.4, remote authenticated users can execute arbitrary PHP code via a .php file in a ZIP archive of a module.
CVE-2017-16664 2 Debian, Otrs 2 Debian Linux, Otrs 2025-04-20 6.5 MEDIUM 8.8 HIGH
Code injection exists in Kernel/System/Spelling.pm in Open Ticket Request System (OTRS) 5 before 5.0.24, 4 before 4.0.26, and 3.3 before 3.3.20. In the agent interface, an authenticated remote attacker can execute shell commands as the webserver user via URL manipulation.
CVE-2015-0855 1 Pitivi 1 Pitivi 2025-04-20 10.0 HIGH 9.8 CRITICAL
The _mediaLibraryPlayCb function in mainwindow.py in pitivi before 0.95 allows attackers to execute arbitrary code via shell metacharacters in a file path.
CVE-2017-9807 1 Openwebif Project 1 Openwebif 2025-04-20 10.0 HIGH 9.8 CRITICAL
An issue was discovered in the OpenWebif plugin through 1.2.4 for E2 open devices. The saveConfig function of "plugin/controllers/models/config.py" performs an eval() call on the contents of the "key" HTTP GET parameter. This allows an unauthenticated remote attacker to execute arbitrary Python code or OS commands via api/saveconfig.
CVE-2017-11421 1 Gnome-exe-thumbnailer Project 1 Gnome-exe-thumbnailer 2025-04-20 4.6 MEDIUM 7.8 HIGH
gnome-exe-thumbnailer before 0.9.5 is prone to a VBScript Injection when generating thumbnails for MSI files, aka the "Bad Taste" issue. There is a local attack if the victim uses the GNOME Files file manager, and navigates to a directory containing a .msi file with VBScript code in its filename.
CVE-2017-14146 1 Helpdezk 1 Helpdezk 2025-04-20 6.5 MEDIUM 8.8 HIGH
HelpDEZk 1.1.1 allows remote authenticated users to execute arbitrary PHP code by uploading a .php attachment and then requesting it in the helpdezk\app\uploads\helpdezk\attachments\ directory.
CVE-2016-5713 1 Puppet 1 Puppet Agent 2025-04-20 7.5 HIGH 9.8 CRITICAL
Versions of Puppet Agent prior to 1.6.0 included a version of the Puppet Execution Protocol (PXP) agent that passed environment variables through to Puppet runs. This could allow unauthorized code to be loaded. This bug was first introduced in Puppet Agent 1.3.0.
CVE-2017-1001002 1 Mathjs 1 Math.js 2025-04-20 7.5 HIGH 9.8 CRITICAL
math.js before 3.17.0 had an arbitrary code execution in the JavaScript engine. Creating a typed function with JavaScript code in the name could result arbitrary execution.
CVE-2017-10844 1 Basercms 1 Basercms 2025-04-20 6.5 MEDIUM 8.8 HIGH
baserCMS 3.0.14 and earlier, 4.0.5 and earlier allows an attacker to execute arbitrary PHP code on the server via unspecified vectors.
CVE-2016-5072 1 Oxidforge 1 Oxid Eshop 2025-04-20 6.5 MEDIUM 8.8 HIGH
OXID eShop before 2016-06-13 allows remote attackers to execute arbitrary code via a GET or POST request to the oxuser class. Fixed versions are Enterprise Edition v5.1.12, Enterprise Edition v5.2.9, Professional Edition v4.8.12, Professional Edition v4.9.9, Community Edition v4.8.12, Community Edition v4.9.9.
CVE-2016-8354 1 Schneider-electric 1 Unity Pro 2025-04-20 5.1 MEDIUM 7.0 HIGH
An issue was discovered in Schneider Electric Unity PRO prior to V11.1. Unity projects can be compiled as x86 instructions and loaded onto the PLC Simulator delivered with Unity PRO. These x86 instructions are subsequently executed directly by the simulator. A specially crafted patched Unity project file can make the simulator execute malicious code by redirecting the control flow of these instructions.