Vulnerabilities (CVE)

Filtered by CWE-94
Total 3761 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-20300 1 Phome 1 Empirecms 2019-02-05 7.5 HIGH 9.8 CRITICAL
Empire CMS 7.5 allows remote attackers to execute arbitrary PHP code via the ftemp parameter in an enews=EditMemberForm action because this code is injected into a memberform.$fid.php file.
CVE-2018-19127 1 Phpcms 1 Phpcms 2019-02-04 7.5 HIGH 9.8 CRITICAL
A code injection vulnerability in /type.php in PHPCMS 2008 allows attackers to write arbitrary content to a website cache file with a controllable filename, leading to arbitrary code execution. The PHP code is sent via the template parameter, and is written to a data/cache_template/*.tpl.php file along with a "<?php function " substring.
CVE-2018-19520 2 Php, Sdcms 2 Php, Sdcms 2019-02-04 6.5 MEDIUM 8.8 HIGH
An issue was discovered in SDCMS 1.6 with PHP 5.x. app/admin/controller/themecontroller.php uses a check_bad function in an attempt to block certain PHP functions such as eval, but does not prevent use of preg_replace 'e' calls, allowing users to execute arbitrary code by leveraging access to admin template management.
CVE-2018-20717 1 Prestashop 1 Prestashop 2019-02-04 6.5 MEDIUM 8.8 HIGH
In the orders section of PrestaShop before 1.7.2.5, an attack is possible after gaining access to a target store with a user role with the rights of at least a Salesman or higher privileges. The attacker can then inject arbitrary PHP objects into the process and abuse an object chain in order to gain Remote Code Execution. This occurs because protection against serialized objects looks for a 0: followed by an integer, but does not consider 0:+ followed by an integer.
CVE-2018-2491 1 Sap 1 Fiori Client 2019-02-01 6.8 MEDIUM 7.8 HIGH
When opening a deep link URL in SAP Fiori Client with log level set to "Debug", the client application logs the URL to the log file. If this URL contains malicious JavaScript code it can eventually run inside the built-in log viewer of the application in case user opens the viewer and taps on the hyperlink in the viewer. SAP Fiori Client version 1.11.5 in Google Play store addresses these issues and users must update to that version.
CVE-2019-3575 1 Sqla Yaml Fixtures Project 1 Sqla Yaml Fixtures 2019-01-31 4.6 MEDIUM 7.8 HIGH
Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load.
CVE-2019-0247 1 Sap 1 Cloud Connector 2019-01-17 7.5 HIGH 9.8 CRITICAL
SAP Cloud Connector, before version 2.11.3, allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.
CVE-2018-16168 1 Jpcert 1 Logontracer 2019-01-15 7.5 HIGH 9.8 CRITICAL
LogonTracer 1.2.0 and earlier allows remote attackers to conduct Python code injection attacks via unspecified vectors.
CVE-2018-20605 1 Txjia 1 Imcat 2019-01-09 7.5 HIGH 9.8 CRITICAL
imcat 4.4 allows remote attackers to execute arbitrary PHP code by using root/run/adm.php to modify the boot/bootskip.php file.
CVE-2018-17827 1 Hisiphp 1 Hisiphp 2019-01-08 6.5 MEDIUM 7.2 HIGH
HisiPHP 1.0.8 allows remote attackers to execute arbitrary PHP code by editing a plugin's name to contain that code. This name is then injected into app/admin/model/AdminPlugins.php.
CVE-2018-1000881 1 Traccar 1 Server 2019-01-07 7.5 HIGH 9.8 CRITICAL
Traccar Traccar Server version 4.0 and earlier contains a CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability in ComputedAttributesHandler.java that can result in Remote Command Execution. This attack appear to be exploitable via Remote: web application request by a self-registered user. This vulnerability appears to have been fixed in 4.1 and later.
CVE-2018-20027 1 Lisa-lab 1 Pylearn2 2019-01-07 7.5 HIGH 9.8 CRITICAL
The yaml_parse.load method in Pylearn2 allows code injection.
CVE-2018-20133 1 Ymlref Project 1 Ymlref 2019-01-07 7.5 HIGH 9.8 CRITICAL
ymlref allows code injection.
CVE-2018-20599 1 Ucms Project 1 Ucms 2019-01-04 6.5 MEDIUM 8.8 HIGH
UCMS 1.4.7 allows remote attackers to execute arbitrary PHP code by entering this code during an index.php sadmin_fileedit action.
CVE-2018-18903 1 Vanillaforums 1 Vanilla 2018-12-26 7.5 HIGH 9.8 CRITICAL
Vanilla 2.6.x before 2.6.4 allows remote code execution.
CVE-2014-9164 4 Adobe, Apple, Linux and 1 more 4 Flash Player, Mac Os X, Linux Kernel and 1 more 2018-12-20 10.0 HIGH N/A
Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0587.
CVE-2018-19404 1 Yxcms 1 Yxcms 2018-12-19 6.5 MEDIUM 7.2 HIGH
In YXcms 1.4.7, protected/apps/appmanage/controller/indexController.php allow remote authenticated Administrators to execute any PHP code by creating a ZIP archive containing a config.php file, hosting the .zip file at an external URL, and visiting index.php?r=appmanage/index/onlineinstall&url= followed by that URL. This is related to the onlineinstall and import functions.
CVE-2018-19196 1 Xiaocms 1 Xiaocms 2018-12-13 7.5 HIGH 9.8 CRITICAL
An issue was discovered in XiaoCms 20141229. It allows remote attackers to execute arbitrary code by using the type parameter to bypass the standard admin\controller\uploadfile.php restrictions on uploaded file types (jpg, jpeg, bmp, png, gif), as demonstrated by an admin/index.php?c=uploadfile&a=uploadify_upload&type=php URI.
CVE-2018-8415 1 Microsoft 9 Powershell Core, Windows 10, Windows 7 and 6 more 2018-12-13 4.6 MEDIUM 7.8 HIGH
A tampering vulnerability exists in PowerShell that could allow an attacker to execute unlogged code, aka "Microsoft PowerShell Tampering Vulnerability." This affects Windows 7, PowerShell Core 6.1, Windows Server 2012 R2, Windows RT 8.1, PowerShell Core 6.0, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
CVE-2014-0587 4 Adobe, Apple, Linux and 1 more 4 Flash Player, Mac Os X, Linux Kernel and 1 more 2018-12-13 10.0 HIGH N/A
Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-9164.