Vulnerabilities (CVE)

Filtered by CWE-94
Total 4520 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2013-4225 1 Restful Web Services Project 1 Restful Web Services 2024-11-21 6.8 MEDIUM 8.8 HIGH
The RESTful Web Services (restws) module 7.x-1.x before 7.x-1.4 and 7.x-2.x before 7.x-2.1 for Drupal does not properly restrict access to entity write operations, which makes it easier for remote authenticated users with the "access resource node" and "create page content" permissions (or equivalents) to conduct cross-site scripting (XSS) or execute arbitrary PHP code via a crafted text field.
CVE-2013-4211 1 Openx 1 Openx 2024-11-21 7.5 HIGH 9.8 CRITICAL
A Code Execution Vulnerability exists in OpenX Ad Server 2.8.10 due to a backdoor in flowplayer-3.1.1.min.js library, which could let a remote malicious user execute arbitrary PHP code
CVE-2013-2267 1 Fudforum 1 Fudforum 2024-11-21 9.0 HIGH 7.2 HIGH
PHP Code Injection vulnerability in FUDforum Bulletin Board Software 3.0.4 could allow remote attackers to execute arbitrary code on the system.
CVE-2013-1666 1 Foswiki 1 Foswiki 2024-11-21 6.8 MEDIUM 9.8 CRITICAL
Foswiki before 1.1.8 contains a code injection vulnerability in the MAKETEXT macro.
CVE-2011-3178 1 Opensuse 1 Open Build Service 2024-11-21 6.5 MEDIUM 8.1 HIGH
In the web ui of the openbuildservice before 2.3.0 a code injection of the project rebuildtimes statistics could be used by authorized attackers to execute shellcode.
CVE-2011-2767 4 Apache, Canonical, Debian and 1 more 7 Mod Perl, Ubuntu Linux, Debian Linux and 4 more 2024-11-21 10.0 HIGH 9.8 CRITICAL
mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.
CVE-2011-1830 1 Ekiga 1 Ekiga 2024-11-21 6.8 MEDIUM 5.7 MEDIUM
Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so.
CVE-2024-52434 1 Supsystic 1 Popup 2024-11-20 N/A 9.1 CRITICAL
Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Supsystic Popup by Supsystic allows Command Injection.This issue affects Popup by Supsystic: from n/a through 1.10.29.
CVE-2024-52427 1 Vollstart 1 Event Tickets With Ticket Scanner 2024-11-20 N/A 9.9 CRITICAL
Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Saso Nikolov Event Tickets with Ticket Scanner allows Server Side Include (SSI) Injection.This issue affects Event Tickets with Ticket Scanner: from n/a through 2.3.11.
CVE-2024-11240 1 Ibphoenix 1 Ibwebadmin 2024-11-20 4.0 MEDIUM 3.5 LOW
A vulnerability was found in IBPhoenix ibWebAdmin up to 1.0.2 and classified as problematic. This issue affects some unknown processing of the file /database.php of the component Banco de Dados Tab. The manipulation of the argument db_login_role leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-11246 1 Anisha 1 Farmacia 2024-11-20 4.0 MEDIUM 3.5 LOW
A vulnerability, which was classified as problematic, was found in code-projects Farmacia 1.0. Affected is an unknown function of the file /adicionar-cliente.php. The manipulation of the argument nome/cpf/dataNascimento leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions the parameter "nome" to be affected. But further inspection indicates that other parameters might be affected as well.
CVE-2024-50919 2024-11-19 N/A 9.8 CRITICAL
Jpress until v5.1.1 has arbitrary file uploads on the windows platform, and the construction of non-standard file formats such as .jsp. can lead to arbitrary command execution
CVE-2024-11038 2024-11-19 N/A 7.3 HIGH
The The WPB Popup for Contact Form 7 – Showing The Contact Form 7 Popup on Button Click – CF7 Popup plugin for WordPress is vulnerable to arbitrary shortcode execution via wpb_pcf_fire_contact_form AJAX action in all versions up to, and including, 1.7.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
CVE-2024-50804 2024-11-19 N/A 7.8 HIGH
Insecure Permissions vulnerability in Micro-star International MSI Center Pro 2.1.37.0 allows a local attacker to execute arbitrary code via the Device_DeviceID.dat.bak file within the C:\ProgramData\MSI\One Dragon Center\Data folder
CVE-2024-11247 1 Oretnom23 1 Online Eyewear Shop 2024-11-19 4.0 MEDIUM 3.5 LOW
A vulnerability has been found in SourceCodester Online Eyewear Shop 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /oews/classes/Master.php?f=save_product of the component Inventory Page. The manipulation of the argument brand leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
CVE-2024-11259 1 Code-projects 1 Farmacia 2024-11-19 4.0 MEDIUM 3.5 LOW
A vulnerability, which was classified as problematic, has been found in code-projects Farmacia 1.0. This issue affects some unknown processing of the file /fornecedores.php. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-50636 2024-11-19 N/A 9.8 CRITICAL
PyMOL 2.5.0 contains a vulnerability in its "Run Script" function, which allows the execution of arbitrary Python code embedded within .PYM files. Attackers can craft a malicious .PYM file containing a Python reverse shell payload and exploit the function to achieve Remote Command Execution (RCE). This vulnerability arises because PyMOL treats .PYM files as Python scripts without properly validating or restricting the commands within the script, enabling attackers to run unauthorized commands in the context of the user running the application.
CVE-2024-52945 2024-11-19 N/A 7.8 HIGH
An issue was discovered in Veritas NetBackup before 10.5. This only applies to NetBackup components running on a Windows Operating System. If a user executes specific NetBackup commands or an attacker uses social engineering techniques to impel the user to execute the commands, a malicious DLL could be loaded, resulting in execution of the attacker's code in the user's security context.
CVE-2024-49048 1 Microsoft 1 Torchgeo 2024-11-18 N/A 8.1 HIGH
TorchGeo Remote Code Execution Vulnerability
CVE-2024-11102 1 Mayurik 1 Hospital Management System 2024-11-18 4.0 MEDIUM 3.5 LOW
A vulnerability was found in SourceCodester Hospital Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /vm/doctor/edit-doc.php. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.