Vulnerabilities (CVE)

Filtered by CWE-94
Total 4922 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-9298 1 Pixelite 1 Events Manager 2024-11-21 7.5 HIGH 9.8 CRITICAL
The events-manager plugin before 5.6 for WordPress has code injection.
CVE-2015-9272 1 Videowhisper 1 Video Presentation 2024-11-21 7.5 HIGH 9.8 CRITICAL
The videowhisper-video-presentation plugin 3.31.17 for WordPress allows remote attackers to execute arbitrary code because vp/vw_upload.php considers a file safe when "html" are the last four characters, as demonstrated by a .phtml file containing PHP code.
CVE-2015-5243 1 Phpwhois Project 1 Phpwhois 2024-11-21 7.5 HIGH 9.8 CRITICAL
phpWhois allows remote attackers to execute arbitrary code via a crafted whois record.
CVE-2015-3173 1 Custom Content Type Manager Project 1 Custom Content Type Manager 2024-11-21 6.5 MEDIUM 7.2 HIGH
custom-content-type-manager Wordpress plugin can be used by an administrator to achieve arbitrary PHP remote code execution.
CVE-2015-10009 1 Nonfiction 1 Nterchange 2024-11-21 5.2 MEDIUM 5.5 MEDIUM
A vulnerability was found in nterchange up to 4.1.0. It has been rated as critical. This issue affects the function getContent of the file app/controllers/code_caller_controller.php. The manipulation of the argument q with the input %5C%27%29;phpinfo%28%29;/* leads to code injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.1 is able to address this issue. The patch is named fba7d89176fba8fe289edd58835fe45080797d99. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217187.
CVE-2014-5401 1 Hospira 1 Mednet 2024-11-21 10.0 HIGH 9.8 CRITICAL
Hospira MedNet software version 5.8 and prior uses vulnerable versions of the JBoss Enterprise Application Platform software that may allow unauthenticated users to execute arbitrary code on the target system. Hospira has developed a new version of the MedNet software, MedNet 6.1. Existing versions of MedNet can be upgraded to MedNet 6.1.
CVE-2014-2302 1 Webedition 1 Webedition Cms 2024-11-21 7.5 HIGH 9.8 CRITICAL
The installer script in webEdition CMS before 6.2.7-s1 and 6.3.x before 6.3.8-s1 allows remote attackers to conduct PHP Object Injection attacks by intercepting a request to update.webedition.org.
CVE-2014-2293 1 Zikula 1 Zikula Application Framework 2024-11-21 7.5 HIGH 9.8 CRITICAL
Zikula Application Framework before 1.3.7 build 11 allows remote attackers to conduct PHP object injection attacks and delete arbitrary files or execute arbitrary PHP code via crafted serialized data in the (1) authentication_method_ser or (2) authentication_info_ser parameter to index.php, or (3) zikulaMobileTheme parameter to index.php.
CVE-2014-10065 1 Remarkable Project 1 Remarkable 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Certain input when passed into remarkable before 1.4.1 will bypass the bad protocol check that disallows the javascript: scheme allowing for javascript: url's to be injected into the rendered content.
CVE-2013-7468 1 Simplemachines 1 Simple Machines Forum 2024-11-21 6.8 MEDIUM 8.1 HIGH
Simple Machines Forum (SMF) 2.0.4 allows PHP Code Injection via the index.php?action=admin;area=languages;sa=editlang dictionary parameter.
CVE-2013-4225 1 Restful Web Services Project 1 Restful Web Services 2024-11-21 6.8 MEDIUM 8.8 HIGH
The RESTful Web Services (restws) module 7.x-1.x before 7.x-1.4 and 7.x-2.x before 7.x-2.1 for Drupal does not properly restrict access to entity write operations, which makes it easier for remote authenticated users with the "access resource node" and "create page content" permissions (or equivalents) to conduct cross-site scripting (XSS) or execute arbitrary PHP code via a crafted text field.
CVE-2013-4211 1 Openx 1 Openx 2024-11-21 7.5 HIGH 9.8 CRITICAL
A Code Execution Vulnerability exists in OpenX Ad Server 2.8.10 due to a backdoor in flowplayer-3.1.1.min.js library, which could let a remote malicious user execute arbitrary PHP code
CVE-2013-2267 1 Fudforum 1 Fudforum 2024-11-21 9.0 HIGH 7.2 HIGH
PHP Code Injection vulnerability in FUDforum Bulletin Board Software 3.0.4 could allow remote attackers to execute arbitrary code on the system.
CVE-2013-1666 1 Foswiki 1 Foswiki 2024-11-21 6.8 MEDIUM 9.8 CRITICAL
Foswiki before 1.1.8 contains a code injection vulnerability in the MAKETEXT macro.
CVE-2011-3178 1 Opensuse 1 Open Build Service 2024-11-21 6.5 MEDIUM 8.1 HIGH
In the web ui of the openbuildservice before 2.3.0 a code injection of the project rebuildtimes statistics could be used by authorized attackers to execute shellcode.
CVE-2011-2767 4 Apache, Canonical, Debian and 1 more 7 Mod Perl, Ubuntu Linux, Debian Linux and 4 more 2024-11-21 10.0 HIGH 9.8 CRITICAL
mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.
CVE-2011-1830 1 Ekiga 1 Ekiga 2024-11-21 6.8 MEDIUM 5.7 MEDIUM
Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so.
CVE-2024-52434 1 Supsystic 1 Popup 2024-11-20 N/A 9.1 CRITICAL
Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Supsystic Popup by Supsystic allows Command Injection.This issue affects Popup by Supsystic: from n/a through 1.10.29.
CVE-2024-52427 1 Vollstart 1 Event Tickets With Ticket Scanner 2024-11-20 N/A 9.9 CRITICAL
Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Saso Nikolov Event Tickets with Ticket Scanner allows Server Side Include (SSI) Injection.This issue affects Event Tickets with Ticket Scanner: from n/a through 2.3.11.
CVE-2024-11240 1 Ibphoenix 1 Ibwebadmin 2024-11-20 4.0 MEDIUM 3.5 LOW
A vulnerability was found in IBPhoenix ibWebAdmin up to 1.0.2 and classified as problematic. This issue affects some unknown processing of the file /database.php of the component Banco de Dados Tab. The manipulation of the argument db_login_role leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.