Vulnerabilities (CVE)

Filtered by CWE-94
Total 4659 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-7494 2 Debian, Samba 2 Debian Linux, Samba 2025-04-20 10.0 HIGH 9.8 CRITICAL
Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.
CVE-2017-7411 1 Enalean 1 Tuleap 2025-04-20 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Enalean Tuleap 9.6 and prior versions. The vulnerability exists because the User::getRecentElements() method is using the unserialize() function with a preference value that can be arbitrarily manipulated by malicious users through the REST API interface, and this can be exploited to inject arbitrary PHP objects into the application scope, allowing an attacker to perform a variety of attacks (including but not limited to Remote Code Execution).
CVE-2017-14077 1 Phpcaptcha 1 Securimage 2025-04-20 4.3 MEDIUM 6.1 MEDIUM
HTML Injection in Securimage 3.6.4 and earlier allows remote attackers to inject arbitrary HTML into an e-mail message body via the $_SERVER['HTTP_USER_AGENT'] parameter to example_form.ajax.php or example_form.php.
CVE-2015-6576 1 Atlassian 1 Bamboo 2025-04-20 6.5 MEDIUM 8.8 HIGH
Bamboo 2.2 before 5.8.5 and 5.9.x before 5.9.7 allows remote attackers with access to the Bamboo web interface to execute arbitrary Java code via an unspecified resource.
CVE-2017-8759 1 Microsoft 11 .net Framework, Windows 10 1507, Windows 10 1511 and 8 more 2025-04-20 9.3 HIGH 7.8 HIGH
Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability."
CVE-2017-7911 1 Cybervision 1 Kaa Iot Platform 2025-04-20 6.5 MEDIUM 8.8 HIGH
A Code Injection issue was discovered in CyberVision Kaa IoT Platform, Version 0.7.4. An insufficient-encapsulation vulnerability has been identified, which may allow remote code execution.
CVE-2017-0899 3 Debian, Redhat, Rubygems 8 Debian Linux, Enterprise Linux Desktop, Enterprise Linux Server and 5 more 2025-04-20 7.5 HIGH 9.8 CRITICAL
RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.
CVE-2017-1469 1 Ibm 1 Infosphere Information Server 2025-04-20 4.6 MEDIUM 7.8 HIGH
IBM InfoSphere Information Server 9.1, 11.3, and 11.5 could allow a local user to gain elevated privileges by placing arbitrary files in installation directories. IBM X-Force ID: 128468.
CVE-2017-8912 1 Cmsmadesimple 1 Cms Made Simple 2025-04-20 6.5 MEDIUM 7.2 HIGH
CMS Made Simple (CMSMS) 2.1.6 allows remote authenticated administrators to execute arbitrary PHP code via the code parameter to admin/editusertag.php, related to the CreateTagFunction and CallUserTag functions. NOTE: the vendor reportedly has stated this is "a feature, not a bug.
CVE-2017-10844 1 Basercms 1 Basercms 2025-04-20 6.5 MEDIUM 8.8 HIGH
baserCMS 3.0.14 and earlier, 4.0.5 and earlier allows an attacker to execute arbitrary PHP code on the server via unspecified vectors.
CVE-2017-5543 1 Intelliants 1 Subrion 2025-04-20 7.5 HIGH 9.8 CRITICAL
includes/classes/ia.core.users.php in Subrion CMS 4.0.5 allows remote attackers to conduct PHP Object Injection attacks via crafted serialized data in a salt cookie in a login request.
CVE-2017-10968 1 Finecms Project 1 Finecms 2025-04-20 7.5 HIGH 9.8 CRITICAL
In FineCMS through 2017-07-07, application\core\controller\template.php allows remote PHP code execution by placing the code after "<?php" in a route=template request.
CVE-2017-2968 1 Adobe 1 Campaign 2025-04-20 7.5 HIGH 9.1 CRITICAL
Adobe Campaign versions 16.4 Build 8724 and earlier have a code injection vulnerability.
CVE-2015-8351 1 Gwolle Guestbook Project 1 Gwolle Guestbook 2025-04-20 6.8 MEDIUM 9.0 CRITICAL
PHP remote file inclusion vulnerability in the Gwolle Guestbook plugin before 1.5.4 for WordPress, when allow_url_include is enabled, allows remote authenticated users to execute arbitrary PHP code via a URL in the abspath parameter to frontend/captcha/ajaxresponse.php. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences regardless of whether allow_url_include is enabled.
CVE-2017-7321 1 Modx 1 Modx Revolution 2025-04-20 7.5 HIGH 9.8 CRITICAL
setup/controllers/welcome.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the config_key parameter to the setup/index.php?action=welcome URI.
CVE-2017-9771 1 Websitebaker 1 Websitebaker 2025-04-20 7.5 HIGH 9.8 CRITICAL
install\save.php in WebsiteBaker v2.10.0 allows remote attackers to execute arbitrary PHP code via the database_username, database_host, or database_password parameter.
CVE-2017-16682 1 Sap 2 Business Application Software Integrated Solution, Netweaver Internet Transaction Server 2025-04-20 6.5 MEDIUM 7.2 HIGH
SAP NetWeaver Internet Transaction Server (ITS), SAP Basis from 7.00 to 7.02, 7.30, 7.31, 7.40, from 7.50 to 7.52, allows an attacker with administrator credentials to inject code that can be executed by the application and thereby control the behavior of the application.
CVE-2015-9227 1 Alegrocart 1 Alegrocart 2025-04-20 6.5 MEDIUM 7.2 HIGH
PHP remote file inclusion vulnerability in the get_file function in upload/admin2/controller/report_logs.php in AlegroCart 1.2.8 allows remote administrators to execute arbitrary PHP code via a URL in the file_path parameter to upload/admin2.
CVE-2017-1000196 1 Octobercms 1 October 2025-04-20 7.5 HIGH 9.8 CRITICAL
October CMS build 412 is vulnerable to PHP code execution in the asset manager functionality resulting in site compromise and possibly other applications on the server.
CVE-2017-7694 1 Getsymphony 1 Symphony 2025-04-20 6.5 MEDIUM 8.8 HIGH
Remote Code Execution vulnerability in symphony/content/content.blueprintsdatasources.php in Symphony CMS through 2.6.11 allows remote attackers to execute code and get a webshell from the back-end. The attacker must be authenticated and enter PHP code in the datasource editor or event editor.