An issue was discovered in tp5cms through 2017-05-25. admin.php/upload/picture.html allows remote attackers to execute arbitrary PHP code by uploading a .php file with the image/jpeg content type.
Max CVSS
9.8
EPSS Score
1.06%
Published
2018-11-29
Updated
2018-12-27
The Python CGI scripts in PWS in Imperva SecureSphere 13.0.10, 13.1.10, and 13.2.10 allow remote attackers to execute arbitrary OS commands because command-line arguments are mishandled.
Max CVSS
10.0
EPSS Score
0.28%
Published
2018-11-28
Updated
2019-02-04
PbootCMS V1.3.1 build 2018-11-14 allows remote attackers to execute arbitrary code via use of "eval" with mixed case, as demonstrated by an index.php/list/5/?current={pboot:if(evAl($_GET[a]))}1{/pboot:if}&a=phpinfo(); URI, because of an incorrect apps\home\controller\ParserController.php parserIfLabel protection mechanism.
Max CVSS
9.8
EPSS Score
4.02%
Published
2018-11-27
Updated
2019-04-17
BageCMS 3.1.3 has CSRF via upload/index.php?r=admini/admin/ownerUpdate to modify a user account.
Max CVSS
9.3
EPSS Score
0.09%
Published
2018-11-26
Updated
2018-12-31
CuppaCMS before 2018-11-12 has SQL Injection in administrator/classes/ajax/functions.php via the reference_id parameter.
Max CVSS
9.8
EPSS Score
0.15%
Published
2018-11-26
Updated
2018-12-18
An issue was discovered in arcms through 2018-03-19. SQL injection exists via the json/newslist limit parameter because of ctl/main/Json.php, ctl/main/service/Data.php, and comp/Db/Mysql.php.
Max CVSS
9.8
EPSS Score
0.21%
Published
2018-11-26
Updated
2018-12-19
An issue was discovered in arcms through 2018-03-19. No authentication is required for index/main, user/useradd, or img/images.
Max CVSS
9.8
EPSS Score
0.47%
Published
2018-11-26
Updated
2018-12-19
index.php?r=site%2Flogin in EduSec through 4.2.6 does not restrict sending a series of LoginForm[username] and LoginForm[password] parameters, which might make it easier for remote attackers to obtain access via a brute-force approach.
Max CVSS
9.8
EPSS Score
1.01%
Published
2018-11-26
Updated
2020-08-24
TP-Link Archer C5 devices through V2_160201_US allow remote command execution via shell metacharacters on the wan_dyn_hostname line of a configuration file that is encrypted with the 478DA50BF9E3D2CF key and uploaded through the web GUI by using the web admin account. The default password of admin may be used in some cases.
Max CVSS
9.0
EPSS Score
0.41%
Published
2018-11-26
Updated
2018-12-28
HTTL (aka Hyper-Text Template Language) through 1.0.11 allows remote command execution because the decodeXml function uses java.beans.XMLEncoder unsafely when configured without an xml.codec= setting.
Max CVSS
9.8
EPSS Score
1.01%
Published
2018-11-26
Updated
2018-12-19
HTTL (aka Hyper-Text Template Language) through 1.0.11 allows remote command execution because the decodeXml function uses XStream unsafely when configured with an xml.codec=httl.spi.codecs.XstreamCodec setting.
Max CVSS
9.8
EPSS Score
1.01%
Published
2018-11-26
Updated
2018-12-19
TP-Link TL-WR886N 7.0 1.1.0 devices allow remote attackers to cause a denial of service (Tlb Load Exception) via crafted DNS packets to port 53/udp.
Max CVSS
10.0
EPSS Score
0.69%
Published
2018-11-26
Updated
2018-12-19
Git before 2.19.2 on Linux and UNIX executes commands from the current working directory (as if '.' were at the end of $PATH) in certain cases involving the run_command() API and run-command.c, because there was a dangerous change from execvp to execv during 2017.
Max CVSS
9.8
EPSS Score
2.23%
Published
2018-11-23
Updated
2019-04-11
HuCart 5.7.4 has SQL injection in get_ip() in system/class/helper_class.php via the X-Forwarded-For HTTP header to the user/index.php?load=login&act=act_login URI.
Max CVSS
9.8
EPSS Score
0.21%
Published
2018-11-23
Updated
2018-12-19
An issue was discovered in the MQTT server in Contiki-NG before 4.2. The function parse_publish_vhdr() that parses MQTT PUBLISH messages with a variable length header uses memcpy to input data into a fixed size buffer. The allocated buffer can fit only MQTT_MAX_TOPIC_LENGTH (default 64) bytes, and a length check is missing. This could lead to Remote Code Execution via a stack-smashing attack (overwriting the function return address). Contiki-NG does not separate the MQTT server from other servers and the OS modules, so access to all memory regions is possible.
Max CVSS
10.0
EPSS Score
1.13%
Published
2018-11-21
Updated
2019-02-04
PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator).
Max CVSS
9.8
EPSS Score
0.29%
Published
2018-11-21
Updated
2019-10-03
An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used.
Max CVSS
9.8
EPSS Score
0.88%
Published
2018-11-21
Updated
2019-10-03
Portainer through 1.19.2 provides an API endpoint (/api/users/admin/check) to verify that the admin user is already created. This API endpoint will return 404 if admin was not created and 204 if it was already created. Attackers can set an admin password in the 404 case.
Max CVSS
9.8
EPSS Score
0.27%
Published
2018-11-20
Updated
2019-10-03
modules/orderfiles/ajax/upload.php in the Customer Files Upload addon 2018-08-01 for PrestaShop (1.5 through 1.7) allows remote attackers to execute arbitrary code by uploading a php file via modules/orderfiles/upload.php with auptype equal to product (for upload destinations under modules/productfiles), order (for upload destinations under modules/files), or cart (for upload destinations under modules/cartfiles).
Max CVSS
9.8
EPSS Score
1.28%
Published
2018-11-19
Updated
2020-06-02
pkg/sentry/kernel/shm/shm.go in Google gVisor before 2018-11-01 allows attackers to overwrite memory locations in processes running as root (but not escape the sandbox) via vectors involving IPC_RMID shmctl calls, because reference counting is mishandled.
Max CVSS
9.8
EPSS Score
0.31%
Published
2018-11-17
Updated
2020-08-24
LAOBANCMS 2.0 allows install/mysql_hy.php?riqi=../ Directory Traversal.
Max CVSS
9.8
EPSS Score
0.71%
Published
2018-11-17
Updated
2020-05-07
In modules/HELPBOT_MODULE in Budabot 0.6 through 4.0, lax syntax validation allows remote attackers to perform a command injection attack against the PHP daemon with a crafted command, resulting in a denial of service or possibly unspecified other impact, as demonstrated by the "!calc 5 x 5" command. In versions before 3.0, modules/HELPBOT_MODULE/calc.php has the vulnerable code; in 3.0 and above, modules/HELPBOT_MODULE/HelpbotController.class.php has the vulnerable code.
Max CVSS
9.8
EPSS Score
1.15%
Published
2018-11-30
Updated
2019-10-03
Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.27) allows SNMP trap SQL Injection.
Max CVSS
9.8
EPSS Score
0.20%
Published
2018-11-14
Updated
2019-07-30
An issue was discovered in LAOBANCMS 2.0. It allows a /install/mysql_hy.php?riqi=0&i=0 attack to reset the admin password, even if install.txt exists.
Max CVSS
9.8
EPSS Score
0.25%
Published
2018-11-12
Updated
2019-10-03
An issue was discovered in LAOBANCMS 2.0. It allows SQL Injection via the admin/login.php guanliyuan parameter.
Max CVSS
9.8
EPSS Score
0.15%
Published
2018-11-12
Updated
2018-12-11
195 vulnerabilities found
1 2 3 4 5 6 7 8
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!