Total
981 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-17521 | 1 Fontforge | 1 Fontforge | 2020-01-13 | 6.8 MEDIUM | 8.8 HIGH |
uiutil.c in FontForge through 20170731 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL, a different vulnerability than CVE-2017-17534. | |||||
CVE-2013-7070 | 1 Fibranet | 1 Monitorix | 2020-01-09 | 10.0 HIGH | 9.8 CRITICAL |
The handle_request function in lib/HTTPServer.pm in Monitorix before 3.3.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the URI. | |||||
CVE-2019-6034 | 1 Appleple | 1 A-blog Cms | 2020-01-08 | 4.3 MEDIUM | 6.1 MEDIUM |
a-blog cms versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x) allows arbitrary scripts to be executed in the context of the application due to unspecified vectors. | |||||
CVE-2013-4318 | 1 Feature Project | 1 Feature | 2020-01-02 | 3.5 LOW | 5.4 MEDIUM |
File injection vulnerability in Ruby gem Features 0.3.0 allows remote attackers to inject malicious html in the /tmp directory. | |||||
CVE-2019-8792 | 2 Apple, Google | 3 Iphone Os, Shazam, Android | 2019-12-23 | 6.8 MEDIUM | 8.8 HIGH |
An injection issue was addressed with improved validation. This issue is fixed in Shazam Android App Version 9.25.0, Shazam iOS App Version 12.11.0. Processing a maliciously crafted URL may lead to arbitrary javascript code execution. | |||||
CVE-2011-2717 | 2 Linux, Redhat | 2 Dhcp6c, Enterprise Linux | 2019-12-18 | 10.0 HIGH | 9.8 CRITICAL |
The DHCPv6 client (dhcp6c) as used in the dhcpv6 project through 2011-07-25 allows remote DHCP servers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message. | |||||
CVE-2013-2095 | 1 Openshift-origin-controller Project | 1 Openshift-origin-controller | 2019-12-17 | 7.5 HIGH | 9.8 CRITICAL |
rubygem-openshift-origin-controller: API can be used to create applications via cartridge_cache.rb URI.prase() to perform command injection | |||||
CVE-2019-16771 | 1 Linecorp | 1 Armeria | 2019-12-16 | 5.0 MEDIUM | 6.5 MEDIUM |
Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response. This vulnerability has been patched in 0.97.0. Potential impacts of this vulnerability include cross-user defacement, cache poisoning, Cross-site scripting (XSS), and page hijacking. | |||||
CVE-2017-1000052 | 1 Plug Project | 1 Plug | 2019-12-13 | 4.6 MEDIUM | 7.8 HIGH |
Elixir Plug before v1.0.4, v1.1.7, v1.2.3 and v1.3.2 is vulnerable to null byte injection in the Plug.Static component, which may allow users to bypass filetype restrictions. | |||||
CVE-2011-3624 | 1 Ruby-lang | 1 Ruby | 2019-12-11 | 5.0 MEDIUM | 5.3 MEDIUM |
Various methods in WEBrick::HTTPRequest in Ruby 1.9.2 and 1.8.7 and earlier do not validate the X-Forwarded-For, X-Forwarded-Host and X-Forwarded-Server headers in requests, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header. | |||||
CVE-2013-4486 | 2 Linux, Redhat | 2 Linux Kernel, Zanata | 2019-12-05 | 6.8 MEDIUM | 9.8 CRITICAL |
Zanata 3.0.0 through 3.1.2 has RCE due to EL interpolation in logging | |||||
CVE-2014-3700 | 1 Redhat | 2 Edeploy, Jboss Enterprise Web Server | 2019-11-27 | 7.5 HIGH | 9.8 CRITICAL |
eDeploy through at least 2014-10-14 has remote code execution due to eval() of untrusted data | |||||
CVE-2019-17068 | 2 Opensuse, Putty | 2 Leap, Putty | 2019-11-27 | 5.0 MEDIUM | 7.5 HIGH |
PuTTY before 0.73 mishandles the "bracketed paste mode" protection mechanism, which may allow a session to be affected by malicious clipboard content. | |||||
CVE-2019-4216 | 1 Ibm | 1 Smartcloud Analytics Log Analysis | 2019-11-25 | 4.9 MEDIUM | 4.6 MEDIUM |
IBM SmartCloud Analytics 1.3.1 through 1.3.5 is vulnerable to possible host header injection attack that could lead to HTTP cache poisoning or firewall bypass. IBM X-Force ID: 159187. | |||||
CVE-2019-8135 | 1 Magento | 1 Magento | 2019-11-07 | 7.5 HIGH | 9.8 CRITICAL |
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. Dependency injection through Symphony framework allows service identifiers to be derived from user controlled data, which can lead to remote code execution. | |||||
CVE-2019-18657 | 1 Yandex | 1 Clickhouse | 2019-11-06 | 5.0 MEDIUM | 5.3 MEDIUM |
ClickHouse before 19.13.5.44 allows HTTP header injection via the url table function. | |||||
CVE-2010-3668 | 1 Typo3 | 1 Typo3 | 2019-11-05 | 5.0 MEDIUM | 7.5 HIGH |
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows Header Injection in the secure download feature jumpurl. | |||||
CVE-2005-3056 | 1 Twiki | 1 Twiki | 2019-11-05 | 7.5 HIGH | 9.8 CRITICAL |
TWiki allows arbitrary shell command execution via the Include function | |||||
CVE-2011-2538 | 1 Cisco | 1 Telepresence Video Communication Server | 2019-11-01 | 9.0 HIGH | 7.2 HIGH |
Cisco Video Communications Server (VCS) before X7.0.3 contains a command injection vulnerability which allows remote, authenticated attackers to execute arbitrary commands. | |||||
CVE-2015-4075 | 1 Helpdeskpro | 1 Helpdesk Pro | 2019-10-16 | 6.8 MEDIUM | 8.1 HIGH |
The Helpdesk Pro plugin before 1.4.0 for Joomla! allows remote attackers to write to arbitrary .ini files via a crafted language.save task. |