Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2005-1921

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-01 Jul, 2005 | 04:00
Updated At-07 Aug, 2024 | 22:06
Rejected At-
Credits

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:01 Jul, 2005 | 04:00
Updated At:07 Aug, 2024 | 22:06
Rejected At:
▼CVE Numbering Authority (CNA)

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350
vdb-entry
signature
x_refsource_OVAL
http://www.debian.org/security/2005/dsa-789
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/15947
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/15852
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/15944
third-party-advisory
x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2005_18_sr.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/15883
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/15872
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/15895
third-party-advisory
x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294
vdb-entry
signature
x_refsource_OVAL
http://securitytracker.com/id?1015336
vdb-entry
x_refsource_SECTRACK
http://www.debian.org/security/2005/dsa-746
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/17674
third-party-advisory
x_refsource_SECUNIA
http://www.gulftech.org/?node=research&article_id=00087-07012005
x_refsource_MISC
http://www.vupen.com/english/advisories/2005/2827
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/15917
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2005/dsa-747
vendor-advisory
x_refsource_DEBIAN
http://www.novell.com/linux/security/advisories/2005_41_php_pear.html
vendor-advisory
x_refsource_SUSE
http://www.hardened-php.net/advisory-022005.php
x_refsource_MISC
http://www.securityfocus.com/archive/1/419064/100/0/threaded
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=112605112027335&w=2
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/15957
third-party-advisory
x_refsource_SECUNIA
http://www.ampache.org/announce/3_3_1_2.php
x_refsource_CONFIRM
http://secunia.com/advisories/15810
third-party-advisory
x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200507-01.xml
vendor-advisory
x_refsource_GENTOO
http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt
x_refsource_CONFIRM
http://www.securityfocus.com/bid/14088
vdb-entry
x_refsource_BID
http://secunia.com/advisories/16693
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=112008638320145&w=2
mailing-list
x_refsource_BUGTRAQ
http://marc.info/?l=bugtraq&m=112015336720867&w=2
mailing-list
x_refsource_BUGTRAQ
http://security.gentoo.org/glsa/glsa-200507-07.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/15904
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/15903
third-party-advisory
x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2005_49_php.html
vendor-advisory
x_refsource_SUSE
http://sourceforge.net/project/shownotes.php?release_id=338803
x_refsource_CONFIRM
http://secunia.com/advisories/17440
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/15922
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/15884
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/15916
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2005-564.html
vendor-advisory
x_refsource_REDHAT
http://pear.php.net/package/XML_RPC/download/1.3.1
x_refsource_MISC
http://secunia.com/advisories/16001
third-party-advisory
x_refsource_SECUNIA
http://sourceforge.net/project/showfiles.php?group_id=87163
x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDKSA-2005:109
vendor-advisory
x_refsource_MANDRAKE
http://security.gentoo.org/glsa/glsa-200507-06.xml
vendor-advisory
x_refsource_GENTOO
http://www.debian.org/security/2005/dsa-745
vendor-advisory
x_refsource_DEBIAN
http://www.securityfocus.com/archive/1/419064/100/0/threaded
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/15855
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/16339
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/18003
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/15861
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.debian.org/security/2005/dsa-789
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/15947
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/15852
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/15944
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.novell.com/linux/security/advisories/2005_18_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/15883
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/15872
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/15895
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://securitytracker.com/id?1015336
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.debian.org/security/2005/dsa-746
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/17674
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.gulftech.org/?node=research&article_id=00087-07012005
Resource:
x_refsource_MISC
Hyperlink: http://www.vupen.com/english/advisories/2005/2827
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/15917
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2005/dsa-747
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.novell.com/linux/security/advisories/2005_41_php_pear.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.hardened-php.net/advisory-022005.php
Resource:
x_refsource_MISC
Hyperlink: http://www.securityfocus.com/archive/1/419064/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=112605112027335&w=2
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/15957
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ampache.org/announce/3_3_1_2.php
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/15810
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://security.gentoo.org/glsa/glsa-200507-01.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/14088
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://secunia.com/advisories/16693
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=112008638320145&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://marc.info/?l=bugtraq&m=112015336720867&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://security.gentoo.org/glsa/glsa-200507-07.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/15904
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/15903
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.novell.com/linux/security/advisories/2005_49_php.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=338803
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/17440
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/15922
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/15884
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/15916
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-564.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://pear.php.net/package/XML_RPC/download/1.3.1
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/16001
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sourceforge.net/project/showfiles.php?group_id=87163
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2005:109
Resource:
vendor-advisory
x_refsource_MANDRAKE
Hyperlink: http://security.gentoo.org/glsa/glsa-200507-06.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.debian.org/security/2005/dsa-745
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.securityfocus.com/archive/1/419064/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/15855
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/16339
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/18003
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/15861
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.debian.org/security/2005/dsa-789
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/15947
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/15852
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/15944
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.novell.com/linux/security/advisories/2005_18_sr.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/15883
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/15872
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/15895
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://securitytracker.com/id?1015336
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.debian.org/security/2005/dsa-746
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/17674
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.gulftech.org/?node=research&article_id=00087-07012005
x_refsource_MISC
x_transferred
http://www.vupen.com/english/advisories/2005/2827
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/15917
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2005/dsa-747
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.novell.com/linux/security/advisories/2005_41_php_pear.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.hardened-php.net/advisory-022005.php
x_refsource_MISC
x_transferred
http://www.securityfocus.com/archive/1/419064/100/0/threaded
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=112605112027335&w=2
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/15957
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ampache.org/announce/3_3_1_2.php
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/15810
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://security.gentoo.org/glsa/glsa-200507-01.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/14088
vdb-entry
x_refsource_BID
x_transferred
http://secunia.com/advisories/16693
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=112008638320145&w=2
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://marc.info/?l=bugtraq&m=112015336720867&w=2
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://security.gentoo.org/glsa/glsa-200507-07.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/15904
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/15903
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.novell.com/linux/security/advisories/2005_49_php.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://sourceforge.net/project/shownotes.php?release_id=338803
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/17440
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/15922
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/15884
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/15916
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2005-564.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://pear.php.net/package/XML_RPC/download/1.3.1
x_refsource_MISC
x_transferred
http://secunia.com/advisories/16001
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sourceforge.net/project/showfiles.php?group_id=87163
x_refsource_CONFIRM
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2005:109
vendor-advisory
x_refsource_MANDRAKE
x_transferred
http://security.gentoo.org/glsa/glsa-200507-06.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.debian.org/security/2005/dsa-745
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.securityfocus.com/archive/1/419064/100/0/threaded
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/15855
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/16339
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/18003
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/15861
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.debian.org/security/2005/dsa-789
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/15947
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/15852
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/15944
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2005_18_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/15883
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/15872
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/15895
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://securitytracker.com/id?1015336
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.debian.org/security/2005/dsa-746
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/17674
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.gulftech.org/?node=research&article_id=00087-07012005
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2005/2827
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/15917
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2005/dsa-747
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2005_41_php_pear.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.hardened-php.net/advisory-022005.php
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/419064/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=112605112027335&w=2
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/15957
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ampache.org/announce/3_3_1_2.php
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/15810
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200507-01.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/14088
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://secunia.com/advisories/16693
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=112008638320145&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=112015336720867&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200507-07.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/15904
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/15903
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2005_49_php.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=338803
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/17440
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/15922
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/15884
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/15916
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-564.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://pear.php.net/package/XML_RPC/download/1.3.1
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/16001
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sourceforge.net/project/showfiles.php?group_id=87163
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2005:109
Resource:
vendor-advisory
x_refsource_MANDRAKE
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200507-06.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.debian.org/security/2005/dsa-745
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/419064/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/15855
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/16339
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/18003
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/15861
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:05 Jul, 2005 | 04:00
Updated At:03 Apr, 2025 | 01:03

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

The PHP Group
php
>>xml_rpc>>Versions up to 1.3.0(inclusive)
cpe:2.3:a:php:xml_rpc:*:*:*:*:*:pear:*:*
gggeek
gggeek
>>phpxmlrpc>>Versions up to 1.1(inclusive)
cpe:2.3:a:gggeek:phpxmlrpc:*:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>Versions before 4.5.4(exclusive)
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>Versions from 4.6.0(inclusive) to 4.6.2(exclusive)
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
tiki
tiki
>>tikiwiki_cms\/groupware>>Versions before 1.8.5(exclusive)
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>3.1
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Primarynvd@nist.gov
CWE ID: CWE-94
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://marc.info/?l=bugtraq&m=112008638320145&w=2secalert@redhat.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=112015336720867&w=2secalert@redhat.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=112605112027335&w=2secalert@redhat.com
Third Party Advisory
http://pear.php.net/package/XML_RPC/download/1.3.1secalert@redhat.com
Patch
Product
http://secunia.com/advisories/15810secalert@redhat.com
Broken Link
http://secunia.com/advisories/15852secalert@redhat.com
Broken Link
http://secunia.com/advisories/15855secalert@redhat.com
Broken Link
http://secunia.com/advisories/15861secalert@redhat.com
Broken Link
http://secunia.com/advisories/15872secalert@redhat.com
Broken Link
http://secunia.com/advisories/15883secalert@redhat.com
Broken Link
http://secunia.com/advisories/15884secalert@redhat.com
Broken Link
http://secunia.com/advisories/15895secalert@redhat.com
Broken Link
http://secunia.com/advisories/15903secalert@redhat.com
Broken Link
http://secunia.com/advisories/15904secalert@redhat.com
Broken Link
http://secunia.com/advisories/15916secalert@redhat.com
Broken Link
http://secunia.com/advisories/15917secalert@redhat.com
Broken Link
http://secunia.com/advisories/15922secalert@redhat.com
Broken Link
http://secunia.com/advisories/15944secalert@redhat.com
Broken Link
http://secunia.com/advisories/15947secalert@redhat.com
Broken Link
http://secunia.com/advisories/15957secalert@redhat.com
Broken Link
http://secunia.com/advisories/16001secalert@redhat.com
Broken Link
http://secunia.com/advisories/16339secalert@redhat.com
Broken Link
http://secunia.com/advisories/16693secalert@redhat.com
Broken Link
http://secunia.com/advisories/17440secalert@redhat.com
Broken Link
http://secunia.com/advisories/17674secalert@redhat.com
Broken Link
http://secunia.com/advisories/18003secalert@redhat.com
Broken Link
http://security.gentoo.org/glsa/glsa-200507-01.xmlsecalert@redhat.com
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200507-06.xmlsecalert@redhat.com
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200507-07.xmlsecalert@redhat.com
Third Party Advisory
http://securitytracker.com/id?1015336secalert@redhat.com
Broken Link
Third Party Advisory
VDB Entry
http://sourceforge.net/project/showfiles.php?group_id=87163secalert@redhat.com
Product
http://sourceforge.net/project/shownotes.php?release_id=338803secalert@redhat.com
Broken Link
http://www.ampache.org/announce/3_3_1_2.phpsecalert@redhat.com
Broken Link
http://www.debian.org/security/2005/dsa-745secalert@redhat.com
Mailing List
Third Party Advisory
http://www.debian.org/security/2005/dsa-746secalert@redhat.com
Mailing List
Third Party Advisory
http://www.debian.org/security/2005/dsa-747secalert@redhat.com
Mailing List
Third Party Advisory
http://www.debian.org/security/2005/dsa-789secalert@redhat.com
Mailing List
Third Party Advisory
http://www.drupal.org/security/drupal-sa-2005-003/advisory.txtsecalert@redhat.com
Third Party Advisory
http://www.gulftech.org/?node=research&article_id=00087-07012005secalert@redhat.com
Not Applicable
Vendor Advisory
http://www.hardened-php.net/advisory-022005.phpsecalert@redhat.com
Not Applicable
http://www.mandriva.com/security/advisories?name=MDKSA-2005:109secalert@redhat.com
Patch
Third Party Advisory
Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_18_sr.htmlsecalert@redhat.com
Broken Link
http://www.novell.com/linux/security/advisories/2005_41_php_pear.htmlsecalert@redhat.com
Broken Link
http://www.novell.com/linux/security/advisories/2005_49_php.htmlsecalert@redhat.com
Broken Link
http://www.redhat.com/support/errata/RHSA-2005-564.htmlsecalert@redhat.com
Broken Link
http://www.securityfocus.com/archive/1/419064/100/0/threadedsecalert@redhat.com
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/419064/100/0/threadedsecalert@redhat.com
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/14088secalert@redhat.com
Broken Link
Third Party Advisory
VDB Entry
http://www.vupen.com/english/advisories/2005/2827secalert@redhat.com
Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294secalert@redhat.com
Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350secalert@redhat.com
Broken Link
http://marc.info/?l=bugtraq&m=112008638320145&w=2af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=112015336720867&w=2af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=112605112027335&w=2af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://pear.php.net/package/XML_RPC/download/1.3.1af854a3a-2127-422b-91ae-364da2661108
Patch
Product
http://secunia.com/advisories/15810af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15852af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15855af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15861af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15872af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15883af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15884af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15895af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15903af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15904af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15916af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15917af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15922af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15944af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15947af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15957af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/16001af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/16339af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/16693af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17440af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17674af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/18003af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://security.gentoo.org/glsa/glsa-200507-01.xmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200507-06.xmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200507-07.xmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1015336af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://sourceforge.net/project/showfiles.php?group_id=87163af854a3a-2127-422b-91ae-364da2661108
Product
http://sourceforge.net/project/shownotes.php?release_id=338803af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.ampache.org/announce/3_3_1_2.phpaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.debian.org/security/2005/dsa-745af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://www.debian.org/security/2005/dsa-746af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://www.debian.org/security/2005/dsa-747af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://www.debian.org/security/2005/dsa-789af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://www.drupal.org/security/drupal-sa-2005-003/advisory.txtaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.gulftech.org/?node=research&article_id=00087-07012005af854a3a-2127-422b-91ae-364da2661108
Not Applicable
Vendor Advisory
http://www.hardened-php.net/advisory-022005.phpaf854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://www.mandriva.com/security/advisories?name=MDKSA-2005:109af854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_18_sr.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.novell.com/linux/security/advisories/2005_41_php_pear.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.novell.com/linux/security/advisories/2005_49_php.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2005-564.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/419064/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/419064/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/14088af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.vupen.com/english/advisories/2005/2827af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350af854a3a-2127-422b-91ae-364da2661108
Broken Link
Hyperlink: http://marc.info/?l=bugtraq&m=112008638320145&w=2
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=112015336720867&w=2
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=112605112027335&w=2
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://pear.php.net/package/XML_RPC/download/1.3.1
Source: secalert@redhat.com
Resource:
Patch
Product
Hyperlink: http://secunia.com/advisories/15810
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15852
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15855
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15861
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15872
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15883
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15884
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15895
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15903
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15904
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15916
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15917
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15922
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15944
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15947
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15957
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/16001
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/16339
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/16693
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17440
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17674
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/18003
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://security.gentoo.org/glsa/glsa-200507-01.xml
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-200507-06.xml
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-200507-07.xml
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://securitytracker.com/id?1015336
Source: secalert@redhat.com
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://sourceforge.net/project/showfiles.php?group_id=87163
Source: secalert@redhat.com
Resource:
Product
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=338803
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.ampache.org/announce/3_3_1_2.php
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.debian.org/security/2005/dsa-745
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.debian.org/security/2005/dsa-746
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.debian.org/security/2005/dsa-747
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.debian.org/security/2005/dsa-789
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.gulftech.org/?node=research&article_id=00087-07012005
Source: secalert@redhat.com
Resource:
Not Applicable
Vendor Advisory
Hyperlink: http://www.hardened-php.net/advisory-022005.php
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2005:109
Source: secalert@redhat.com
Resource:
Patch
Third Party Advisory
Vendor Advisory
Hyperlink: http://www.novell.com/linux/security/advisories/2005_18_sr.html
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.novell.com/linux/security/advisories/2005_41_php_pear.html
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.novell.com/linux/security/advisories/2005_49_php.html
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-564.html
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.securityfocus.com/archive/1/419064/100/0/threaded
Source: secalert@redhat.com
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/archive/1/419064/100/0/threaded
Source: secalert@redhat.com
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/14088
Source: secalert@redhat.com
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.vupen.com/english/advisories/2005/2827
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://marc.info/?l=bugtraq&m=112008638320145&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=112015336720867&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=112605112027335&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://pear.php.net/package/XML_RPC/download/1.3.1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Product
Hyperlink: http://secunia.com/advisories/15810
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15852
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15855
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15861
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15872
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15883
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15884
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15895
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15903
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15904
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15916
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15917
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15922
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15944
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15947
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/15957
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/16001
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/16339
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/16693
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17440
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17674
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/18003
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://security.gentoo.org/glsa/glsa-200507-01.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-200507-06.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-200507-07.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://securitytracker.com/id?1015336
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://sourceforge.net/project/showfiles.php?group_id=87163
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=338803
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.ampache.org/announce/3_3_1_2.php
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.debian.org/security/2005/dsa-745
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.debian.org/security/2005/dsa-746
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.debian.org/security/2005/dsa-747
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.debian.org/security/2005/dsa-789
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.gulftech.org/?node=research&article_id=00087-07012005
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Vendor Advisory
Hyperlink: http://www.hardened-php.net/advisory-022005.php
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2005:109
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
Vendor Advisory
Hyperlink: http://www.novell.com/linux/security/advisories/2005_18_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.novell.com/linux/security/advisories/2005_41_php_pear.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.novell.com/linux/security/advisories/2005_49_php.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-564.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.securityfocus.com/archive/1/419064/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/archive/1/419064/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/14088
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.vupen.com/english/advisories/2005/2827
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link

Change History

0
Information is not available yet

Similar CVEs

2085Records found

CVE-2014-1716
Matching Score-10
Assigner-Chrome
ShareView Details
Matching Score-10
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-1.07% / 76.80%
||
7 Day CHG~0.00%
Published-09 Apr, 2014 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the Runtime_SetPrototype function in runtime.cc in Google V8, as used in Google Chrome before 34.0.1847.116, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)."

Action-Not Available
Vendor-n/aGoogle LLCDebian GNU/LinuxopenSUSE
Product-debian_linuxopensusechromen/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2021-26120
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-78.84% / 99.01%
||
7 Day CHG~0.00%
Published-22 Feb, 2021 | 01:38
Updated-03 Aug, 2024 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring.

Action-Not Available
Vendor-smartyn/aDebian GNU/Linux
Product-smartydebian_linuxn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2021-25283
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-7.44% / 91.37%
||
7 Day CHG~0.00%
Published-27 Feb, 2021 | 00:00
Updated-03 Aug, 2024 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks.

Action-Not Available
Vendor-saltstackn/aDebian GNU/LinuxFedora Project
Product-debian_linuxfedorasaltn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2006-0144
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.46% / 80.02%
||
7 Day CHG~0.00%
Published-09 Jan, 2006 | 23:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The proxy server feature in go-pear.php in PHP PEAR 0.2.2, as used in Apache2Triad, allows remote attackers to execute arbitrary PHP code by redirecting go-pear.php to a malicious proxy server that provides a modified version of Tar.php with a malicious extractModify function.

Action-Not Available
Vendor-apache2triadn/aThe PHP Group
Product-pearapache2triadn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2020-8518
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-84.86% / 99.29%
||
7 Day CHG~0.00%
Published-17 Feb, 2020 | 14:53
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Horde Groupware Webmail Edition 5.2.22 allows injection of arbitrary PHP code via CSV data, leading to remote code execution.

Action-Not Available
Vendor-n/aFedora ProjectHorde LLCDebian GNU/Linux
Product-groupwaredebian_linuxfedoran/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2005-2498
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-4.69% / 88.91%
||
7 Day CHG~0.00%
Published-15 Aug, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Eval injection vulnerability in PHPXMLRPC 1.1.1 and earlier (PEAR XML-RPC for PHP), as used in multiple products including (1) Drupal, (2) phpAdsNew, (3) phpPgAds, and (4) phpgroupware, allows remote attackers to execute arbitrary PHP code via certain nested XML tags in a PHP document that should not be nested, which are injected into an eval function call, a different vulnerability than CVE-2005-1921.

Action-Not Available
Vendor-gggeekn/aDebian GNU/Linux
Product-phpxmlrpcdebian_linuxn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2005-3302
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.3||HIGH
EPSS-4.91% / 89.19%
||
7 Day CHG~0.00%
Published-24 Oct, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Eval injection vulnerability in bvh_import.py in Blender 2.36 allows attackers to execute arbitrary Python code via a hierarchy element in a .bvh file, which is supplied to an eval function call.

Action-Not Available
Vendor-n/aDebian GNU/LinuxBlender Foundation
Product-blenderdebian_linuxn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2004-1926
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.83% / 87.68%
||
7 Day CHG~0.00%
Published-10 May, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allows remote attackers to inject arbitrary code via the (1) Theme, (2) Country, (3) Real Name, or (4) Displayed time zone fields in a User Profile, or the (5) Name, (6) Description, (7) URL, or (8) Country fields in a Directory/Add Site operation.

Action-Not Available
Vendor-tikin/a
Product-tikiwiki_cms\/groupwaren/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2018-7602
Matching Score-10
Assigner-Drupal.org
ShareView Details
Matching Score-10
Assigner-Drupal.org
CVSS Score-9.8||CRITICAL
EPSS-94.19% / 99.91%
||
7 Day CHG~0.00%
Published-19 Jul, 2018 | 17:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-05-04||Apply updates per vendor instructions.
Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-004

A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild.

Action-Not Available
Vendor-The Drupal AssociationDebian GNU/Linux
Product-drupaldebian_linuxcoreCore
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2022-23614
Matching Score-10
Assigner-GitHub, Inc.
ShareView Details
Matching Score-10
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-43.12% / 97.40%
||
7 Day CHG~0.00%
Published-04 Feb, 2022 | 22:25
Updated-23 Apr, 2025 | 19:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Code injection in Twig

Twig is an open source template language for PHP. When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions. In affected versions this constraint was not properly enforced and could lead to code injection of arbitrary PHP code. Patched versions now disallow calling non Closure in the `sort` filter as is the case for some other filters. Users are advised to upgrade.

Action-Not Available
Vendor-symfonytwigphpFedora ProjectDebian GNU/Linux
Product-debian_linuxtwigfedoraTwig
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2011-3379
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-1.35% / 79.32%
||
7 Day CHG~0.00%
Published-03 Nov, 2011 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2020-15227
Matching Score-10
Assigner-GitHub, Inc.
ShareView Details
Matching Score-10
Assigner-GitHub, Inc.
CVSS Score-8.7||HIGH
EPSS-93.79% / 99.85%
||
7 Day CHG~0.00%
Published-01 Oct, 2020 | 19:00
Updated-04 Aug, 2024 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Remote Code Execution vulnerability

Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework.

Action-Not Available
Vendor-nettenetteDebian GNU/Linux
Product-applicationdebian_linuxapplication
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2010-1868
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.84% / 73.75%
||
7 Day CHG~0.00%
Published-07 May, 2010 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) sqlite_single_query and (2) sqlite_array_query functions in ext/sqlite/sqlite.c in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to execute arbitrary code by calling these functions with an empty SQL query, which triggers access of uninitialized memory.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2018-13043
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.28% / 78.71%
||
7 Day CHG~0.00%
Published-01 Jul, 2018 | 22:00
Updated-05 Aug, 2024 | 08:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

scripts/grep-excuses.pl in Debian devscripts through 2.18.3 allows code execution through unsafe YAML loading because YAML::Syck is used without a configuration that prevents unintended blessing.

Action-Not Available
Vendor-n/aCanonical Ltd.Debian GNU/Linux
Product-devscriptsubuntu_linuxn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2019-9848
Matching Score-10
Assigner-Document Foundation, The
ShareView Details
Matching Score-10
Assigner-Document Foundation, The
CVSS Score-9.8||CRITICAL
EPSS-85.07% / 99.30%
||
7 Day CHG~0.00%
Published-17 Jul, 2019 | 11:21
Updated-16 Sep, 2024 | 22:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LibreOffice has a feature where documents can specify that pre-installed scripts can be executed on various document events such as mouse-over, etc. LibreOffice is typically also bundled with LibreLogo, a programmable turtle vector graphics script, which can be manipulated into executing arbitrary python commands. By using the document event feature to trigger LibreLogo to execute python contained within a document a malicious document could be constructed which would execute arbitrary python commands silently without warning. In the fixed versions, LibreLogo cannot be called from a document event handler. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.

Action-Not Available
Vendor-libreofficeDocument FoundationCanonical Ltd.openSUSEFedora ProjectDebian GNU/Linux
Product-ubuntu_linuxdebian_linuxfedoralibreofficeleapLibreOffice
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2018-1270
Matching Score-10
Assigner-Dell
ShareView Details
Matching Score-10
Assigner-Dell
CVSS Score-9.8||CRITICAL
EPSS-88.67% / 99.48%
||
7 Day CHG~0.00%
Published-06 Apr, 2018 | 13:00
Updated-16 Sep, 2024 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.

Action-Not Available
Vendor-VMware (Broadcom Inc.)Red Hat, Inc.Oracle CorporationDebian GNU/Linux
Product-communications_diameter_signaling_routerinsurance_rules_paletteretail_central_officetape_library_acslsretail_back_officeretail_customer_insightsprimavera_gatewayretail_integration_busretail_returns_managementfuseretail_point-of-salehealthcare_master_person_indexcommunications_performance_intelligence_centerspring_frameworkservice_architecture_leveraging_tuxedodebian_linuxapplication_testing_suitehealth_sciences_information_managerretail_order_brokercommunications_converged_application_servergoldengate_for_big_dataretail_xstore_point_of_servicebig_data_discoveryinsurance_calculation_engineretail_open_commerce_platformenterprise_manager_ops_centercommunications_services_gatekeeperretail_predictive_application_serverSpring Framework
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-358
Improperly Implemented Security Check for Standard
CVE-2018-11780
Matching Score-10
Assigner-Apache Software Foundation
ShareView Details
Matching Score-10
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-9.34% / 92.44%
||
7 Day CHG~0.00%
Published-17 Sep, 2018 | 14:00
Updated-16 Sep, 2024 | 20:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential Remote Code Execution bug exists with the PDFInfo plugin in Apache SpamAssassin before 3.4.2.

Action-Not Available
Vendor-pdfinfo_projectCanonical Ltd.The Apache Software FoundationDebian GNU/Linux
Product-ubuntu_linuxpdfinfodebian_linuxspamassassinApache SpamAssassin
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2009-1151
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-93.03% / 99.77%
||
7 Day CHG~0.00%
Published-26 Mar, 2009 | 14:00
Updated-30 Jul, 2025 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-15||Apply updates per vendor instructions.

Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.

Action-Not Available
Vendor-n/aphpMyAdminDebian GNU/Linux
Product-debian_linuxphpmyadminn/aphpMyAdmin
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2016-7966
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.3||HIGH
EPSS-0.18% / 40.40%
||
7 Day CHG~0.00%
Published-23 Dec, 2016 | 22:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.

Action-Not Available
Vendor-n/aSUSEFedora ProjectDebian GNU/LinuxKDE
Product-kmaildebian_linuxfedoralinux_enterprisen/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2016-3153
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.24% / 78.37%
||
7 Day CHG~0.00%
Published-08 Apr, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SPIP 2.x before 2.1.19, 3.0.x before 3.0.22, and 3.1.x before 3.1.1 allows remote attackers to execute arbitrary PHP code by adding content, related to the filtrer_entites function.

Action-Not Available
Vendor-spipn/aDebian GNU/Linux
Product-debian_linuxspipn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2008-2772
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.62% / 69.02%
||
7 Day CHG~0.00%
Published-18 Jun, 2008 | 22:00
Updated-07 Aug, 2024 | 09:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Magic Tabs module 5.x before 5.x-1.1 for Drupal allows remote attackers to execute arbitrary PHP code via unspecified URL arguments, possibly related to a missing "whitelist of callbacks."

Action-Not Available
Vendor-n/aThe Drupal Association
Product-magic_tabs_modulen/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2007-5423
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-88.23% / 99.46%
||
7 Day CHG~0.00%
Published-12 Oct, 2007 | 23:00
Updated-07 Aug, 2024 | 15:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

tiki-graph_formula.php in TikiWiki 1.9.8 allows remote attackers to execute arbitrary code via PHP sequences in the f array parameter, which are processed by create_function.

Action-Not Available
Vendor-tikin/a
Product-tikiwiki_cms\/groupwaren/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2007-4596
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-6.56% / 90.76%
||
7 Day CHG~0.00%
Published-30 Aug, 2007 | 17:00
Updated-07 Aug, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The perl extension in PHP does not follow safe_mode restrictions, which allows context-dependent attackers to execute arbitrary code via the Perl eval function. NOTE: this might only be a vulnerability in limited environments.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2017-0899
Matching Score-10
Assigner-HackerOne
ShareView Details
Matching Score-10
Assigner-HackerOne
CVSS Score-9.8||CRITICAL
EPSS-9.67% / 92.59%
||
7 Day CHG~0.00%
Published-31 Aug, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.

Action-Not Available
Vendor-rubygemsDebian GNU/LinuxHackerOneRed Hat, Inc.
Product-enterprise_linux_desktopenterprise_linux_server_tusenterprise_linux_workstationrubygemsenterprise_linux_server_eusdebian_linuxenterprise_linux_serverenterprise_linux_server_ausRubyGems
CWE ID-CWE-150
Improper Neutralization of Escape, Meta, or Control Sequences
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2007-3294
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-5.33% / 89.66%
||
7 Day CHG~0.00%
Published-20 Jun, 2007 | 21:00
Updated-07 Aug, 2024 | 14:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function. NOTE: this might only be an issue in environments where vsnprintf is implemented as a wrapper for vsprintf.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-3464
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-9.8||CRITICAL
EPSS-7.79% / 91.58%
||
7 Day CHG~0.00%
Published-06 Feb, 2019 | 19:00
Updated-17 Sep, 2024 | 04:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.

Action-Not Available
Vendor-pizzashackCanonical Ltd.Fedora ProjectDebian GNU/Linux
Product-debian_linuxubuntu_linuxfedorarsshrssh
CWE ID-CWE-665
Improper Initialization
CVE-2019-3822
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.1||HIGH
EPSS-30.92% / 96.57%
||
7 Day CHG~0.00%
Published-06 Feb, 2019 | 20:00
Updated-04 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large 'nt response' data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a 'large value' needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header.

Action-Not Available
Vendor-NetApp, Inc.Debian GNU/LinuxOracle CorporationRed Hat, Inc.Canonical Ltd.Siemens AGCURL
Product-libcurlubuntu_linuxcommunications_operations_monitoroncommand_insightenterprise_linuxactive_iq_unified_managerservices_tools_bundleoncommand_workflow_automationsnapcenterhttp_serverclustered_data_ontapdebian_linuxsecure_global_desktopsinema_remote_connect_cliententerprise_manager_ops_centermysql_servercurl
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-3463
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-9.8||CRITICAL
EPSS-8.55% / 92.02%
||
7 Day CHG~0.00%
Published-06 Feb, 2019 | 19:00
Updated-17 Sep, 2024 | 01:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.

Action-Not Available
Vendor-pizzashackCanonical Ltd.Fedora ProjectDebian GNU/Linux
Product-debian_linuxubuntu_linuxfedorarsshrssh
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2007-1885
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.31% / 78.97%
||
7 Day CHG~0.00%
Published-06 Apr, 2007 | 01:00
Updated-07 Aug, 2024 | 13:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the str_replace function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via a single character search string in conjunction with a long replacement string, which overflows a 32 bit length counter. NOTE: this is probably the same issue as CVE-2007-0906.6.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CVE-2019-25033
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.24% / 46.21%
||
7 Day CHG~0.00%
Published-27 Apr, 2021 | 05:17
Updated-05 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unbound before 1.9.5 allows an integer overflow in the regional allocator via the ALIGN_UP macro. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

Action-Not Available
Vendor-nlnetlabsn/aDebian GNU/Linux
Product-unbounddebian_linuxn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2019-25035
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.73% / 71.73%
||
7 Day CHG~0.00%
Published-27 Apr, 2021 | 05:17
Updated-05 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unbound before 1.9.5 allows an out-of-bounds write in sldns_bget_token_par. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

Action-Not Available
Vendor-nlnetlabsn/aDebian GNU/Linux
Product-unbounddebian_linuxn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-20933
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-93.11% / 99.78%
||
7 Day CHG-0.79%
Published-19 Nov, 2020 | 01:50
Updated-05 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).

Action-Not Available
Vendor-influxdatan/aDebian GNU/Linux
Product-influxdbdebian_linuxn/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-40393
Matching Score-8
Assigner-Talos
ShareView Details
Matching Score-8
Assigner-Talos
CVSS Score-10||CRITICAL
EPSS-0.33% / 55.40%
||
7 Day CHG-0.10%
Published-22 Dec, 2021 | 00:00
Updated-04 Aug, 2024 | 02:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds write vulnerability exists in the RS-274X aperture macro variables handling functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and the forked version of Gerbv (commit 71493260). A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.

Action-Not Available
Vendor-gerbv_projectn/aDebian GNU/Linux
Product-debian_linuxgerbvGerbv
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-12460
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-24.33% / 95.88%
||
7 Day CHG~0.00%
Published-27 Jul, 2020 | 22:52
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a '\0' byte overwrites the heap metadata of the next chunk and its PREV_INUSE flag.

Action-Not Available
Vendor-trusteddomainn/aDebian GNU/LinuxFedora Project
Product-debian_linuxfedoraopendmarcn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2007-1887
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.51% / 87.14%
||
7 Day CHG~0.00%
Published-06 Apr, 2007 | 01:00
Updated-07 Aug, 2024 | 13:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the sqlite_decode_binary function in the bundled sqlite library in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter, as demonstrated by calling the sqlite_udf_decode_binary function with a 0x01 character.

Action-Not Available
Vendor-n/aCanonical Ltd.The PHP GroupDebian GNU/Linux
Product-ubuntu_linuxphpdebian_linuxn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-25042
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.73% / 71.73%
||
7 Day CHG~0.00%
Published-27 Apr, 2021 | 05:16
Updated-05 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

Action-Not Available
Vendor-nlnetlabsn/aDebian GNU/Linux
Product-unbounddebian_linuxn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-25034
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.73% / 71.73%
||
7 Day CHG~0.00%
Published-27 Apr, 2021 | 05:17
Updated-05 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unbound before 1.9.5 allows an integer overflow in sldns_str2wire_dname_buf_origin, leading to an out-of-bounds write. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

Action-Not Available
Vendor-nlnetlabsn/aDebian GNU/Linux
Product-unbounddebian_linuxn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-1999-0978
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.83% / 73.58%
||
7 Day CHG~0.00%
Published-04 Jan, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

htdig allows remote attackers to execute commands via filenames with shell metacharacters.

Action-Not Available
Vendor-n/aDebian GNU/Linux
Product-debian_linuxn/a
CVE-2019-25038
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.18% / 40.37%
||
7 Day CHG~0.00%
Published-27 Apr, 2021 | 05:17
Updated-05 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unbound before 1.9.5 allows an integer overflow in a size calculation in dnscrypt/dnscrypt.c. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

Action-Not Available
Vendor-nlnetlabsn/aDebian GNU/Linux
Product-unbounddebian_linuxn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2007-1864
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-5.48% / 89.83%
||
7 Day CHG~0.00%
Published-09 May, 2007 | 00:00
Updated-07 Aug, 2024 | 13:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the bundled libxmlrpc library in PHP before 4.4.7, and 5.x before 5.2.2, has unknown impact and remote attack vectors.

Action-Not Available
Vendor-n/aCanonical Ltd.Red Hat, Inc.The PHP GroupDebian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxphpdebian_linuxenterprise_linux_workstationn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2007-1700
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.02% / 88.00%
||
7 Day CHG~0.00%
Published-27 Mar, 2007 | 01:00
Updated-07 Aug, 2024 | 13:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CVE-2019-20788
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.84% / 73.84%
||
7 Day CHG~0.00%
Published-23 Apr, 2020 | 18:06
Updated-05 Aug, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape integer overflow and heap-based buffer overflow via a large height or width value. NOTE: this may overlap CVE-2019-15690.

Action-Not Available
Vendor-libvnc_projectn/aDebian GNU/LinuxSiemens AGCanonical Ltd.
Product-simatic_itc1500_pro_firmwareubuntu_linuxdebian_linuxsimatic_itc1500_prosimatic_itc1500simatic_itc1900simatic_itc1900_firmwaresimatic_itc1900_pro_firmwaresimatic_itc1500_firmwaresimatic_itc2200_firmwaresimatic_itc2200_prosimatic_itc2200_pro_firmwarelibvncserversimatic_itc1900_prosimatic_itc2200n/a
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2007-5424
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.29% / 51.96%
||
7 Day CHG~0.00%
Published-12 Oct, 2007 | 23:00
Updated-07 Aug, 2024 | 15:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The disable_functions feature in PHP 4 and 5 allows attackers to bypass intended restrictions by using an alias, as demonstrated by using ini_alter when ini_set is disabled.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CVE-2019-25032
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.18% / 40.37%
||
7 Day CHG~0.00%
Published-27 Apr, 2021 | 05:18
Updated-05 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unbound before 1.9.5 allows an integer overflow in the regional allocator via regional_alloc. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

Action-Not Available
Vendor-nlnetlabsn/aDebian GNU/Linux
Product-unbounddebian_linuxn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2007-5684
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.77% / 81.90%
||
7 Day CHG~0.00%
Published-26 Oct, 2007 | 18:00
Updated-07 Aug, 2024 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple directory traversal vulnerabilities in TikiWiki 1.9.8.1 and earlier allow remote attackers to include and execute arbitrary files via an absolute pathname in (1) error_handler_file and (2) local_php parameters to (a) tiki-index.php, or (3) encoded "..%2F" sequences in the imp_language parameter to tiki-imexport_languages.php.

Action-Not Available
Vendor-tikin/a
Product-tikiwiki_cms\/groupwaren/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2007-1889
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.68% / 87.45%
||
7 Day CHG~0.00%
Published-06 Apr, 2007 | 01:00
Updated-07 Aug, 2024 | 13:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer signedness error in the _zend_mm_alloc_int function in the Zend Memory Manager in PHP 5.2.0 allows remote attackers to execute arbitrary code via a large emalloc request, related to an incorrect signed long cast, as demonstrated via the HTTP SOAP client in PHP, and via a call to msg_receive with the largest positive integer value of maxsize.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CVE-2019-25039
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.73% / 71.73%
||
7 Day CHG~0.00%
Published-27 Apr, 2021 | 05:16
Updated-05 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unbound before 1.9.5 allows an integer overflow in a size calculation in respip/respip.c. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

Action-Not Available
Vendor-nlnetlabsn/aDebian GNU/Linux
Product-unbounddebian_linuxn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2020-28984
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.71% / 71.39%
||
7 Day CHG~0.00%
Published-23 Nov, 2020 | 21:48
Updated-04 Aug, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

prive/formulaires/configurer_preferences.php in SPIP before 3.2.8 does not properly validate the couleur, display, display_navigation, display_outils, imessage, and spip_ecran parameters.

Action-Not Available
Vendor-spipn/aDebian GNU/Linux
Product-debian_linuxspipn/a
CVE-2015-4643
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-6.68% / 90.85%
||
7 Day CHG+0.18%
Published-16 May, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4022.

Action-Not Available
Vendor-n/aRed Hat, Inc.The PHP GroupDebian GNU/LinuxOracle Corporation
Product-enterprise_linux_serverenterprise_linux_server_ausenterprise_linux_desktopenterprise_linux_server_eusenterprise_linux_server_tusenterprise_linux_workstationphpdebian_linuxlinuxn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-19950
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.20% / 78.09%
||
7 Day CHG~0.00%
Published-24 Dec, 2019 | 00:07
Updated-05 Aug, 2024 | 02:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In GraphicsMagick 1.4 snapshot-20190403 Q8, there is a use-after-free in ThrowException and ThrowLoggedException of magick/error.c.

Action-Not Available
Vendor-n/aDebian GNU/LinuxGraphicsMagickopenSUSE
Product-backportsdebian_linuxgraphicsmagickleapn/a
CWE ID-CWE-416
Use After Free
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 41
  • 42
  • Next
Details not found