Contents:
More typically, this vulnerability will result in denial-of-service conditions. The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. The Broadcom brcmfmac WiFi driver prior to commit 1b5ebe8bceddeff is vulnerable to a heap buffer overflow. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE, can be used remotely. An issue was discovered in baigo CMS 2. There is a vulnerability that allows remote attackers to execute arbitrary code.
The com.
An attacker can execute arbitrary code via directory traversal in a ZIP archive. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. Prima Systems FlexAir, Versions 2. The application allows the upload of arbitrary Python scripts when configuring the main central controller.
These scripts can be immediately executed because of root code execution, not as a web server user, allowing an authenticated attacker to gain full system access.
This ultimately allows execution of arbitrary PHP code. This can be leveraged for remote code execution. DaviewIndy 8. Attackers could exploit this and arbitrary code execution. Architectural Information System 1. An issue was discovered on Motorola C1 and M2 devices with firmware 1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A Buffer overflow in the built-in web server allows remote attackers to initiate DoS, and probably to execute arbitrary code issue 1 of 2. An issue was discovered in Pluck 4. In the index.
This can only occur if the administrator neglects to set FileExtensionFilter and there are untrusted user accounts. An issue was discovered in Tiny Issue 1. In Indexhibit 2.
WordPress before 4. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE The issue was addressed by signaling that an executable stack is not required. A memory corruption issue was addressed with improved validation. This issue is fixed in Xcode Processing a maliciously crafted file may lead to arbitrary code execution. A validation issue existed in the entitlement verification.
This issue was addressed with improved validation of the process entitlement. A dynamic library loading issue existed in iTunes setup.
ZTE Corporation is a Chinese multinational telecommunications equipment and systems A ZTE Blade S6 Plus In December , ZTE sold systems for eavesdropping on phone and At least one ZTE mobile phone (sold as the ZTE Score in the United States by 1 in Patent Applications for Second Straight Year". The new ZTE Visible R2 is a modest device, but one that could potentially have The new phone has found its way on to Verizon's low-budget mobile virtual network in the lucrative US market after being accused of spying for the Chinese government. ZTE Blade V10 specs leak on TENAA 01/31/
This was addressed with improved path searching. Running the iTunes installer in an untrusted directory may result in arbitrary code execution. An injection issue was addressed with improved validation. This issue is fixed in Shazam Android App Version 9.
Processing a maliciously crafted URL may lead to arbitrary javascript code execution. A memory corruption vulnerability was addressed with improved locking. A buffer overflow was addressed with improved bounds checking. Processing a maliciously crafted text file may lead to arbitrary code execution.
This issue is fixed in tvOS 13, iTunes for Windows Multiple issues in ld64 in the Xcode toolchains were addressed by updating to version ld Compiling code without proper input validation could lead to arbitrary code execution with user privilege. This issue is fixed in iCloud for Windows This issue is fixed in macOS Mojave A use after free issue was addressed with improved memory management.
A remote attacker may be able to cause arbitrary code execution. Parsing a maliciously crafted office document may lead to an unexpected application termination or arbitrary code execution. A memory initialization issue was addressed with improved memory handling. A maliciously crafted SQL query may lead to arbitrary code execution. A logic issue was addressed with improved restrictions. Processing a maliciously crafted movie file may lead to arbitrary code execution. A malicious application may be able to execute arbitrary code with kernel privileges.
Clicking a malicious SMS link may lead to arbitrary code execution.
Multiple input validation issues existed in MIG generated code. These issues were addressed with improved validation. Mounting a maliciously crafted NFS network share may lead to arbitrary code execution with system privileges. Due to a logic error in the code, upload-image-with-ajax v1. Kaspersky Lab Antivirus Engine version before Adobe Acrobat and Reader versions , Brackets versions 1.
Adobe Photoshop CC versions before In Magento prior to 1. In Magento to 1. In Magentoprior to 1. A remote code execution vulnerability exists in Magento 2. An authenticated user with system data manipulation privileges can execute aribitrary code through arbitrary file deletion and OS command injection. An authenticated user with admin privileges to manipulate shippment settings can execute arbitrary code through server-side request forgery due to unsafe handling of a carrier gateway.
An authenticated user with administrative privileges system level import can execute arbitrary code through a Phar deserialization vulnerability in the import functionality. A stored cross-site scripting XSS vulnerability exists in Magento 2. An authenticated user can execute arbitrary JavaScript code by providing arbitrary API endpoint that will not be chcecked by sale pickup event. A remote code execution vulnerability exists in Magento 1 prior to 1.
An authenticated user with admin privileges to import features can execute arbitrary code via crafted configuration archive file upload. An authenticated user can leverage plugin functionality related to email templates to manipulate the interceptor class in a way that allows an attacker to execute arbitrary code.
An authenticated user can leverage email templates hierarchy to manipulate the interceptor class in a way that allows an attacker to execute arbitrary code. An authenticated user can craft a malicious CSRF payload that can result in arbitrary command execution.
Adobe Experience Manager versions 6. Adobe application manager installer version Successful exploitation could lead to Arbitrary Code Execution in the context of the current user. ColdFusion update 4 and earlier and ColdFusion update 11 and earlier have a Command Injection via Vulnerable component vulnerability. Successful exploitation could lead to Arbitrary code execution in the context of the current user.
Adobe Flash Player Adobe After Effects versions 16 and earlier have an insecure library loading dll hijacking vulnerability. Adobe Photoshop CC versions Adobe Prelude CC versions 8. Creative Cloud Desktop Application versions 4. An authenticated user with admin privileges to create or edit a product can execute arbitrary code via malicious XML layout updates.
A remote code execution vulnerability exists in Magento Open Source prior to 1. An authenticated user with admin privileges to create sitemaps can execute arbitrary PHP code by creating a malicious sitemap file. Adobe Premiere Pro CC versions A file upload restriction bypass exists in Magento 2.
An authenticated user with administrator privileges to the import feature can make modifications to a configuration file, resulting in potentially unauthorized removal of file upload restrictions. This can result in arbitrary code execution when a malicious file is then uploaded and executed on the system. This can be exploited by authenticated user with admin privileges to manipulate shipment settings to execute arbitrary code.
This can be exploited by an authenticated user with admin privileges to manipulate shipment methods to execute arbitrary code. This can be exploited by an authenticated user with access to the admin panel to manipulate system configuration and execute arbitrary code. An authenticated user with admin privileges to email templates can execute arbitrary code by previewing a malicious template. An authenticated user with administrator privileges to layouts can execute arbitrary code through a combination of product import, crafted csv file and XML layout update. An authenticated user with admin privileges to layouts can execute arbitrary code through a crafted XML layout update.
An authenticated user with administrator privileges to access shipment settings can execute arbitrary code via server-side request forgery. A security bypass exists in Magento 2. An authenticated user can bypass security protections that prevent arbitrary PHP script upload via form data injection. Adobe Character Animator versions 2. Adobe Campaign Classic version ColdFusion versions Update 3 and earlier, Update 10 and earlier, and Update 18 and earlier have a deserialization of untrusted data vulnerability.
ColdFusion versions Update 3 and earlier, Update 10 and earlier, and Update 18 and earlier have a command injection vulnerability. ColdFusion versions Update 3 and earlier, Update 10 and earlier, and Update 18 and earlier have a file extension blacklist bypass vulnerability.
ColdFusion versions Update 2 and earlier, Update 9 and earlier, and Update 17 and earlier have a file upload restriction bypass vulnerability. The observed affected TCP port is but, based on the product's configuration, a different one could be vulnerable.