Page 3 of 23 results (0.009 seconds)

CVSS: 10.0EPSS: 46%CPEs: 4EXPL: 2

The alterSearchQuery function in lib/controllers/CmdownloadController.php in the CreativeMinds CM Downloads Manager plugin before 2.0.4 for WordPress allows remote attackers to execute arbitrary PHP code via the CMDsearch parameter to cmdownloads/, which is processed by the PHP create_function function. La función alterSearchQuery en lib/controllers/CmdownloadController.php en el plugin CreativeMinds CM Downloads Manager anterior a 2.0.4 para WordPress permite a atacantes remotos ejecutar código PHP arbitrario a través del parámetro CMDsearch en cmdownloads/, lo que está procesado por la función PHP create_function. WordPress CM Download Manager plugin versions 2.0.0 and below suffer from a code injection vulnerability. • https://www.exploit-db.com/exploits/35324 http://packetstormsecurity.com/files/129183/WordPress-CM-Download-Manager-2.0.0-Code-Injection.html http://www.itas.vn/news/code-injection-in-cm-download-manager-plugin-66.html http://www.securityfocus.com/archive/1/534037/100/0/threaded http://www.securityfocus.com/bid/71204 https://downloadsmanager.cminds.com/release-notes • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 93%CPEs: 3EXPL: 2

Unrestricted file upload vulnerability in server/php/UploadHandler.php in the jQuery File Upload Plugin 6.4.4 for jQuery, as used in the Creative Solutions Creative Contact Form (formerly Sexy Contact Form) before 1.0.0 for WordPress and before 2.0.1 for Joomla!, allows remote attackers to execute arbitrary code by uploading a PHP file with an PHP extension, then accessing it via a direct request to the file in files/, as exploited in the wild in October 2014. Una vulnerabilidad de carga de archivos sin restricciones en el archivo server/php/UploadHandler.php en el jQuery File Upload Plugin versión 6.4.4 para jQuery, como es usado en el Creative Solutions Creative Contact Form (anteriormente Sexy Contact Form) versiones anteriores a 1.0.0 para WordPress, y versiones anteriores a 2.0.1 para Joomla!, permite a atacantes remotos ejecutar código arbitrario mediante la carga de un archivo PHP con una extensión PHP, y luego acceder a él mediante una petición directa al archivo en files/, como se explotó "in the wild" en octubre de 2014. • https://www.exploit-db.com/exploits/36811 https://www.exploit-db.com/exploits/35057 http://osvdb.org/show/osvdb/113669 http://osvdb.org/show/osvdb/113673 http://www.openwall.com/lists/oss-security/2014/11/11/4 http://www.openwall.com/lists/oss-security/2014/11/11/5 http://www.openwall.com/lists/oss-security/2014/11/13/3 https://wordpress.org/plugins/sexy-contact-form/changelog • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in the Creative Commons module 6.x-1.x before 6.x-1.1 for Drupal allow remote authenticated users with the administer creative commons permission to inject arbitrary web script or HTML via the (1) creativecommons_user_message or (2) creativecommons_site_license_additional_text parameter. Múltiples vulnerabilidades de ejecución de comandos en sitios cruzados (XSS) en el módulo Creative Commons v6.x-1.x y anteriores a v6.x-1.1 para Drupal que permite a usuarios remotos autenticados con permisos de administración (creative commons) inyectar código web o HTML arbitrario a través del parámetro (1) creativecommons_user_message o (2) creativecommons_site_license_additional_text. • http://drupal.org/node/1547478 http://drupal.org/node/1547520 http://secunia.com/advisories/48937 http://www.madirish.net/content/drupal-creative-commons-6x-10-xss-vulnerability http://www.openwall.com/lists/oss-security/2012/05/03/1 http://www.openwall.com/lists/oss-security/2012/05/03/2 http://www.securityfocus.com/bid/53248 https://exchange.xforce.ibmcloud.com/vulnerabilities/75180 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 0

Unspecified vulnerability in the App Lock (com.cc.applock) application 1.7.5 and 1.7.6 for Android has unknown impact and attack vectors. Vulnerabilidad no especificada en la aplicación App Lock (com.cc.applock) v1.7.5 y v1.7.6, para Android tiene un impacto y vectores de ataque desconocidos. • http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1408-vulnerability-in-AppLock.html •

CVSS: 10.0EPSS: 3%CPEs: 2EXPL: 0

Stack-based buffer overflow in Creative Software AutoUpdate Engine ActiveX Control 2.0.12.0, as used in Creative Software AutoUpdate 1.40.01, allows remote attackers to execute arbitrary code via vectors related to the BrowseFolder method. Desbordamiento de búfer basado en pila en Creative Software AutoUpdate Engine ActiveX Control v2.0.12.0, como el usado en Creative Software AutoUpdate 1.40.01, permite a atacantes remotos ejecutar código de su elección a través de vectores relativos al método BrowseFolder. • http://secunia.com/advisories/38970 http://secunia.com/secunia_research/2010-52 http://www.securityfocus.com/archive/1/511795/100/0/threaded http://www.securityfocus.com/bid/40768 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •