|Max CVSS||7.5||Min CVSS||7.5||Total Count||6|
|ID||CVSS||Summary||Last (major) update||Published|
phpMyAdmin 4.0.x before 188.8.131.52, 4.4.x before 184.108.40.206, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a craf
|28-11-2016 - 15:29||02-07-2016 - 21:59|
upload_img_cgi.php in Simple PHP Blog (SPHPBlog) does not properly restrict file extensions of uploaded files, which could allow remote attackers to execute arbitrary code.
|17-10-2016 - 23:29||30-08-2005 - 07:45|
tiki-graph_formula.php in TikiWiki 1.9.8 allows remote attackers to execute arbitrary code via PHP sequences in the f array parameter, which are processed by create_function.
|24-10-2012 - 00:00||12-10-2007 - 19:17|
Unrestricted file upload vulnerability in jhot.php in TikiWiki 1.9.4 Sirius and earlier allows remote attackers to execute arbitrary PHP code via a filepath parameter that contains a filename with a .php extension, which is uploaded to the img/wiki/
|24-10-2012 - 00:00||06-09-2006 - 20:04|
Eval injection vulnerability in pajax_call_dispatcher.php in PAJAX 0.5.1 and earlier allows remote attackers to execute arbitrary code via the (1) $method and (2) $args parameters.
|07-03-2011 - 21:33||13-04-2006 - 18:02|
AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl.
|05-09-2008 - 16:45||18-01-2005 - 00:00|