Actual Analyzer through 2014-08-29 allows code execution via shell metacharacters because untrusted input is used for part of the input data passed to an eval operation.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 18 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Actualscripts
Actualscripts actualanalyzer |
|
| CPEs | cpe:2.3:a:actualscripts:actualanalyzer:*:*:server:*:*:*:*:* | |
| Vendors & Products |
Actualscripts
Actualscripts actualanalyzer |
|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T11:48:49.046Z
Reserved: 2014-08-26T00:00:00.000Z
Link: CVE-2014-5470
Updated: 2024-08-06T11:48:49.046Z
Status : Awaiting Analysis
Published: 2024-06-21T22:15:10.417
Modified: 2024-11-21T02:12:07.490
Link: CVE-2014-5470
No data.
OpenCVE Enrichment
No data.
Weaknesses