Total
1047 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-51387 | 1 Apache | 1 Hertzbeat | 2024-11-21 | N/A | 7.2 HIGH |
Hertzbeat is an open source, real-time monitoring system. Hertzbeat uses aviatorscript to evaluate alert expressions. The alert expressions are supposed to be some simple expressions. However, due to improper sanitization for alert expressions in version prior to 1.4.1, a malicious user can use a crafted alert expression to execute any command on hertzbeat server. A malicious user who has access to alert define function can execute any command in hertzbeat instance. This issue is fixed in version 1.4.1. | |||||
CVE-2023-50447 | 2 Debian, Python | 2 Debian Linux, Pillow | 2024-11-21 | N/A | 8.1 HIGH |
Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter). | |||||
CVE-2023-4142 | 1 Smackcoders | 1 Wp Ultimate Csv Importer | 2024-11-21 | N/A | 8.0 HIGH |
The WP Ultimate CSV Importer plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 7.9.8 via the '->cus1' parameter. This allows authenticated attackers with author-level permissions or above, if the administrator previously grants access in the plugin settings, to execute code on the server. The author resolved this vulnerability by removing the ability for authors and editors to import files, please note that this means remote code execution is still possible for site administrators, use the plugin with caution. | |||||
CVE-2023-4141 | 1 Smackcoders | 1 Wp Ultimate Csv Importer | 2024-11-21 | N/A | 8.0 HIGH |
The WP Ultimate CSV Importer plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 7.9.8 via the '->cus2' parameter. This allows authenticated attackers with author-level permissions or above, if the administrator previously grants access in the plugin settings, to create a PHP file and execute code on the server. The author resolved this vulnerability by removing the ability for authors and editors to import files, please note that this means php file creation is still allowed for site administrators, use the plugin with caution. | |||||
CVE-2023-49391 | 1 Free5gc | 1 Free5gc | 2024-11-21 | N/A | 7.5 HIGH |
An issue was discovered in free5GC version 3.3.0, allows remote attackers to execute arbitrary code and cause a denial of service (DoS) on AMF component via crafted NGAP message. | |||||
CVE-2023-49314 | 2 Apple, Asana | 2 Macos, Desktop | 2024-11-21 | N/A | 7.8 HIGH |
Asana Desktop 2.1.0 on macOS allows code injection because of specific Electron Fuses. There is inadequate protection against code injection through settings such as RunAsNode and EnableNodeCliInspectArguments, and thus r3ggi/electroniz3r can be used to perform an attack. | |||||
CVE-2023-48699 | 1 Ubertidavide | 1 Fastbots | 2024-11-21 | N/A | 8.4 HIGH |
fastbots is a library for fast bot and scraper development using selenium and the Page Object Model (POM) design. Prior to version 0.1.5, an attacker could modify the locators.ini locator file with python code that without proper validation it's executed and it could lead to rce. The vulnerability is in the function `def __locator__(self, locator_name: str)` in `page.py`. In order to mitigate this issue, upgrade to fastbots version 0.1.5 or above. | |||||
CVE-2023-48192 | 1 Totolink | 2 A3700r, A3700r Firmware | 2024-11-21 | N/A | 7.8 HIGH |
An issue in TOTOlink A3700R v.9.1.2u.6134_B20201202 allows a local attacker to execute arbitrary code via the setTracerouteCfg function. | |||||
CVE-2023-47444 | 1 Opencart | 1 Opencart | 2024-11-21 | N/A | 8.8 HIGH |
An issue discovered in OpenCart 4.0.0.0 to 4.0.2.3 allows authenticated backend users having common/security write privilege can write arbitrary untrusted data inside config.php and admin/config.php, resulting in remote code execution on the underlying server. | |||||
CVE-2023-46987 | 1 Seacms | 1 Seacms | 2024-11-21 | N/A | 8.8 HIGH |
SeaCMS v12.9 was discovered to contain a remote code execution (RCE) vulnerability via the component /augap/adminip.php. | |||||
CVE-2023-46947 | 1 Intelliants | 1 Subrion | 2024-11-21 | N/A | 8.8 HIGH |
Subrion 4.2.1 has a remote command execution vulnerability in the backend. | |||||
CVE-2023-46865 | 1 Craterapp | 1 Crater | 2024-11-21 | N/A | 7.2 HIGH |
/api/v1/company/upload-logo in CompanyController.php in crater through 6.0.6 allows a superadmin to execute arbitrary PHP code by placing this code into an image/png IDAT chunk of a Company Logo image. | |||||
CVE-2023-46845 | 1 Ec-cube | 1 Ec-cube | 2024-11-21 | N/A | 7.2 HIGH |
EC-CUBE 3 series (3.0.0 to 3.0.18-p6) and 4 series (4.0.0 to 4.0.6-p3, 4.1.0 to 4.1.2-p2, and 4.2.0 to 4.2.2) contain an arbitrary code execution vulnerability due to improper settings of the template engine Twig included in the product. As a result, arbitrary code may be executed on the server where the product is running by a user with an administrative privilege. | |||||
CVE-2023-46818 | 1 Ispconfig | 1 Ispconfig | 2024-11-21 | N/A | 7.2 HIGH |
An issue was discovered in ISPConfig before 3.2.11p1. PHP code injection can be achieved in the language file editor by an admin if admin_allow_langedit is enabled. | |||||
CVE-2023-46816 | 1 Sugarcrm | 1 Sugarcrm | 2024-11-21 | N/A | 8.8 HIGH |
An issue was discovered in SugarCRM 12 before 12.0.4 and 13 before 13.0.2. A Server Site Template Injection (SSTI) vulnerability has been identified in the GecControl action. By using a crafted request, custom PHP code can be injected via the GetControl action because of missing input validation. An attacker with regular user privileges can exploit this. | |||||
CVE-2023-46055 | 1 Thingnario | 1 Photon | 2024-11-21 | N/A | 8.8 HIGH |
An issue in ThingNario Photon v.1.0 allows a remote attacker to execute arbitrary code and escalate privileges via a crafted script to the ping function to the "thingnario Logger Maintenance Webpage" endpoint. | |||||
CVE-2023-45735 | 1 Westermo | 2 L206-f2g, L206-f2g Firmware | 2024-11-21 | N/A | 8.0 HIGH |
A potential attacker with access to the Westermo Lynx device may be able to execute malicious code that could affect the correct functioning of the device. | |||||
CVE-2023-45560 | 1 Memberscard Project | 1 Memberscard | 2024-11-21 | N/A | 7.5 HIGH |
An issue in Yasukawa memberscard v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token. | |||||
CVE-2023-44847 | 1 Seacms | 1 Seacms | 2024-11-21 | N/A | 7.2 HIGH |
An issue in SeaCMS v.12.8 allows an attacker to execute arbitrary code via the admin_ Weixin.php component. | |||||
CVE-2023-44846 | 1 Seacms | 1 Seacms | 2024-11-21 | N/A | 8.8 HIGH |
An issue in SeaCMS v.12.8 allows an attacker to execute arbitrary code via the admin_ notify.php component. |