Vulnerabilities (CVE)

Filtered by CWE-74
Total 1008 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-48199 1 Grocy Project 1 Grocy 2024-02-05 N/A 7.8 HIGH
HTML Injection vulnerability in the 'manageApiKeys' component in Grocy <= 4.0.3 allows attackers to inject arbitrary HTML content without script execution. This occurs when user-supplied data is not appropriately sanitized, enabling the injection of HTML tags through parameter values. The attacker can then manipulate page content in the QR code detail popup, often coupled with social engineering tactics, exploiting both the trust of users and the application's lack of proper input handling.
CVE-2023-48205 1 Jorani 1 Leave Management System 2024-02-05 N/A 5.3 MEDIUM
Jorani Leave Management System 1.0.2 allows a remote attacker to spoof a Host header associated with password reset emails.
CVE-2021-4227 1 Obg 1 Ark Wysiwyg Comment Editor 2024-02-05 N/A 5.3 MEDIUM
The ark-commenteditor WordPress plugin through 2.15.6 does not properly sanitise or encode the comments when in Source editor, allowing attackers to inject an iFrame in the page and thus load arbitrary content from any page to the comment section
CVE-2023-46726 1 Glpi-project 1 Glpi 2024-02-05 N/A 9.8 CRITICAL
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, on PHP 7.4 only, the LDAP server configuration form can be used to execute arbitrary code previously uploaded as a GLPI document. Version 10.0.11 contains a patch for the issue.
CVE-2023-35895 1 Ibm 1 Informix Jdbc 2024-02-05 N/A 9.8 CRITICAL
IBM Informix JDBC Driver 4.10 and 4.50 is susceptible to remote code execution attack via JNDI injection when passing an unchecked argument to a certain API. IBM X-Force ID: 259116.
CVE-2023-48835 1 Phpjabbers 1 Car Rental Script 2024-02-05 N/A 8.8 HIGH
Car Rental Script v3.0 is vulnerable to CSV Injection via a Language > Labels > Export action.
CVE-2024-0552 1 Intumit 2 Smartrobot, Smartrobot Firmware 2024-02-05 N/A 9.8 CRITICAL
Intumit inc. SmartRobot's web framwork has a remote code execution vulnerability. An unauthorized remote attacker can exploit this vulnerability to execute arbitrary commands on the remote server.
CVE-2023-49328 2 Linux, Wolterskluwer 2 Linux Kernel, B.point 2024-02-05 N/A 7.2 HIGH
On a Wolters Kluwer B.POINT 23.70.00 server running Linux on premises, during the authentication phase, a validated system user can achieve remote code execution via Argument Injection in the server-to-server module.
CVE-2023-22527 1 Atlassian 2 Confluence Data Center, Confluence Server 2024-02-05 N/A 9.8 CRITICAL
A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action. Most recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin.
CVE-2023-6458 1 Mattermost 1 Mattermost Server 2024-02-05 N/A 9.8 CRITICAL
Mattermost webapp fails to validate route parameters in/<TEAM_NAME>/channels/<CHANNEL_NAME> allowing an attacker to perform a client-side path traversal.
CVE-2023-48841 1 Phpjabbers 1 Appointment Scheduler 2024-02-05 N/A 8.8 HIGH
Appointment Scheduler 3.0 is vulnerable to CSV Injection via a Language > Labels > Export action.
CVE-2023-49214 1 Usedesk 1 Usedesk 2024-02-05 N/A 9.8 CRITICAL
Usedesk before 1.7.57 allows chat template injection.
CVE-2023-4818 1 Paxtechnology 2 A920, Paydroid 2024-02-05 N/A 7.6 HIGH
PAX A920 device allows to downgrade bootloader due to a bug in its version check. The signature is correctly checked and only bootloader signed by PAX can be used.  The attacker must have physical USB access to the device in order to exploit this vulnerability.
CVE-2023-46456 1 Gl-inet 2 Gl-ar300m, Gl-ar300m Firmware 2024-02-05 N/A 9.8 CRITICAL
In GL.iNET GL-AR300M routers with firmware 3.216 it is possible to inject arbitrary shell commands through the OpenVPN client file upload functionality.
CVE-2023-42136 1 Paxtechnology 9 A50, A6650, A77 and 6 more 2024-02-05 N/A 7.8 HIGH
PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow the execution of arbitrary commands with system account privilege by shell injection starting with a specific word. The attacker must have shell access to the device in order to exploit this vulnerability.
CVE-2023-5340 1 Fivestarplugins 1 Five Star Restaurant Menu 2024-02-05 N/A 9.8 CRITICAL
The Five Star Restaurant Menu and Food Ordering WordPress plugin before 2.4.11 unserializes user input via an AJAX action available to unauthenticated users, allowing them to perform PHP Object Injection when a suitable gadget is present on the blog.
CVE-2023-42135 1 Paxtechnology 3 A50, A920 Pro, Paydroid 2024-02-05 N/A 6.8 MEDIUM
PAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition. The attacker must have physical USB access to the device in order to exploit this vulnerability.
CVE-2023-48826 1 Phpjabbers 1 Time Slots Booking Calendar 2024-02-05 N/A 8.8 HIGH
Time Slots Booking Calendar 4.0 is vulnerable to CSV Injection via the unique ID field of the Reservations List.
CVE-2023-49964 1 Hyland 1 Alfresco Content Services 2024-02-05 N/A 8.8 HIGH
An issue was discovered in Hyland Alfresco Community Edition through 7.2.0. By inserting malicious content in the folder.get.html.ftl file, an attacker may perform SSTI (Server-Side Template Injection) attacks, which can leverage FreeMarker exposed objects to bypass restrictions and achieve RCE (Remote Code Execution). NOTE: this issue exists because of an incomplete fix for CVE-2020-12873.
CVE-2023-22522 1 Atlassian 2 Confluence Data Center, Confluence Server 2024-02-05 N/A 8.8 HIGH
This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve Remote Code Execution (RCE) on an affected instance. Publicly accessible Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See the advisory for additional details Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.