Total
3575 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-21737 | 1 Sap | 1 Application Interface Framework | 2024-02-05 | N/A | 9.1 CRITICAL |
In SAP Application Interface Framework File Adapter - version 702, a high privilege user can use a function module to traverse through various layers and execute OS commands directly. By this, such user can control the behaviour of the application. This leads to considerable impact on confidentiality, integrity and availability. | |||||
CVE-2023-51784 | 2024-02-05 | N/A | 9.8 CRITICAL | ||
Improper Control of Generation of Code ('Code Injection') vulnerability in Apache InLong.This issue affects Apache InLong: from 1.5.0 through 1.9.0, which could lead to Remote Code Execution. Users are advised to upgrade to Apache InLong's 1.10.0 or cherry-pick [1] to solve it. [1] https://github.com/apache/inlong/pull/9329 | |||||
CVE-2023-47444 | 1 Opencart | 1 Opencart | 2024-02-05 | N/A | 8.8 HIGH |
An issue discovered in OpenCart 4.0.0.0 to 4.0.2.3 allows authenticated backend users having common/security write privilege can write arbitrary untrusted data inside config.php and admin/config.php, resulting in remote code execution on the underlying server. | |||||
CVE-2021-22150 | 1 Elastic | 1 Kibana | 2024-02-05 | N/A | 7.2 HIGH |
It was discovered that a user with Fleet admin permissions could upload a malicious package. Due to using an older version of the js-yaml library, this package would be loaded in an insecure manner, allowing an attacker to execute commands on the Kibana server. | |||||
CVE-2023-43449 | 1 Hummerrisk | 1 Hummerrisk | 2024-02-05 | N/A | 8.8 HIGH |
An issue in HummerRisk HummerRisk v.1.10 thru 1.4.1 allows an authenticated attacker to execute arbitrary code via a crafted request to the service/LicenseService component. | |||||
CVE-2023-36095 | 1 Langchain | 1 Langchain | 2024-02-05 | N/A | 9.8 CRITICAL |
An issue in Harrison Chase langchain v.0.0.194 allows an attacker to execute arbitrary code via the python exec calls in the PALChain, affected functions include from_math_prompt and from_colored_object_prompt. | |||||
CVE-2023-37914 | 2024-02-05 | N/A | 8.8 HIGH | ||
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can view `Invitation.WebHome` can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This vulnerability has been patched on XWiki 14.4.8, 15.2-rc-1, and 14.10.6. Users are advised to upgrade. Users unable to upgrade may manually apply the patch on `Invitation.InvitationCommon` and `Invitation.InvitationConfig`, but there are otherwise no known workarounds for this vulnerability. | |||||
CVE-2023-39023 | 1 University Compass Project | 1 University Compass | 2024-02-05 | N/A | 9.8 CRITICAL |
university compass v2.2.0 and below was discovered to contain a code injection vulnerability in the component org.compass.core.executor.DefaultExecutorManager.configure. This vulnerability is exploited via passing an unchecked argument. | |||||
CVE-2023-34842 | 1 Dedecms | 1 Dedecms | 2024-02-05 | N/A | 9.8 CRITICAL |
Remote Code Execution vulnerability in DedeCMS through 5.7.109 allows remote attackers to run arbitrary code via crafted POST request to /dede/tpl.php. | |||||
CVE-2023-38860 | 1 Langchain | 1 Langchain | 2024-02-05 | N/A | 9.8 CRITICAL |
An issue in LangChain v.0.0.231 allows a remote attacker to execute arbitrary code via the prompt parameter. | |||||
CVE-2023-41892 | 1 Craftcms | 1 Craft Cms | 2024-02-05 | N/A | 9.8 CRITICAL |
Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15. | |||||
CVE-2023-37466 | 1 Vm2 Project | 1 Vm2 | 2024-02-05 | N/A | 10.0 CRITICAL |
vm2 is an advanced vm/sandbox for Node.js. The library contains critical security issues and should not be used for production. The maintenance of the project has been discontinued. In vm2 for versions up to 3.9.19, `Promise` handler sanitization can be bypassed with the `@@species` accessor property allowing attackers to escape the sandbox and run arbitrary code, potentially allowing remote code execution inside the context of vm2 sandbox. | |||||
CVE-2023-39013 | 1 Larsga | 1 Duke | 2024-02-05 | N/A | 9.8 CRITICAL |
Duke v1.2 and below was discovered to contain a code injection vulnerability via the component no.priv.garshol.duke.server.CommonJTimer.init. | |||||
CVE-2023-3401 | 1 Gitlab | 1 Gitlab | 2024-02-05 | N/A | 6.5 MEDIUM |
An issue has been discovered in GitLab affecting all versions before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. The main branch of a repository with a specially designed name allows an attacker to create repositories with malicious code. | |||||
CVE-2023-46865 | 1 Craterapp | 1 Crater | 2024-02-05 | N/A | 7.2 HIGH |
/api/v1/company/upload-logo in CompanyController.php in crater through 6.0.6 allows a superadmin to execute arbitrary PHP code by placing this code into an image/png IDAT chunk of a Company Logo image. | |||||
CVE-2023-36255 | 1 Eramba | 1 Eramba | 2024-02-05 | N/A | 8.8 HIGH |
An issue in Eramba Limited Eramba Enterprise v.3.19.1 allows a remote attacker to execute arbitrary code via the path parameter in the URL. | |||||
CVE-2023-38943 | 1 Shuize 0x727 Project | 1 Shuize 0x727 | 2024-02-05 | N/A | 8.8 HIGH |
ShuiZe_0x727 v1.0 was discovered to contain a remote command execution (RCE) vulnerability via the component /iniFile/config.ini. | |||||
CVE-2023-4142 | 1 Smackcoders | 1 Wp Ultimate Csv Importer | 2024-02-05 | N/A | 8.8 HIGH |
The WP Ultimate CSV Importer plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 7.9.8 via the '->cus1' parameter. This allows authenticated attackers with author-level permissions or above, if the administrator previously grants access in the plugin settings, to execute code on the server. The author resolved this vulnerability by removing the ability for authors and editors to import files, please note that this means remote code execution is still possible for site administrators, use the plugin with caution. | |||||
CVE-2023-37273 | 1 Agpt | 1 Auto-gpt | 2024-02-05 | N/A | 8.8 HIGH |
Auto-GPT is an experimental open-source application showcasing the capabilities of the GPT-4 language model. Running Auto-GPT version prior to 0.4.3 by cloning the git repo and executing `docker compose run auto-gpt` in the repo root uses a different docker-compose.yml file from the one suggested in the official docker set up instructions. The docker-compose.yml file located in the repo root mounts itself into the docker container without write protection. This means that if malicious custom python code is executed via the `execute_python_file` and `execute_python_code` commands, it can overwrite the docker-compose.yml file and abuse it to gain control of the host system the next time Auto-GPT is started. The issue has been patched in version 0.4.3. | |||||
CVE-2023-37582 | 1 Apache | 1 Rocketmq | 2024-02-05 | N/A | 9.8 CRITICAL |
The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1. When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as. It is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks. |