Total
3575 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-35150 | 1 Xwiki | 1 Xwiki | 2024-02-04 | N/A | 8.0 HIGH |
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 2.40m-2 and prior to versions 14.4.8, 14.10.4, and 15.0, any user with view rights on any document can execute code with programming rights, leading to remote code execution by crafting an url with a dangerous payload. The problem has been patched in XWiki 15.0, 14.10.4 and 14.4.8. | |||||
CVE-2023-29404 | 2 Fedoraproject, Golang | 2 Fedora, Go | 2024-02-04 | N/A | 9.8 CRITICAL |
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers. | |||||
CVE-2023-36467 | 1 Amazon | 1 Aws-dataall | 2024-02-04 | N/A | 8.8 HIGH |
AWS data.all is an open source development framework to help users build a data marketplace on Amazon Web Services. data.all versions 1.2.0 through 1.5.1 do not prevent remote code execution when a user injects Python commands into the ‘Template’ field when configuring a data pipeline. The issue can only be triggered by authenticated users. A fix for this issue is available in data.all version 1.5.2 and later. There is no recommended work around. | |||||
CVE-2023-1049 | 2024-02-04 | N/A | 7.8 HIGH | ||
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that could cause execution of malicious code when an unsuspicious user loads a project file from the local filesystem into the HMI. | |||||
CVE-2023-29212 | 1 Xwiki | 1 Xwiki | 2024-02-04 | N/A | 8.8 HIGH |
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with edit rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the included pages in the included documents edit panel. The problem has been patched on XWiki 14.4.7, and 14.10. | |||||
CVE-2023-2859 | 1 Teampass | 1 Teampass | 2024-02-04 | N/A | 8.8 HIGH |
Code Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.9. | |||||
CVE-2023-37198 | 1 Schneider-electric | 1 Struxureware Data Center Expert | 2024-02-04 | N/A | 7.2 HIGH |
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that could cause remote code execution when an admin user on DCE uploads or tampers with install packages. | |||||
CVE-2023-24835 | 2024-02-04 | N/A | 7.2 HIGH | ||
Softnext Technologies Corp.’s SPAM SQR has a vulnerability of Code Injection within its specific function. An authenticated remote attacker with administrator privilege can exploit this vulnerability to execute arbitrary system command to perform arbitrary system operation or disrupt service. | |||||
CVE-2023-31415 | 1 Elastic | 1 Kibana | 2024-02-04 | N/A | 8.8 HIGH |
Kibana version 8.7.0 contains an arbitrary code execution flaw. An attacker with All privileges to the Uptime/Synthetics feature could send a request that will attempt to execute JavaScript code. This could lead to the attacker executing arbitrary commands on the host system with permissions of the Kibana process. | |||||
CVE-2023-32540 | 1 Advantech | 1 Webaccess\/scada | 2024-02-04 | N/A | 9.8 CRITICAL |
In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file overwrite vulnerability, which could allow an attacker to overwrite any file in the operating system (including system files), inject code into an XLS file, and modify the file extension, which could lead to arbitrary code execution. | |||||
CVE-2023-30145 | 1 Tuzitio | 1 Camaleon Cms | 2024-02-04 | N/A | 9.8 CRITICAL |
Camaleon CMS v2.7.0 was discovered to contain a Server-Side Template Injection (SSTI) vulnerability via the formats parameter. | |||||
CVE-2023-29509 | 1 Xwiki | 1 Xwiki | 2024-02-04 | N/A | 8.8 HIGH |
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the `documentTree` macro parameters in This macro is installed by default in `FlamingoThemesCode.WebHome`. This page is installed by default. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10. | |||||
CVE-2023-29214 | 1 Xwiki | 1 Xwiki | 2024-02-04 | N/A | 8.8 HIGH |
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with edit rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the included pages in the IncludedDocuments panel. The problem has been patched on XWiki 14.4.7, and 14.10. | |||||
CVE-2023-34112 | 1 Bytedeco | 1 Javacpp Presets | 2024-02-04 | N/A | 8.8 HIGH |
JavaCPP Presets is a project providing Java distributions of native C++ libraries. All the actions in the `bytedeco/javacpp-presets` use the `github.event.head_commit.message?` parameter in an insecure way. For example, the commit message is used in a run statement - resulting in a command injection vulnerability due to string interpolation. No exploitation has been reported. This issue has been addressed in version 1.5.9. Users of JavaCPP Presets are advised to upgrade as a precaution. | |||||
CVE-2023-31414 | 1 Elastic | 1 Kibana | 2024-02-04 | N/A | 8.8 HIGH |
Kibana versions 8.0.0 through 8.7.0 contain an arbitrary code execution flaw. An attacker with write access to Kibana yaml or env configuration could add a specific payload that will attempt to execute JavaScript code. This could lead to the attacker executing arbitrary commands on the host system with permissions of the Kibana process. | |||||
CVE-2023-26060 | 1 Nokia | 1 Netact | 2024-02-04 | N/A | 8.8 HIGH |
An issue was discovered in Nokia NetAct before 22 FP2211. On the Working Set Manager page, users can create a Working Set with a name that has a client-side template injection payload. Input validation is missing during creation of the working set. For an external attacker, it is very difficult to exploit this, because a few dynamically created parameters such as Jsession-id, a CSRF token, and an Nxsrf token would be needed. The attack can realistically only be performed by an internal user. | |||||
CVE-2023-27866 | 1 Ibm | 1 Informix Jdbc Driver | 2024-02-04 | N/A | 9.8 CRITICAL |
IBM Informix JDBC Driver 4.10 and 4.50 is susceptible to remote code execution attack via JNDI injection when driver code or the application using the driver do not verify supplied LDAP URL in Connect String. IBM X-Force ID: 249511. | |||||
CVE-2023-27897 | 1 Sap | 1 Customer Relationship Management | 2024-02-04 | N/A | 6.3 MEDIUM |
In SAP CRM - versions 700, 701, 702, 712, 713, an attacker who is authenticated with a non-administrative role and a common remote execution authorization can use a vulnerable interface to execute an application function to perform actions which they would not normally be permitted to perform. Depending on the function executed, the attack can can have limited impact on confidentiality and integrity of non-critical user or application data and application availability. | |||||
CVE-2023-25549 | 1 Schneider-electric | 1 Struxureware Data Center Expert | 2024-02-04 | N/A | 9.8 CRITICAL |
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that allows for remote code execution when using a parameter of the DCE network settings endpoint. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior) | |||||
CVE-2023-27867 | 5 Hp, Ibm, Linux and 2 more | 6 Hp-ux, Aix, Db2 and 3 more | 2024-02-04 | N/A | 8.8 HIGH |
IBM Db2 JDBC Driver for Db2 for Linux, UNIX and Windows 10.5, 11.1, and 11.5 could allow a remote authenticated attacker to execute arbitrary code via JNDI Injection. By sending a specially crafted request using the property clientRerouteServerListJNDIName, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 249514. |