Total
3575 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-22381 | 1 Github | 1 Enterprise Server | 2024-02-04 | N/A | 8.8 HIGH |
A code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to control the value of environment variables for use with GitHub Actions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.8.0 and was fixed in versions 3.4.15, 3.5.12, 3.6.8, 3.7.5. This vulnerability was reported via the GitHub Bug Bounty program. | |||||
CVE-2022-48175 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | N/A | 9.8 CRITICAL |
Rukovoditel v3.2.1 was discovered to contain a remote code execution (RCE) vulnerability in the component /rukovoditel/index.php?module=dashboard/ajax_request. | |||||
CVE-2022-23503 | 1 Typo3 | 1 Typo3 | 2024-02-04 | N/A | 8.8 HIGH |
TYPO3 is an open source PHP based web content management system. Versions prior to 8.7.49, 9.5.38, 10.4.33, 11.5.20, and 12.1.1 are vulnerable to Code Injection. Due to the lack of separating user-submitted data from the internal configuration in the Form Designer backend module, it is possible to inject code instructions to be processed and executed via TypoScript as PHP code. The existence of individual TypoScript instructions for a particular form item and a valid backend user account with access to the form module are needed to exploit this vulnerability. This issue is patched in versions 8.7.49 ELTS, 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1. | |||||
CVE-2023-0089 | 1 Proofpoint | 1 Enterprise Protection | 2024-02-04 | N/A | 8.8 HIGH |
The webutils in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows an authenticated user to execute remote code through 'eval injection'. This affects all versions 8.20.0 and below. | |||||
CVE-2023-0792 | 1 Phpmyfaq | 1 Phpmyfaq | 2024-02-04 | N/A | 5.4 MEDIUM |
Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11. | |||||
CVE-2023-26477 | 1 Xwiki | 1 Xwiki | 2024-02-04 | N/A | 9.8 CRITICAL |
XWiki Platform is a generic wiki platform. Starting in versions 6.3-rc-1 and 6.2.4, it's possible to inject arbitrary wiki syntax including Groovy, Python and Velocity script macros via the `newThemeName` request parameter (URL parameter), in combination with additional parameters. This has been patched in the supported versions 13.10.10, 14.9-rc-1, and 14.4.6. As a workaround, it is possible to edit `FlamingoThemesCode.WebHomeSheet` and manually perform the changes from the patch fixing the issue. | |||||
CVE-2023-24078 | 1 Realtimelogic | 1 Fuguhub | 2024-02-04 | N/A | 8.8 HIGH |
Real Time Logic FuguHub v8.1 and earlier was discovered to contain a remote code execution (RCE) vulnerability via the component /FuguHub/cmsdocs/. | |||||
CVE-2023-0888 | 1 Bbraun | 2 Battery-pack Sp With Wifi, Battery-pack Sp With Wifi Firmware | 2024-02-04 | N/A | 7.2 HIGH |
An improper neutralization of directives in dynamically evaluated code vulnerability in the WiFi Battery embedded web server in versions L90/U70 and L92/U92 can be used to gain administrative access to the WiFi communication module. An authenticated user, having access to both the medical device WiFi network (such as a biomedical engineering staff member) and the specific B.Braun Battery Pack SP with WiFi web server credentials, could get administrative (root) access on the infusion pump communication module. This could be used as a vector to start further attacks | |||||
CVE-2023-0090 | 1 Proofpoint | 1 Enterprise Protection | 2024-02-04 | N/A | 9.8 CRITICAL |
The webservices in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows for an anonymous user to execute remote code through 'eval injection'. Exploitation requires network access to the webservices API, but such access is a non-standard configuration. This affects all versions 8.20.0 and below. | |||||
CVE-2023-0297 | 1 Pyload | 1 Pyload | 2024-02-04 | N/A | 9.8 CRITICAL |
Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31. | |||||
CVE-2023-27893 | 1 Sap | 1 Solution Manager | 2024-02-04 | N/A | 8.8 HIGH |
An attacker authenticated as a user with a non-administrative role and a common remote execution authorization in SAP Solution Manager and ABAP managed systems (ST-PI) - versions 2088_1_700, 2008_1_710, 740, can use a vulnerable interface to execute an application function to perform actions which they would not normally be permitted to perform. Depending on the function executed, the attack can read or modify any user or application data and can make the application unavailable. | |||||
CVE-2022-30580 | 1 Golang | 1 Go | 2024-02-04 | N/A | 7.8 HIGH |
Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either "..com" or "..exe" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset. | |||||
CVE-2022-32417 | 1 Pbootcms | 1 Pbootcms | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
PbootCMS v3.1.2 was discovered to contain a remote code execution (RCE) vulnerability via the function parserIfLabel at function.php. | |||||
CVE-2022-3236 | 1 Sophos | 1 Firewall | 2024-02-04 | N/A | 9.8 CRITICAL |
A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older. | |||||
CVE-2022-37053 | 1 Trendnet | 2 Tew733gr, Tew733gr Firmware | 2024-02-04 | N/A | 9.8 CRITICAL |
TRENDnet TEW733GR v1.03B01 is vulnerable to Command injection via /htdocs/upnpinc/gena.php. | |||||
CVE-2022-37009 | 1 Jetbrains | 1 Intellij Idea | 2024-02-04 | N/A | 7.8 HIGH |
In JetBrains IntelliJ IDEA before 2022.2 local code execution via a Vagrant executable was possible | |||||
CVE-2022-39365 | 1 Pimcore | 1 Pimcore | 2024-02-04 | N/A | 9.8 CRITICAL |
Pimcore is an open source data and experience management platform. Prior to version 10.5.9, the user controlled twig templates rendering in `Pimcore/Mail` & `ClassDefinition\Layout\Text` is vulnerable to server-side template injection, which could lead to remote code execution. Version 10.5.9 contains a patch for this issue. As a workaround, one may apply the patch manually. | |||||
CVE-2022-35847 | 1 Fortinet | 1 Fortisoar | 2024-02-04 | N/A | 8.8 HIGH |
An improper neutralization of special elements used in a template engine vulnerability [CWE-1336] in FortiSOAR management interface 7.2.0, 7.0.0 through 7.0.3, 6.4.0 through 6.4.4 may allow a remote and authenticated attacker to execute arbitrary code via a crafted payload. | |||||
CVE-2022-3394 | 1 Soflyy | 1 Wp All Export | 2024-02-04 | N/A | 7.2 HIGH |
The WP All Export Pro WordPress plugin before 1.7.9 does not limit some functionality during exports only to users with the Administrator role, allowing any logged in user which has been given privileges to perform exports to execute arbitrary code on the site. By default only administrators can run exports, but the privilege can be delegated to lower privileged users. | |||||
CVE-2022-25812 | 1 Transposh | 1 Transposh Wordpress Translation | 2024-02-04 | N/A | 7.2 HIGH |
The Transposh WordPress Translation WordPress plugin before 1.0.8 does not validate its debug settings, which could allow allowing high privilege users such as admin to perform RCE |