Total
3574 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-35458 | 1 Clusterlabs | 1 Hawk | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser. | |||||
CVE-2020-12842 | 1 Gogogate | 2 Ismartgate Pro, Ismartgate Pro Firmware | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
ismartgate PRO 1.5.9 is vulnerable to privilege escalation by appending PHP code to /cron/checkUserExpirationDate.php. | |||||
CVE-2020-15227 | 2 Debian, Nette | 2 Debian Linux, Application | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework. | |||||
CVE-2020-36245 | 1 Gramaddict | 1 Gramaddict | 2024-02-04 | 5.8 MEDIUM | 8.8 HIGH |
GramAddict through 1.2.3 allows remote attackers to execute arbitrary code because of use of UIAutomator2 and ATX-Agent. The attacker must be able to reach TCP port 7912, e.g., by being on the same Wi-Fi network. | |||||
CVE-2021-21244 | 1 Onedev Project | 1 Onedev | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, There is a vulnerability that enabled pre-auth server side template injection via Bean validation message tampering. Full details in the reference GHSA. This issue was fixed in 4.0.3 by disabling validation interpolation completely. | |||||
CVE-2021-3411 | 2 Linux, Redhat | 2 Linux Kernel, Enterprise Linux | 2024-02-04 | 4.6 MEDIUM | 6.7 MEDIUM |
A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linking state. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | |||||
CVE-2021-27230 | 1 Expressionengine | 1 Expressionengine | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory. | |||||
CVE-2019-7177 | 1 Pexip | 1 Pexip Infinity | 2024-02-04 | 9.0 HIGH | 7.2 HIGH |
Pexip Infinity before 20.1 allows Code Injection onto nodes via an admin. | |||||
CVE-2020-35121 | 1 Keysight | 1 Database Connector | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
An issue was discovered in the Keysight Database Connector plugin before 1.5.0 for Confluence. A malicious user could insert arbitrary JavaScript into saved macro parameters that would execute when a user viewed a page with that instance of the macro. | |||||
CVE-2020-11103 | 1 Webswing | 1 Webswing | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
JsLink in Webswing before 2.6.12 LTS, and 2.7.x and 20.x before 20.1, allows remote code execution. | |||||
CVE-2021-21466 | 1 Sap | 2 Business Warehouse, Bw\/4hana | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200, allow a low privileged attacker to inject code using a remote enabled function module over the network. Via the function module an attacker can create a malicious ABAP report which could be used to get access to sensitive data, to inject malicious UPDATE statements that could have also impact on the operating system, to disrupt the functionality of the SAP system which can thereby lead to a Denial of Service. | |||||
CVE-2020-24628 | 1 Hpe | 2 Kvm Ip Console Switch G2, Kvm Ip Console Switch G2 Firmware | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
A remote code injection vulnerability was discovered in HPE KVM IP Console Switches version(s): G2 4x1Ex32 Prior to 2.8.3. | |||||
CVE-2021-21305 | 1 Carrierwave Project | 1 Carrierwave | 2024-02-04 | 7.5 HIGH | 8.8 HIGH |
CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1, there is a code injection vulnerability. The "#manipulate!" method inappropriately evals the content of mutation option(:read/:write), allowing attackers to craft a string that can be executed as a Ruby code. If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). This is fixed in versions 1.3.2 and 2.1.1. | |||||
CVE-2020-28367 | 1 Golang | 1 Go | 2024-02-04 | 5.1 MEDIUM | 7.5 HIGH |
Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via malicious gcc flags specified via a #cgo directive. | |||||
CVE-2021-21477 | 1 Sap | 1 Commerce | 2024-02-04 | 9.0 HIGH | 9.9 CRITICAL |
SAP Commerce Cloud, versions - 1808,1811,1905,2005,2011, enables certain users with required privileges to edit drools rules, an authenticated attacker with this privilege will be able to inject malicious code in the drools rules which when executed leads to Remote Code Execution vulnerability enabling the attacker to compromise the underlying host enabling him to impair confidentiality, integrity and availability of the application. | |||||
CVE-2020-25967 | 2 Fastadmin, Microsoft | 2 Fastadmin, Windows | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
The member center function in fastadmin V1.0.0.20200506_beta is vulnerable to a Server-Side Template Injection (SSTI) vulnerability. | |||||
CVE-2020-27192 | 1 Binarynights | 1 Forklift | 2024-02-04 | 7.2 HIGH | 7.8 HIGH |
BinaryNights ForkLift 3.4 was compiled with the com.apple.security.cs.disable-library-validation flag enabled which allowed a local attacker to inject code into ForkLift. This would allow the attacker to run malicious code with escalated privileges through ForkLift's helper tool. | |||||
CVE-2021-25770 | 1 Jetbrains | 1 Youtrack | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
In JetBrains YouTrack before 2020.5.3123, server-side template injection (SSTI) was possible, which could lead to code execution. | |||||
CVE-2019-25022 | 1 Scytl | 1 Secure Vote | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in Scytl sVote 2.1. An attacker can inject code that gets executed by creating an election-event and injecting a payload over an event alias, because the application calls Runtime.getRuntime().exec() without validation. | |||||
CVE-2021-21248 | 1 Onedev Project | 1 Onedev | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability involving the build endpoint parameters. InputSpec is used to define parameters of a Build spec. It does so by using dynamically generated Groovy classes. A user able to control job parameters can run arbitrary code on OneDev's server by injecting arbitrary Groovy code. The ultimate result is in the injection of a static constructor that will run arbitrary code. For a full example refer to the referenced GHSA. This issue was addressed in 4.0.3 by escaping special characters such as quote from user input. |