Total
3574 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-7480 | 1 Schneider-electric | 22 Andover Continuum 5720, Andover Continuum 5720 Firmware, Andover Continuum 5740 and 19 more | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists in Andover Continuum (All versions), which could cause files on the application server filesystem to be viewable when an attacker interferes with an application's processing of XML data. | |||||
CVE-2019-12120 | 1 Onap | 1 Open Network Automation Platform | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in ONAP VNFSDK through Dublin. By accessing port 8000 of demo-vnfsdk-vnfsdk, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected. | |||||
CVE-2020-7205 | 1 Hpe | 118 Apollo 2000 Gen10 Plus System, Apollo 4200 Gen10 Server, Apollo 4200 Gen9 Server and 115 more | 2024-02-04 | 7.2 HIGH | 6.7 MEDIUM |
A potential security vulnerability has been identified in HPE Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. The vulnerability could be locally exploited to allow arbitrary code execution during the boot process. **Note:** This vulnerability is related to using insmod in GRUB2 in the specific impacted HPE product and HPE is addressing this issue. HPE has made the following software updates and mitigation information to resolve the vulnerability in Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. HPE provided latest Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting Toolkit which includes the GRUB2 patch to resolve this vulnerability. These new boot images will update GRUB2 and the Forbidden Signature Database (DBX). After the DBX is updated, users will not be able to boot to the older IP, SPP or Scripting ToolKit with Secure Boot enabled. HPE have provided a standalone DBX update tool to work with Microsoft Windows, and supported Linux Operating Systems. These tools can be used to update the Forbidden Signature Database (DBX) from within the OS. **Note:** This DBX update mitigates the GRUB2 issue with insmod enabled, and the "Boot Hole" issue for HPE signed GRUB2 applications. | |||||
CVE-2020-15817 | 1 Jetbrains | 1 Youtrack | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
In JetBrains YouTrack before 2020.1.1331, an external user could execute commands against arbitrary issues. | |||||
CVE-2020-6143 | 1 Os4ed | 1 Opensis | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
A remote code execution vulnerability exists in the install functionality of OS4Ed openSIS 7.4. The password variable which is set at line 122 in install/Step5.php allows for injection of PHP code into the Data.php file that it writes. An attacker can send an HTTP request to trigger this vulnerability. | |||||
CVE-2019-12115 | 1 Onap | 1 Open Network Automation Platform | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in ONAP SDC through Dublin. By accessing port 4000 of demo-sdc-sdc-be pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected. | |||||
CVE-2020-10055 | 1 Siemens | 2 Desigo Consumption Control, Desigo Consumption Control Compact | 2024-02-04 | 9.3 HIGH | 9.8 CRITICAL |
A vulnerability has been identified in Desigo CC (V4.x), Desigo CC (V3.x), Desigo CC Compact (V4.x), Desigo CC Compact (V3.x). Affected applications are delivered with a 3rd party component (BIRT) that contains a remote code execution vulnerability if the Advanced Reporting Engine is enabled. The vulnerability could allow a remote unauthenticated attacker to execute arbitrary commands on the server with SYSTEM privileges. | |||||
CVE-2020-9199 | 1 Huawei | 6 B2368-22, B2368-22 Firmware, B2368-57 and 3 more | 2024-02-04 | 7.7 HIGH | 6.8 MEDIUM |
B2368-22 V100R001C00;B2368-57 V100R001C00;B2368-66 V100R001C00 have a command injection vulnerability. An attacker with high privileges may exploit this vulnerability through some operations on the LAN. Due to insufficient input validation of some parameters, the attacker can exploit this vulnerability to inject commands to the target device. | |||||
CVE-2020-7381 | 1 Rapid7 | 1 Nexpose | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
In Rapid7 Nexpose installer versions prior to 6.6.40, the Nexpose installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during a Security Console installation and any arbitrary code executable using the same file name. | |||||
CVE-2020-6230 | 1 Sap | 1 Orientdb | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
SAP OrientDB, version 3.0, allows an authenticated attacker with script execute/write permissions to inject code that can be executed by the application and lead to Code Injection. An attacker could thereby control the behavior of the application. | |||||
CVE-2019-20002 | 1 Solarwinds | 1 Webhelpdesk | 2024-02-04 | 6.0 MEDIUM | 7.8 HIGH |
Formula Injection exists in the export feature in SolarWinds WebHelpDesk 12.7.1 via a value (provided by a low-privileged user in the Subject field of a help request form) that is mishandled in a TicketActions/view?tab=group TSV export by an admin user. | |||||
CVE-2020-13144 | 1 Edx | 1 Open Edx Platform | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
Studio in Open edX Ironwood 2.5, when CodeJail is not used, allows a user to go to the "Create New course>New section>New subsection>New unit>Add new component>Problem button>Advanced tab>Custom Python evaluated code" screen, edit the problem, and execute Python code. This leads to arbitrary code execution. | |||||
CVE-2020-8137 | 1 Blamer Project | 1 Blamer | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Code injection vulnerability in blamer 1.0.0 and earlier may result in remote code execution when the input can be controlled by an attacker. | |||||
CVE-2019-16108 | 1 Phpbb | 1 Phpbb | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
phpBB 3.2.7 allows adding an arbitrary Cascading Style Sheets (CSS) token sequence to a page through BBCode. | |||||
CVE-2013-1666 | 1 Foswiki | 1 Foswiki | 2024-02-04 | 6.8 MEDIUM | 9.8 CRITICAL |
Foswiki before 1.1.8 contains a code injection vulnerability in the MAKETEXT macro. | |||||
CVE-2020-6836 | 1 Hot-formula-parser Project | 1 Hot-formula-parser | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
grammar-parser.jison in the hot-formula-parser package before 3.0.1 for Node.js is vulnerable to arbitrary code injection. The package fails to sanitize values passed to the parse function and concatenates them in an eval call. If a value of the formula is taken from user-controlled input, it may allow attackers to run arbitrary commands on the server. | |||||
CVE-2019-17302 | 1 Sugarcrm | 1 Sugarcrm | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
SugarCRM before 8.0.4 and 9.x before 9.0.2 allows PHP code injection in the ModuleBuilder module by a Developer user. | |||||
CVE-2019-17575 | 1 Wbce | 1 Wbce Cms | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
A file-rename filter bypass exists in admin/media/rename.php in WBCE CMS 1.4.0 and earlier. This can be exploited by an authenticated user with admin privileges to rename a media filename and extension. (For example: place PHP code in a .jpg file, and then change the file's base name to filename.ph and change the file's extension to p. Because of concatenation, the name is then treated as filename.php.) At the result, remote attackers can execute arbitrary PHP code. | |||||
CVE-2019-4000 | 2 Apple, Druva | 2 Macos, Insync | 2024-02-04 | 7.2 HIGH | 7.8 HIGH |
Improper neutralization of directives in dynamically evaluated code in Druva inSync Mac OS Client 6.5.0 allows a local, authenticated attacker to execute arbitrary Python expressions with root privileges. | |||||
CVE-2020-10257 | 1 Themerex | 63 Addons, Aldo-gutenberg Wordpress Blog Theme, Amuli and 60 more | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
The ThemeREX Addons plugin before 2020-03-09 for WordPress lacks access control on the /trx_addons/v2/get/sc_layout REST API endpoint, allowing for PHP functions to be executed by any users, because includes/plugin.rest-api.php calls trx_addons_rest_get_sc_layout with an unsafe sc parameter. |