Vulnerabilities (CVE)

Filtered by CWE-94
Total 3303 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-42298 1 Microsoft 1 Malware Protection Engine 2023-12-28 9.3 HIGH 7.8 HIGH
Microsoft Defender Remote Code Execution Vulnerability
CVE-2021-42296 1 Microsoft 2 365 Apps, Office 2023-12-28 6.9 MEDIUM 7.8 HIGH
Microsoft Word Remote Code Execution Vulnerability
CVE-2023-3656 1 Cashit 1 Cashit\! 2023-12-28 N/A 9.8 CRITICAL
cashIT! - serving solutions. Devices from "PoS/ Dienstleistung, Entwicklung & Vertrieb GmbH" to 03.A06rks 2023.02.37 are affected by an unauthenticated remote code execution vulnerability. This vulnerability can be triggered by an HTTP endpoint exposed to the network.
CVE-2021-42309 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2023-12-28 6.5 MEDIUM 8.8 HIGH
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2023-34237 1 Sabnzbd 1 Sabnzbd 2023-12-23 N/A 9.8 CRITICAL
SABnzbd is an open source automated Usenet download tool. A design flaw was discovered in SABnzbd that could allow remote code execution. Manipulating the Parameters setting in the Notification Script functionality allows code execution with the privileges of the SABnzbd process. Exploiting the vulnerabilities requires access to the web interface. Remote exploitation is possible if users[exposed their setup to the internet or other untrusted networks without setting a username/password. By default SABnzbd is only accessible from `localhost`, with no authentication required for the web interface. This issue has been patched in commits `e3a722` and `422b4f` which have been included in the 4.0.2 release. Users are advised to upgrade. Users unable to upgrade should ensure that a username and password have been set if their instance is web accessible.
CVE-2023-49004 1 Dlink 2 Dir-850l, Dir-850l Firmware 2023-12-22 N/A 9.8 CRITICAL
An issue in D-Link DIR-850L v.B1_FW223WWb01 allows a remote attacker to execute arbitrary code via a crafted script to the en parameter.
CVE-2023-32728 1 Zabbix 1 Zabbix-agent2 2023-12-22 N/A 9.8 CRITICAL
The Zabbix Agent 2 item key smart.disk.get does not sanitize its parameters before passing them to a shell command resulting possible vulnerability for remote code execution.
CVE-2023-41892 1 Craftcms 1 Craft Cms 2023-12-22 N/A 9.8 CRITICAL
Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.
CVE-2023-48390 1 Multisuns 2 Easylog Web\+, Easylog Web\+ Firmware 2023-12-22 N/A 9.8 CRITICAL
Multisuns EasyLog web+ has a code injection vulnerability. An unauthenticated remote attacker can exploit this vulnerability to inject code and access the system to perform arbitrary system operations or disrupt service.
CVE-2021-25283 3 Debian, Fedoraproject, Saltstack 3 Debian Linux, Fedora, Salt 2023-12-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks.
CVE-2015-1311 1 Sap 1 Hana Extended Application Services 2023-12-21 10.0 HIGH N/A
The Extended Application Services (XS) in SAP HANA allows remote attackers to inject arbitrary ABAP code via unspecified vectors, aka SAP Note 2098906. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
CVE-2022-46836 1 Tribe29 1 Checkmk 2023-12-21 N/A 8.8 HIGH
PHP code injection in watolib auth.php and hosttags.php in Tribe29's Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29 allows an attacker to inject and execute PHP code which will be executed upon request of the vulnerable component.
CVE-2023-5512 1 Gitlab 1 Gitlab 2023-12-19 N/A 5.7 MEDIUM
An issue has been discovered in GitLab CE/EE affecting all versions from 16.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. File integrity may be compromised when specific HTML encoding is used for file names leading for incorrect representation in the UI.
CVE-2023-50721 1 Xwiki 1 Xwiki 2023-12-19 N/A 8.8 HIGH
XWiki Platform is a generic wiki platform. Starting in 4.5-rc-1 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the search administration interface doesn't properly escape the id and label of search user interface extensions, allowing the injection of XWiki syntax containing script macros including Groovy macros that allow remote code execution, impacting the confidentiality, integrity and availability of the whole XWiki instance. This attack can be executed by any user who can edit some wiki page like the user's profile (editable by default) as user interface extensions that will be displayed in the search administration can be added on any document by any user. The necessary escaping has been added in XWiki 14.10.15, 15.5.2 and 15.7RC1. As a workaround, the patch can be applied manually applied to the page `XWiki.SearchAdmin`.
CVE-2023-50723 1 Xwiki 1 Xwiki 2023-12-19 N/A 8.8 HIGH
XWiki Platform is a generic wiki platform. Starting in 2.3 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, anyone who can edit an arbitrary wiki page in an XWiki installation can gain programming right through several cases of missing escaping in the code for displaying sections in the administration interface. This impacts the confidentiality, integrity and availability of the whole XWiki installation. Normally, all users are allowed to edit their own user profile so this should be exploitable by all users of the XWiki instance. This has been fixed in XWiki 14.10.15, 15.5.2 and 15.7RC1. The patches can be manually applied to the `XWiki.ConfigurableClassMacros` and `XWiki.ConfigurableClass` pages.
CVE-2023-50710 1 Hono 1 Hono 2023-12-19 N/A 4.3 MEDIUM
Hono is a web framework written in TypeScript. Prior to version 3.11.7, clients may override named path parameter values from previous requests if the application is using TrieRouter. So, there is a risk that a privileged user may use unintended parameters when deleting REST API resources. TrieRouter is used either explicitly or when the application matches a pattern that is not supported by the default RegExpRouter. Version 3.11.7 includes the change to fix this issue. As a workaround, avoid using TrieRouter directly.
CVE-2019-0330 1 Sap 1 Diagnostics Agent 2023-12-19 6.5 MEDIUM 9.1 CRITICAL
The OS Command Plugin in the transaction GPA_ADMIN and the OSCommand Console of SAP Diagnostic Agent (LM-Service), version 7.2, allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.
CVE-2023-0792 1 Phpmyfaq 1 Phpmyfaq 2023-12-18 N/A 5.4 MEDIUM
Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
CVE-2023-0788 1 Phpmyfaq 1 Phpmyfaq 2023-12-18 N/A 9.8 CRITICAL
Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
CVE-2008-2160 1 Microsoft 1 Windows Embedded Compact 2023-12-15 9.3 HIGH N/A
Multiple unspecified vulnerabilities in the JPEG (GDI+) and GIF image processing in Microsoft Windows CE 5.0 allow remote attackers to execute arbitrary code via crafted (1) JPEG and (2) GIF images.