Vulnerabilities (CVE)

Filtered by CWE-94
Total 3668 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-0671 1 Froxlor 1 Froxlor 2024-02-28 N/A 8.8 HIGH
Code Injection in GitHub repository froxlor/froxlor prior to 2.0.10.
CVE-2023-22381 1 Github 1 Enterprise Server 2024-02-28 N/A 8.8 HIGH
A code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to control the value of environment variables for use with GitHub Actions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.8.0 and was fixed in versions 3.4.15, 3.5.12, 3.6.8, 3.7.5. This vulnerability was reported via the GitHub Bug Bounty program.
CVE-2022-41264 1 Sap 1 Basis 2024-02-28 N/A 8.8 HIGH
Due to the unrestricted scope of the RFC function module, SAP BASIS - versions 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, 791, allows an authenticated non-administrator attacker to access a system class and execute any of its public methods with parameters provided by the attacker. On successful exploitation the attacker can have full control of the system to which the class belongs, causing a high impact on the integrity of the application.
CVE-2023-26477 1 Xwiki 1 Xwiki 2024-02-28 N/A 9.8 CRITICAL
XWiki Platform is a generic wiki platform. Starting in versions 6.3-rc-1 and 6.2.4, it's possible to inject arbitrary wiki syntax including Groovy, Python and Velocity script macros via the `newThemeName` request parameter (URL parameter), in combination with additional parameters. This has been patched in the supported versions 13.10.10, 14.9-rc-1, and 14.4.6. As a workaround, it is possible to edit `FlamingoThemesCode.WebHomeSheet` and manually perform the changes from the patch fixing the issue.
CVE-2023-25717 1 Ruckuswireless 61 E510, H320, H350 and 58 more 2024-02-28 N/A 9.8 CRITICAL
Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.
CVE-2023-22889 1 Smartbear 1 Zephyr Enterprise 2024-02-28 N/A 9.8 CRITICAL
SmartBear Zephyr Enterprise through 7.15.0 mishandles user-defined input during report generation. This could lead to remote code execution by unauthenticated users.
CVE-2023-24078 1 Realtimelogic 1 Fuguhub 2024-02-28 N/A 8.8 HIGH
Real Time Logic FuguHub v8.1 and earlier was discovered to contain a remote code execution (RCE) vulnerability via the component /FuguHub/cmsdocs/.
CVE-2020-36655 1 Yiiframework 1 Gii 2024-02-28 N/A 8.8 HIGH
Yii Yii2 Gii before 2.2.2 allows remote attackers to execute arbitrary code via the Generator.php messageCategory field. The attacker can embed arbitrary PHP code into the model file.
CVE-2022-25894 1 Uflo Project 1 Uflo 2024-02-28 N/A 9.8 CRITICAL
All versions of the package com.bstek.uflo:uflo-core are vulnerable to Remote Code Execution (RCE) in the ExpressionContextImpl class via jexl.createExpression(expression).evaluate(context); functionality, due to improper user input validation.
CVE-2022-46101 1 Ayacms Project 1 Ayacms 2024-02-28 N/A 8.8 HIGH
AyaCMS v3.1.2 was found to have a code flaw in the ust_sql.inc.php file, which allows attackers to cause command execution by inserting malicious code.
CVE-2023-1283 1 Builder 1 Qwik 2024-02-28 N/A 9.8 CRITICAL
Code Injection in GitHub repository builderio/qwik prior to 0.21.0.
CVE-2023-24576 1 Dell 1 Emc Networker 2024-02-28 N/A 9.8 CRITICAL
EMC NetWorker may potentially be vulnerable to an unauthenticated remote code execution vulnerability in the NetWorker Client execution service (nsrexecd) irrespective of any auth used.
CVE-2022-48175 1 Rukovoditel 1 Rukovoditel 2024-02-28 N/A 9.8 CRITICAL
Rukovoditel v3.2.1 was discovered to contain a remote code execution (RCE) vulnerability in the component /rukovoditel/index.php?module=dashboard/ajax_request.
CVE-2023-0888 1 Bbraun 2 Battery-pack Sp With Wifi, Battery-pack Sp With Wifi Firmware 2024-02-28 N/A 7.2 HIGH
An improper neutralization of directives in dynamically evaluated code vulnerability in the WiFi Battery embedded web server in versions L90/U70 and L92/U92 can be used to gain administrative access to the WiFi communication module. An authenticated user, having access to both the medical device WiFi network (such as a biomedical engineering staff member) and the specific B.Braun Battery Pack SP with WiFi web server credentials, could get administrative (root) access on the infusion pump communication module. This could be used as a vector to start further attacks
CVE-2023-27893 1 Sap 1 Solution Manager 2024-02-28 N/A 8.8 HIGH
An attacker authenticated as a user with a non-administrative role and a common remote execution authorization in SAP Solution Manager and ABAP managed systems (ST-PI) - versions 2088_1_700, 2008_1_710, 740, can use a vulnerable interface to execute an application function to perform actions which they would not normally be permitted to perform.  Depending on the function executed, the attack can read or modify any user or application data and can make the application unavailable.
CVE-2023-0048 1 Daloradius 1 Daloradius 2024-02-28 N/A 8.8 HIGH
Code Injection in GitHub repository lirantal/daloradius prior to master-branch.
CVE-2023-22853 1 Tiki 1 Tiki 2024-02-28 N/A 8.8 HIGH
Tiki before 24.1, when feature_create_webhelp is enabled, allows lib/structures/structlib.php PHP Object Injection because of an eval.
CVE-2023-23912 1 Ui 20 Er-10x, Er-10x Firmware, Er-12 and 17 more 2024-02-28 N/A 8.8 HIGH
A vulnerability, found in EdgeRouters Version 2.0.9-hotfix.5 and earlier and UniFi Security Gateways (USG) Version 4.4.56 and earlier with their DHCPv6 prefix delegation set to dhcpv6-stateless or dhcpv6-stateful, allows a malicious actor directly connected to the WAN interface of an affected device to create a remote code execution vulnerability.
CVE-2022-43660 1 Sixapart 1 Movable Type 2024-02-28 N/A 7.2 HIGH
Improper neutralization of Server-Side Includes (SSW) within a web page in Movable Type series allows a remote authenticated attacker with Privilege of 'Manage of Content Types' may execute an arbitrary Perl script and/or an arbitrary OS command. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier.
CVE-2023-23551 1 Controlbyweb 2 X-600m, X-600m Firmware 2024-02-28 N/A 9.8 CRITICAL
Control By Web X-600M devices run Lua scripts and are vulnerable to code injection, which could allow an attacker to remotely execute arbitrary code.