Show filters
826 Total Results
Displaying 161-170 of 826
Sort by:
Attacker Value
Unknown
CVE-2023-3224
Disclosure Date: June 13, 2023 (last updated February 25, 2025)
Code Injection in GitHub repository nuxt/nuxt prior to 3.5.3.
0
Attacker Value
Unknown
CVE-2023-30179
Disclosure Date: June 13, 2023 (last updated February 25, 2025)
CraftCMS version 3.7.59 is vulnerable to Server-Side Template Injection (SSTI). An authenticated attacker can inject Twig Template to User Photo Location field when setting User Photo Location in User Settings, lead to Remote Code Execution. NOTE: the vendor disputes this because only Administrators can add this Twig code, and (by design) Administrators are allowed to do that by default.
0
Attacker Value
Unknown
CVE-2023-32546
Disclosure Date: June 13, 2023 (last updated February 25, 2025)
Code injection vulnerability exists in Chatwork Desktop Application (Mac) 2.6.43 and earlier. If this vulnerability is exploited, a non-administrative user of the Mac where the product is installed may store and obtain audio and image data from the product without the user's consent.
0
Attacker Value
Unknown
CVE-2023-25910
Disclosure Date: June 13, 2023 (last updated February 25, 2025)
A vulnerability has been identified in SIMATIC PCS 7 (All versions < V9.1 SP2 UC04), SIMATIC S7-PM (All versions < V5.7 SP1 HF1), SIMATIC S7-PM (All versions < V5.7 SP2 HF1), SIMATIC STEP 7 V5 (All versions < V5.7). The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server.
An attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system's server.
0
Attacker Value
Unknown
CVE-2023-34468
Disclosure Date: June 12, 2023 (last updated February 25, 2025)
The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution.
The resolution validates the Database URL and rejects H2 JDBC locations.
You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
0
Attacker Value
Unknown
CVE-2023-35034
Disclosure Date: June 12, 2023 (last updated February 25, 2025)
Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8 and Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8 allow remote code execution by unauthenticated users, aka OSFOURK-24033.
0
Attacker Value
Unknown
CVE-2019-16283
Disclosure Date: June 09, 2023 (last updated February 25, 2025)
A potential security vulnerability has been identified with a version of the HP Softpaq installer that can lead to arbitrary code execution.
0
Attacker Value
Unknown
CVE-2023-34112
Disclosure Date: June 09, 2023 (last updated February 25, 2025)
JavaCPP Presets is a project providing Java distributions of native C++ libraries. All the actions in the `bytedeco/javacpp-presets` use the `github.event.head_commit.message` parameter in an insecure way. For example, the commit message is used in a run statement - resulting in a command injection vulnerability due to string interpolation. No exploitation has been reported. This issue has been addressed in version 1.5.9. Users of JavaCPP Presets are advised to upgrade as a precaution.
0
Attacker Value
Unknown
CVE-2023-29404
Disclosure Date: June 08, 2023 (last updated February 25, 2025)
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.
0
Attacker Value
Unknown
CVE-2023-34237
Disclosure Date: June 07, 2023 (last updated February 25, 2025)
SABnzbd is an open source automated Usenet download tool. A design flaw was discovered in SABnzbd that could allow remote code execution. Manipulating the Parameters setting in the Notification Script functionality allows code execution with the privileges of the SABnzbd process. Exploiting the vulnerabilities requires access to the web interface. Remote exploitation is possible if users[exposed their setup to the internet or other untrusted networks without setting a username/password. By default SABnzbd is only accessible from `localhost`, with no authentication required for the web interface. This issue has been patched in commits `e3a722` and `422b4f` which have been included in the 4.0.2 release. Users are advised to upgrade. Users unable to upgrade should ensure that a username and password have been set if their instance is web accessible.
0