Show filters
980 Total Results
Displaying 211-220 of 980
Sort by:
Attacker Value
Unknown

CVE-2023-0462

Disclosure Date: September 20, 2023 (last updated February 25, 2025)
An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.
Attacker Value
Unknown

CVE-2023-40221

Disclosure Date: September 18, 2023 (last updated February 25, 2025)
The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legitimate user accesses the web section (MAIL SERVER) where the information is displayed. Injection can be done on parameter MAIL_RCV. When a legitimate user attempts to review NOTIFICATION/MAIL SERVER, the injected code will be executed.
Attacker Value
Unknown

CVE-2023-34195

Disclosure Date: September 18, 2023 (last updated February 25, 2025)
An issue was discovered in SystemFirmwareManagementRuntimeDxe in Insyde InsydeH2O with kernel 5.0 through 5.5. The implementation of the GetImage method retrieves the value of a runtime variable named GetImageProgress, and later uses this value as a function pointer. This variable is wiped out by the same module near the end of the function. By setting this UEFI variable from the OS to point into custom code, an attacker could achieve arbitrary code execution in the DXE phase, before several chipset locks are set.
Attacker Value
Unknown

CVE-2023-34999

Disclosure Date: September 18, 2023 (last updated February 25, 2025)
A command injection vulnerability exists in RTS VLink Virtual Matrix Software Versions v5 (< 5.7.6) and v6 (< 6.5.0) that allows an attacker to perform arbitrary code execution via the admin web interface.
Attacker Value
Unknown

CVE-2023-4977

Disclosure Date: September 15, 2023 (last updated February 25, 2025)
Code Injection in GitHub repository librenms/librenms prior to 23.9.0.
Attacker Value
Unknown

CVE-2023-40621

Disclosure Date: September 12, 2023 (last updated February 25, 2025)
SAP PowerDesigner Client - version 16.7, allows an unauthenticated attacker to inject VBScript code in a document and have it opened by an unsuspecting user, to have it executed by the application on behalf of the user. The application has a security option to disable or prompt users before untrusted scripts are executed, but this is not set as default.
Attacker Value
Unknown

CVE-2023-42471

Disclosure Date: September 11, 2023 (last updated February 25, 2025)
The wave.ai.browser application through 1.0.35 for Android allows a remote attacker to execute arbitrary JavaScript code via a crafted intent. It contains a manifest entry that exports the wave.ai.browser.ui.splash.SplashScreen activity. This activity uses a WebView component to display web content and doesn't adequately validate or sanitize the URI or any extra data passed in the intent by a third party application (with no permissions).
Attacker Value
Unknown

CVE-2023-42470

Disclosure Date: September 11, 2023 (last updated February 25, 2025)
The Imou Life com.mm.android.smartlifeiot application through 6.8.0 for Android allows Remote Code Execution via a crafted intent to an exported component. This relates to the com.mm.android.easy4ip.MainActivity activity. JavaScript execution is enabled in the WebView, and direct web content loading occurs.
Attacker Value
Unknown

CVE-2023-39320

Disclosure Date: September 08, 2023 (last updated February 25, 2025)
The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software.
Attacker Value
Unknown

CVE-2023-39956

Disclosure Date: September 06, 2023 (last updated February 25, 2025)
Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron.