Show filters
1,558 Total Results
Displaying 281-290 of 1,558
Sort by:
Attacker Value
Unknown
CVE-2024-43128
Disclosure Date: August 13, 2024 (last updated February 26, 2025)
Improper Control of Generation of Code ('Code Injection') vulnerability in WC Product Table WooCommerce Product Table Lite allows Code Injection.This issue affects WooCommerce Product Table Lite: from n/a through 3.5.1.
0
Attacker Value
Unknown
CVE-2024-7094
Disclosure Date: August 13, 2024 (last updated February 26, 2025)
The JS Help Desk – The Ultimate Help Desk & Support Plugin plugin for WordPress is vulnerable to PHP Code Injection leading to Remote Code Execution in all versions up to, and including, 2.8.6 via the 'storeTheme' function. This is due to a lack of sanitization on user-supplied values, which replace values in the style.php file, along with missing capability checks. This makes it possible for unauthenticated attackers to execute code on the server. This issue was partially patched in 2.8.6 when the code injection issue was resolved, and fully patched in 2.8.7 when the missing authorization and cross-site request forgery protection was added.
0
Attacker Value
Unknown
CVE-2024-42745
Disclosure Date: August 12, 2024 (last updated February 26, 2025)
In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setUPnPCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands.
0
Attacker Value
Unknown
CVE-2024-41651
Disclosure Date: August 12, 2024 (last updated February 26, 2025)
An issue in Prestashop v.8.1.7 and before allows a remote attacker to execute arbitrary code via the module upgrade functionality. NOTE: this is disputed by multiple parties, who report that exploitation requires that an attacker be able to hijack network requests made by an admin user (who, by design, is allowed to change the code that is running on the server).
0
Attacker Value
Unknown
CVE-2024-5651
Disclosure Date: August 12, 2024 (last updated February 26, 2025)
A flaw was found in the Fence Agents Remediation operator. This vulnerability can allow a Remote Code Execution (RCE) primitive by supplying an arbitrary command to execute in the --ssh-path/--telnet-path arguments. A low-privilege user, for example, a user with developer access, can create a specially crafted FenceAgentsRemediation for a fence agent supporting --ssh-path/--telnet-path arguments to execute arbitrary commands on the operator's pod. This RCE leads to a privilege escalation, first as the service account running the operator, then to another service account with cluster-admin privileges.
0
Attacker Value
Unknown
CVE-2024-40487
Disclosure Date: August 12, 2024 (last updated February 26, 2025)
A Stored Cross Site Scripting (XSS) vulnerability was found in "/view_type.php" of Kashipara Live Membership System v1.0, which allows remote attackers to execute arbitrary code via membershipType parameter.
0
Attacker Value
Unknown
CVE-2024-22123
Disclosure Date: August 12, 2024 (last updated February 26, 2025)
Setting SMS media allows to set GSM modem file. Later this file is used as Linux device. But due everything is a file for Linux, it is possible to set another file, e.g. log file and zabbix_server will try to communicate with it as modem. As a result, log file will be broken with AT commands and small part for log file content will be leaked to UI.
0
Attacker Value
Unknown
CVE-2024-22116
Disclosure Date: August 12, 2024 (last updated February 26, 2025)
An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.
0
Attacker Value
Unknown
CVE-2023-50810
Disclosure Date: August 12, 2024 (last updated February 26, 2025)
In certain Sonos products before Sonos S1 Release 11.12 and S2 release 15.9, a vulnerability exists in the U-Boot component of the firmware that allow persistent arbitrary code execution with Linux kernel privileges. A failure to correctly handle the return value of the setenv command can be used to override the kernel command-line parameters and ultimately bypass the Secure Boot implementation. This affects PLAY5 gen 2, PLAYBASE, PLAY:1, One, One SL, and Amp.
0
Attacker Value
Unknown
CVE-2023-31315
Disclosure Date: August 12, 2024 (last updated February 26, 2025)
Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.
0