Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by CWE-94
Total 2906 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-3173 1 Custom Content Type Manager Project 1 Custom Content Type Manager 2022-07-14 6.5 MEDIUM 7.2 HIGH
custom-content-type-manager Wordpress plugin can be used by an administrator to achieve arbitrary PHP remote code execution.
CVE-2022-23642 1 Sourcegraph 1 Sourcegraph 2022-07-13 6.0 MEDIUM 8.8 HIGH
Sourcegraph is a code search and navigation engine. Sourcegraph prior to version 3.37 is vulnerable to remote code execution in the `gitserver` service. The service acts as a git exec proxy, and fails to properly restrict calling `git config`. This allows an attacker to set the git `core.sshCommand` option, which sets git to use the specified command instead of ssh when they need to connect to a remote system. Exploitation of this vulnerability depends on how Sourcegraph is deployed. An attacker able to make HTTP requests to internal services like gitserver is able to exploit it. This issue is patched in Sourcegraph version 3.37. As a workaround, ensure that requests to gitserver are properly protected.
CVE-2020-28905 1 Nagios 1 Fusion 2022-07-12 6.5 MEDIUM 8.8 HIGH
Improper Input Validation in Nagios Fusion 4.1.8 and earlier allows an authenticated attacker to execute remote code via table pagination.
CVE-2021-42309 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2022-07-12 6.5 MEDIUM 8.8 HIGH
Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-42294.
CVE-2021-22205 1 Gitlab 1 Gitlab 2022-07-12 7.5 HIGH 10.0 CRITICAL
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.
CVE-2021-46063 1 Mingsoft 1 Mcms 2022-07-12 6.4 MEDIUM 9.1 CRITICAL
MCMS v5.2.5 was discovered to contain a Server Side Template Injection (SSTI) vulnerability via the Template Management module.
CVE-2021-43269 1 Code42 1 Code42 2022-07-12 6.5 MEDIUM 8.8 HIGH
In Code42 app before 8.8.0, eval injection allows an attacker to change a device’s proxy configuration to use a malicious proxy auto-config (PAC) file, leading to arbitrary code execution. This affects Incydr Basic, Advanced, and Gov F1; CrashPlan Cloud; and CrashPlan for Small Business. (Incydr Professional and Enterprise are unaffected.)
CVE-2021-43097 1 Diyhi 1 Bbs 2022-07-12 6.5 MEDIUM 7.2 HIGH
A Server-side Template Injection (SSTI) vulnerability exists in bbs 5.3 in TemplateManageAction.javawhich could let a malicoius user execute arbitrary code.
CVE-2021-27230 1 Expressionengine 1 Expressionengine 2022-07-12 6.5 MEDIUM 8.8 HIGH
ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory.
CVE-2021-39383 1 Diaowen 1 Dwsurvey 2022-07-12 7.5 HIGH 9.8 CRITICAL
DWSurvey v3.2.0 was discovered to contain a remote command execution (RCE) vulnerability via the component /sysuser/SysPropertyAction.java.
CVE-2021-45806 1 Jpress 1 Jpress 2022-07-12 6.5 MEDIUM 8.8 HIGH
jpress v4.2.0 admin panel provides a function through which attackers can modify the template and inject some malicious code.
CVE-2021-40084 1 Artixlinux 1 Opensysusers 2022-07-12 7.5 HIGH 9.8 CRITICAL
opensysusers through 0.6 does not safely use eval on files in sysusers.d that may contain shell metacharacters. For example, it allows command execution via a crafted GECOS field whereas systemd-sysusers (a program with the same specification) does not do that.
CVE-2020-8644 1 Playsms 1 Playsms 2022-07-12 7.5 HIGH 9.8 CRITICAL
PlaySMS before 1.4.3 does not sanitize inputs from a malicious string.
CVE-2021-39114 1 Atlassian 2 Confluence Data Center, Confluence Server 2022-07-12 6.5 MEDIUM 8.8 HIGH
Affected versions of Atlassian Confluence Server and Data Center allow users with a valid account on a Confluence Data Center instance to execute arbitrary Java code or run arbitrary system commands by injecting an OGNL payload. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.
CVE-2021-25877 1 Youphptube 1 Youphptube 2022-07-12 9.0 HIGH 7.2 HIGH
AVideo/YouPHPTube 10.0 and prior is affected by Insecure file write. An administrator privileged user is able to write files on filesystem using flag and code variables in file save.php.
CVE-2020-20601 1 Thinkcmf 1 Thinkcmf 2022-07-12 7.5 HIGH 9.8 CRITICAL
An issue in ThinkCMF X2.2.2 and below allows attackers to execute arbitrary code via a crafted packet.
CVE-2022-2073 1 Getgrav 1 Grav 2022-07-08 6.5 MEDIUM 7.2 HIGH
Code Injection in GitHub repository getgrav/grav prior to 1.7.34.
CVE-2017-20099 1 Analytics Stats Counter Statistics Project 1 Analytics Stats Counter Statistics 2022-07-06 7.5 HIGH 9.8 CRITICAL
A vulnerability was found in Analytics Stats Counter Statistics Plugin 1.2.2.5 and classified as critical. This issue affects some unknown processing. The manipulation leads to code injection. The attack may be initiated remotely.
CVE-2021-32756 1 Manageiq 1 Manageiq 2022-07-02 9.0 HIGH 8.8 HIGH
ManageIQ is an open-source management platform. In versions prior to jansa-4, kasparov-2, and lasker-1, there is a flaw in the MiqExpression module of ManageIQ where a low privilege user could enter a crafted Ruby string which would be evaluated. Successful exploitation will allow an attacker to execute arbitrary code with root privileges on the host system. There are patches for this issue in releases named jansa-4, kasparov-2, and lasker-1. If possible, restrict users, via RBAC, to only the part of the application that they need access to. While MiqExpression is widely used throughout the product, restricting users can limit the surface of the attack.
CVE-2021-32817 1 Express Handlebars Project 1 Express Handlebars 2022-07-02 4.3 MEDIUM 6.8 MEDIUM
express-hbs is an Express handlebars template engine. express-hbs mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .hbs appended to them. For complete details refer to the referenced GHSL-2021-019 report. Notes in documentation have been added to help users of express-hbs avoid this potential information exposure vulnerability.