Total
3863 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-8218 | 2 Ivanti, Pulsesecure | 4 Connect Secure, Policy Secure, Pulse Connect Secure and 1 more | 2024-08-04 | 7.2 High |
A code injection vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to crafted a URI to perform an arbitrary code execution via the admin web interface. | ||||
CVE-2020-8149 | 1 Logkitty Project | 1 Logkitty | 2024-08-04 | 9.8 Critical |
Lack of output sanitization allowed an attack to execute arbitrary shell commands via the logkitty npm package before version 0.7.1. | ||||
CVE-2020-8163 | 2 Debian, Rubyonrails | 2 Debian Linux, Rails | 2024-08-04 | 8.8 High |
The is a code injection vulnerability in versions of Rails prior to 5.0.1 that wouldallow an attacker who controlled the `locals` argument of a `render` call to perform a RCE. | ||||
CVE-2020-8140 | 2 Apple, Nextcloud | 2 Macos, Desktop | 2024-08-04 | 6.7 Medium |
A code injection in Nextcloud Desktop Client 2.6.2 for macOS allowed to load arbitrary code when starting the client with DYLD_INSERT_LIBRARIES set in the environment. | ||||
CVE-2020-8137 | 1 Blamer Project | 1 Blamer | 2024-08-04 | 9.8 Critical |
Code injection vulnerability in blamer 1.0.0 and earlier may result in remote code execution when the input can be controlled by an attacker. | ||||
CVE-2020-8141 | 1 Dot Project | 1 Dot | 2024-08-04 | 8.8 High |
The dot package v1.1.2 uses Function() to compile templates. This can be exploited by the attacker if they can control the given template or if they can control the value set on Object.prototype. | ||||
CVE-2020-8132 | 1 Pdf-image Project | 1 Pdf-image | 2024-08-04 | 9.8 Critical |
Lack of input validation in pdf-image npm package version <= 2.0.0 may allow an attacker to run arbitrary code if PDF file path is constructed based on untrusted user input. | ||||
CVE-2020-8129 | 1 Script-manager Project | 1 Script-manager | 2024-08-04 | 9.8 Critical |
An unintended require vulnerability in script-manager npm package version 0.8.6 and earlier may allow attackers to execute arbitrary code. | ||||
CVE-2020-7674 | 1 Access-policy Project | 1 Access-policy | 2024-08-04 | 9.8 Critical |
access-policy through 3.1.0 is vulnerable to Arbitrary Code Execution. User input provided to the `template` function is executed by the `eval` function resulting in code execution. | ||||
CVE-2020-7675 | 1 Cd-messenger Project | 1 Cd-messenger | 2024-08-04 | 9.8 Critical |
cd-messenger through 2.7.26 is vulnerable to Arbitrary Code Execution. User input provided to the `color` argument executed by the `eval` function resulting in code execution. | ||||
CVE-2020-7673 | 1 Node-extend Project | 1 Node-extend | 2024-08-04 | 9.8 Critical |
node-extend through 0.2.0 is vulnerable to Arbitrary Code Execution. User input provided to the argument `A` of `extend` function`(A,B,as,isAargs)` located within `lib/extend.js` is executed by the `eval` function, resulting in code execution. | ||||
CVE-2020-7672 | 1 Mosc Project | 1 Mosc | 2024-08-04 | 8.6 High |
mosc through 1.0.0 is vulnerable to Arbitrary Code Execution. User input provided to `properties` argument is executed by the `eval` function, resulting in code execution. | ||||
CVE-2020-7609 | 1 Node-rules Project | 1 Node-rules | 2024-08-04 | 9.8 Critical |
node-rules including 3.0.0 and prior to 5.0.0 allows injection of arbitrary commands. The argument rules of function "fromJSON()" can be controlled by users without any sanitization. | ||||
CVE-2020-7480 | 1 Schneider-electric | 22 Andover Continuum 5720, Andover Continuum 5720 Firmware, Andover Continuum 5740 and 19 more | 2024-08-04 | 9.8 Critical |
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists in Andover Continuum (All versions), which could cause files on the application server filesystem to be viewable when an attacker interferes with an application's processing of XML data. | ||||
CVE-2020-7472 | 1 Sugarcrm | 1 Sugarcrm | 2024-08-04 | 9.8 Critical |
An authorization bypass and PHP local-file-include vulnerability in the installation component of SugarCRM before 8.0, 8.0 before 8.0.7, 9.0 before 9.0.4, and 10.0 before 10.0.0 allows for unauthenticated remote code execution against a configured SugarCRM instance via crafted HTTP requests. (This is exploitable even after installation is completed.). | ||||
CVE-2020-7381 | 1 Rapid7 | 1 Nexpose | 2024-08-04 | 5.8 Medium |
In Rapid7 Nexpose installer versions prior to 6.6.40, the Nexpose installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during a Security Console installation and any arbitrary code executable using the same file name. | ||||
CVE-2020-7373 | 1 Vbulletin | 1 Vbulletin | 2024-08-04 | 9.8 Critical |
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. ALSO NOTE: CVE-2020-7373 is a duplicate of CVE-2020-17496. CVE-2020-17496 is the preferred CVE ID to track this vulnerability. | ||||
CVE-2020-7012 | 1 Elastic | 1 Kibana | 2024-08-04 | 8.8 High |
Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 contain a prototype pollution flaw in the Upgrade Assistant. An authenticated attacker with privileges to write to the Kibana index could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system. | ||||
CVE-2020-7013 | 2 Elastic, Redhat | 3 Kibana, Openshift, Openshift Container Platform | 2024-08-04 | 7.2 High |
Kibana versions before 6.8.9 and 7.7.0 contain a prototype pollution flaw in TSVB. An authenticated attacker with privileges to create TSVB visualizations could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system. | ||||
CVE-2020-6836 | 1 Hot-formula-parser Project | 1 Hot-formula-parser | 2024-08-04 | 9.8 Critical |
grammar-parser.jison in the hot-formula-parser package before 3.0.1 for Node.js is vulnerable to arbitrary code injection. The package fails to sanitize values passed to the parse function and concatenates them in an eval call. If a value of the formula is taken from user-controlled input, it may allow attackers to run arbitrary commands on the server. |