Total
3863 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-6318 | 1 Sap | 1 Abap Platform | 2024-08-04 | 7.2 High |
A Remote Code Execution vulnerability exists in the SAP NetWeaver (ABAP Server, up to release 7.40) and ABAP Platform (> release 7.40).Because of this, an attacker can exploit these products via Code Injection, and potentially enabling to take complete control of the products, including viewing, changing, or deleting data by injecting code into the working memory which is subsequently executed by the application. It can also be used to cause a general fault in the product, causing the products to terminate. | ||||
CVE-2020-6248 | 1 Sap | 1 Adaptive Server Enterprise Backup Server | 2024-08-04 | 7.2 High |
SAP Adaptive Server Enterprise (Backup Server), version 16.0, does not perform the necessary validation checks for an authenticated user while executing DUMP or LOAD command allowing arbitrary code execution or Code Injection. | ||||
CVE-2020-6243 | 1 Sap | 1 Adaptive Server Enterprise | 2024-08-04 | 8.8 High |
Under certain conditions, SAP Adaptive Server Enterprise (XP Server on Windows Platform), versions 15.7, 16.0, does not perform the necessary checks for an authenticated user while executing the extended stored procedure, allowing an attacker to read, modify, delete restricted data on connected servers, leading to Code Injection. | ||||
CVE-2020-6262 | 1 Sap | 1 Application Server | 2024-08-04 | 8.8 High |
Service Data Download in SAP Application Server ABAP (ST-PI, before versions 2008_1_46C, 2008_1_620, 2008_1_640, 2008_1_700, 2008_1_710, 740) allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application and the whole ABAP system leading to Code Injection. | ||||
CVE-2020-6144 | 1 Os4ed | 1 Opensis | 2024-08-04 | 9.8 Critical |
A remote code execution vulnerability exists in the install functionality of OS4Ed openSIS 7.4. The username variable which is set at line 121 in install/Step5.php allows for injection of PHP code into the Data.php file that it writes. An attacker can send an HTTP request to trigger this vulnerability. | ||||
CVE-2020-6143 | 1 Os4ed | 1 Opensis | 2024-08-04 | 9.8 Critical |
A remote code execution vulnerability exists in the install functionality of OS4Ed openSIS 7.4. The password variable which is set at line 122 in install/Step5.php allows for injection of PHP code into the Data.php file that it writes. An attacker can send an HTTP request to trigger this vulnerability. | ||||
CVE-2020-5739 | 1 Grandstream | 12 Gxp1610, Gxp1610 Firmware, Gxp1615 and 9 more | 2024-08-04 | 8.8 High |
Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges. | ||||
CVE-2020-5553 | 1 Mailform | 1 Mailform | 2024-08-04 | 9.8 Critical |
mailform version 1.04 allows remote attackers to execute arbitrary PHP code via unspecified vectors. | ||||
CVE-2020-5593 | 1 Zenphoto | 1 Zenphoto | 2024-08-04 | 8.8 High |
Zenphoto versions prior to 1.5.7 allows an attacker to conduct PHP code injection attacks by leading a user to upload a specially crafted .zip file. | ||||
CVE-2020-5558 | 1 Cutephp | 1 Cutenews | 2024-08-04 | 8.8 High |
CuteNews 2.0.1 allows remote authenticated attackers to execute arbitrary PHP code via unspecified vectors. | ||||
CVE-2020-5258 | 3 Debian, Linuxfoundation, Oracle | 10 Debian Linux, Dojo, Communications Application Session Controller and 7 more | 2024-08-04 | 7.7 High |
In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2 | ||||
CVE-2020-5259 | 1 Linuxfoundation | 1 Dojox | 2024-08-04 | 7.7 High |
In affected versions of dojox (NPM package), the jqMix method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.11.10, 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2 | ||||
CVE-2020-5203 | 1 Fatfreeframework | 1 Fat-free Framework | 2024-08-04 | 9.8 Critical |
In Fat-Free Framework 3.7.1, attackers can achieve arbitrary code execution if developers choose to pass user controlled input (e.g., $_REQUEST, $_GET, or $_POST) to the framework's Clear method. | ||||
CVE-2020-2135 | 2 Jenkins, Redhat | 2 Script Security, Openshift | 2024-08-04 | 8.8 High |
Sandbox protection in Jenkins Script Security Plugin 1.70 and earlier could be circumvented through crafted method calls on objects that implement GroovyInterceptable. | ||||
CVE-2021-46362 | 1 Magnolia-cms | 1 Magnolia Cms | 2024-08-04 | 9.8 Critical |
A Server-Side Template Injection (SSTI) vulnerability in the Registration and Forgotten Password forms of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted payload entered into the fullname parameter. | ||||
CVE-2021-46118 | 1 Jpress | 1 Jpress | 2024-08-04 | 7.2 High |
jpress 4.2.0 is vulnerable to remote code execution via io.jpress.module.article.kit.ArticleNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code. | ||||
CVE-2021-46117 | 1 Jpress | 1 Jpress | 2024-08-04 | 7.2 High |
jpress 4.2.0 is vulnerable to remote code execution via io.jpress.module.page.PageNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code. | ||||
CVE-2021-46114 | 1 Jpress | 1 Jpress | 2024-08-04 | 8.8 High |
jpress v 4.2.0 is vulnerable to RCE via io.jpress.module.product.ProductNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code. | ||||
CVE-2021-46063 | 1 Mingsoft | 1 Mcms | 2024-08-04 | 9.1 Critical |
MCMS v5.2.5 was discovered to contain a Server Side Template Injection (SSTI) vulnerability via the Template Management module. | ||||
CVE-2021-45806 | 1 Jpress | 1 Jpress | 2024-08-04 | 8.8 High |
jpress v4.2.0 admin panel provides a function through which attackers can modify the template and inject some malicious code. |