CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Visual Studio Remote Code Execution Vulnerability |
Microsoft Dynamics 365 Business Central Remote Code Execution Vulnerability |
Microsoft Office Remote Code Execution Vulnerability |
Microsoft Outlook Remote Code Execution Vulnerability |
Microsoft Office Remote Code Execution Vulnerability |
Microsoft Office Remote Code Execution Vulnerability |
Microsoft SharePoint Server Remote Code Execution Vulnerability |
Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability |
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Windows Distributed File System (DFS) Remote Code Execution Vulnerability |
Windows Standards-Based Storage Management Service Remote Code Execution Vulnerability |
Windows OLE Remote Code Execution Vulnerability |
Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability |
Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability |
Microsoft Event Trace Log File Parsing Remote Code Execution Vulnerability |
An authenticated command injection vulnerability exists in Tiki Wiki CMS versions ≤14.1, ≤12.4 LTS, ≤9.10 LTS, and ≤6.14 via the `viewmode` GET parameter in `tiki-calendar.php`. When the calendar module is enabled and an authenticated user has permission to access it, an attacker can inject and execute arbitrary PHP code. Successful exploitation leads to remote code execution in the context of the web server user. |
Nexxt Solutions NCM-X1800 Mesh Router firmware UV1.2.7 and below contains an authenticated command injection vulnerability in the firmware update feature. The /web/um_fileName_set.cgi and /web/um_web_upgrade.cgi endpoints fail to properly sanitize the upgradeFileName parameter, allowing authenticated attackers to execute arbitrary OS commands on the device, resulting in remote code execution. |
An authenticated multi-stage remote code execution vulnerability exists in Riverbed SteelCentral NetProfiler and NetExpress 10.8.7 virtual appliances. A SQL injection vulnerability in the '/api/common/1.0/login' endpoint can be exploited to create a new user account in the appliance database. This user can then trigger a command injection vulnerability in the '/index.php?page=licenses' endpoint to execute arbitrary commands. The attacker may escalate privileges to root by exploiting an insecure sudoers configuration that allows the 'mazu' user to execute arbitrary commands as root via SSH key extraction and command chaining. Successful exploitation allows full remote root access to the virtual appliance. |
LaRecipe is an application that allows users to create documentation with Markdown inside a Laravel app. Versions prior to 2.8.1 are vulnerable to Server-Side Template Injection (SSTI), which could potentially lead to Remote Code Execution (RCE) in vulnerable configurations. Attackers could execute arbitrary commands on the server, access sensitive environment variables, and/or escalate access depending on server configuration. Users are strongly advised to upgrade to version v2.8.1 or later to receive a patch. |