Page 18 of 55195 results (0.043 seconds)

CVSS: 9.8EPSS: %CPEs: -EXPL: 0

09 Apr 2025 — This vulnerability allows remote attackers to execute arbitrary code on affected installations of MedDream PACS Server. ... An attacker can leverage this vulnerability to execute code in the context of the service account. •

CVSS: 9.8EPSS: %CPEs: -EXPL: 0

09 Apr 2025 — This vulnerability allows remote attackers to execute arbitrary code on affected installations of MedDream PACS Server. ... An attacker can leverage this vulnerability to execute code in the context of the service account. •

CVSS: 9.8EPSS: %CPEs: -EXPL: 0

09 Apr 2025 — This vulnerability allows remote attackers to execute arbitrary code on affected installations of MedDream PACS Server. ... An attacker can leverage this vulnerability to execute code in the context of the service account. •

CVSS: 9.8EPSS: %CPEs: -EXPL: 0

09 Apr 2025 — This vulnerability allows remote attackers to execute arbitrary code on affected installations of MedDream PACS Server. ... An attacker can leverage this vulnerability to execute code in the context of the service account. •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

09 Apr 2025 — The Squeeze – Image Optimization & Compression, WebP Conversion plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://patchstack.com/database/wordpress/plugin/squeeze/vulnerability/wordpress-squeeze-plugin-1-6-arbitrary-file-upload-vulnerability? • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

09 Apr 2025 — A remote attacker could use this issue to cause HAProxy to crash, resulting in a denial of service, or possibly execute arbitrary code. • https://github.com/haproxy/haproxy/commit/3e3b9eebf871510aee36c3a3336faac2f38c9559 • CWE-1025: Comparison Using Wrong Factors •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

09 Apr 2025 — This makes it possible for unauthenticated attackers to execute arbitrary code on the server via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://patchstack.com/database/wordpress/plugin/ut-demo-importer/vulnerability/wordpress-ultra-demo-importer-plugin-1-0-5-csrf-to-rce-vulnerability?_s_id=cve • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

09 Apr 2025 — Cross-Site Request Forgery (CSRF) vulnerability in appsbd Vite Coupon allows Remote Code Inclusion. ... This makes it possible for unauthenticated attackers to execute arbitrary code on the server via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://patchstack.com/database/wordpress/plugin/vite-coupon/vulnerability/wordpress-vite-coupon-plugin-1-0-7-csrf-to-remote-code-execution-rce-vulnerability?_s_id=cve • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

09 Apr 2025 — Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ho3einie Material Dashboard allows PHP Local File Inclusion. ... This makes it possible for authenticated attackers, with subscriber-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code exec... • https://patchstack.com/database/wordpress/plugin/material-dashboard/vulnerability/wordpress-material-dashboard-1-4-5-local-file-inclusion-vulnerability-2?_s_id=cve • CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

09 Apr 2025 — Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Adrian Tobey WordPress SMTP Service, Email Delivery Solved! ... This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and othe... • https://patchstack.com/database/wordpress/plugin/mailhawk/vulnerability/wordpress-wordpress-smtp-service-email-delivery-solved-mailhawk-1-3-1-local-file-inclusion-vulnerability?_s_id=cve • CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') •