Page 333 of 8692 results (0.115 seconds)

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 1

Those who have forked the NextCloud Cookbook repository should make sure their forks are on the latest version to prevent code injection attacks and similar. • https://github.com/nextcloud/cookbook/blob/a14d6ffc4d45e1447556f68606129dfd6c1505cf/.github/workflows/pull-checks.yml#L67 https://github.com/nextcloud/cookbook/commit/489bb744 https://github.com/nextcloud/cookbook/commit/a46d98559e2c64292da9ffb06138cccc2e50ae1b https://github.com/nextcloud/cookbook/security/advisories/GHSA-c5pc-mf2f-xq8h https://securitylab.github.com/research/github-actions-untrusted-input • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 5

Camaleon CMS v2.7.0 was discovered to contain a Server-Side Template Injection (SSTI) vulnerability via the formats parameter. Camaleon CMS version 2.7.0 suffers from a server-side template injection vulnerability. • https://www.exploit-db.com/exploits/51489 https://github.com/paragbagul111/CVE-2023-30145 http://packetstormsecurity.com/files/172593/Camaleon-CMS-2.7.0-Server-Side-Template-Injection.html https://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection https://drive.google.com/file/d/11MsSYqUnDRFjcwbQKJeL9Q8nWpgVYf2r/view?usp=share_link https://portswigger.net/research/server-side-template-injection • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.2EPSS: 5%CPEs: 1EXPL: 2

Sourcecodester Faculty Evaluation System v1.0 is vulnerable to arbitrary code execution via /eval/ajax.php? • https://www.exploit-db.com/exploits/51495 http://packetstormsecurity.com/files/172672/Faculty-Evaluation-System-1.0-Shell-Upload.html https://github.com/F14me7wq/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/RCE-1.md •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Yank Note version 3.52.1 suffers from an arbitrary code execution vulnerability. • https://www.exploit-db.com/exploits/51470 http://packetstormsecurity.com/files/172535/Yank-Note-3.52.1-Arbitrary-Code-Execution.html • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

Gin Markdown Editor version 0.7.4 suffers from an arbitrary code execution vulnerability. • https://www.exploit-db.com/exploits/51469 http://packetstormsecurity.com/files/172530/Gin-Markdown-Editor-0.7.4-Arbitrary-Code-Execution.html •