Page 334 of 8692 results (0.015 seconds)

CVSS: 9.8EPSS: 97%CPEs: 2EXPL: 11

For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.  To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x . Several components of Apache RocketMQ, including NameServer, Broker, and Controller, are exposed to the extranet and lack permission verification. An attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as or achieve the same effect by forging the RocketMQ protocol content. • https://github.com/SuperZero/CVE-2023-33246 https://github.com/Le1a/CVE-2023-33246 https://github.com/I5N0rth/CVE-2023-33246 https://github.com/yizhimanpadewoniu/CVE-2023-33246-Copy https://github.com/3yujw7njai/CVE-2023-33246 https://github.com/Devil0ll/CVE-2023-33246 https://github.com/d0rb/CVE-2023-33246 https://github.com/0xKayala/CVE-2023-33246 https://github.com/hanch7274/CVE-2023-33246 https://github.com/PavilionQ/CVE-2023-33246-mitigation http://packetstormsecurity& • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 2

Code Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.9. • https://github.com/mnqazi/CVE-2023-2859 https://github.com/nilsteampassnet/teampass/commit/1f51482a0c4d152ca876844212b0f8f3cb9387af https://huntr.dev/bounties/d7b8ea75-c74a-4721-89bb-12e5c80fb0ba • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

SQLite JDBC is a library for accessing and creating SQLite database files in Java. Sqlite-jdbc addresses a remote code execution vulnerability via JDBC URL. This issue impacting versions 3.6.14.1 through 3.41.2.1 and has been fixed in version 3.41.2.2. • https://github.com/xerial/sqlite-jdbc/releases/tag/3.41.2.2 https://github.com/xerial/sqlite-jdbc/security/advisories/GHSA-6phf-6h5g-97j2 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Code injection vulnerability in Drive Explorer for macOS versions 3.5.4 and earlier allows an attacker who can login to the client where the affected product is installed to inject arbitrary code while processing the product execution. • https://jvn.jp/en/jp/JVN01937209 https://line.worksmobile.com/jp/release-notes/20230216 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 8.8EPSS: 0%CPEs: 36EXPL: 0

An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08 • CWE-15: External Control of System or Configuration Setting •