Page 345 of 11047 results (0.050 seconds)

CVSS: 10.0EPSS: 9%CPEs: 1EXPL: 6

27 Jun 2022 — The School Management WordPress plugin before 9.9.7 contains an obfuscated backdoor injected in it's license checking code that registers a REST API handler, allowing an unauthenticated attacker to execute arbitrary PHP code on the site. El complemento de WordPress School Management anterior a 9.9.7 contiene una puerta trasera ofuscada inyectada en su código de verificación de licencia que registra un controlador de API REST, lo que permite a un atacante no autenticado ejecutar código PHP arbitrario en el s... • https://github.com/0xSojalSec/-CVE-2022-1609 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-912: Hidden Functionality •

CVSS: 9.1EPSS: 1%CPEs: 25EXPL: 2

24 Jun 2022 — A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco ASA Software. This vulnerability is due to insufficient validation of the authenticity of an ASDM image during its installation on a device that is running Cisco ASA Softwa... • https://github.com/jbaines-r7/theway • CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

24 Jun 2022 — The tested version of Dominion Voting System ImageCast X can be manipulated to cause arbitrary code execution by specially crafted election definition files. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01 • CWE-24: Path Traversal: '../filedir' •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

24 Jun 2022 — The manipulation leads to code injection. • http://seclists.org/fulldisclosure/2017/Feb/80 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

23 Jun 2022 — Cloudflare Warp for Windows from version 2022.2.95.0 contained an unquoted service path which enables arbitrary code execution leading to privilege escalation. • https://github.com/cloudflare/advisories/security/advisories/GHSA-m6w8-3pf9-p68r • CWE-428: Unquoted Search Path or Element •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

23 Jun 2022 — The manipulation leads to code injection. • http://seclists.org/fulldisclosure/2017/Feb/95 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

22 Jun 2022 — Se ha detectado que Redis versión v7.0, contiene una pérdida de memoria por medio del componente streamGetEdgeID Multiple vulnerabilities have been found in Redis, the worst of which could result in arbitrary code execution. • https://github.com/redis/redis/commit/4a7a4e42db8ff757cdf3f4a824f66426036034ef • CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

20 Jun 2022 — The manipulation leads to code injection. • http://seclists.org/fulldisclosure/2017/Feb/39 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 0%CPEs: 39EXPL: 0

20 Jun 2022 — Secure-boot mechanisms circumvention and arbitrary code execution may also be achievable. • https://bugzilla.redhat.com/show_bug.cgi?id=1991687 • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 41EXPL: 0

20 Jun 2022 — An attacker may take advantage of that to cause heap data corruption or eventually arbitrary code execution and circumvent secure boot protections. • https://bugzilla.redhat.com/show_bug.cgi?id=1991685 • CWE-787: Out-of-bounds Write •