Page 8 of 44993 results (0.224 seconds)

CVSS: 6.7EPSS: 0%CPEs: -EXPL: 0

08 Apr 2025 — This could allow an attacker to execute arbitrary code with administrative privileges by placing a malicious executable in the same directory. • https://cert-portal.siemens.com/productcert/html/ssa-525431.html • CWE-269: Improper Privilege Management •

CVSS: 9.4EPSS: 0%CPEs: 1EXPL: 0

08 Apr 2025 — This could allow an authenticated remote attacker to execute arbitrary code with root privileges. • https://cert-portal.siemens.com/productcert/html/ssa-187636.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.4EPSS: 0%CPEs: 1EXPL: 0

08 Apr 2025 — This could allow an authenticated remote attacker to execute arbitrary code with root privileges. • https://cert-portal.siemens.com/productcert/html/ssa-187636.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.4EPSS: 0%CPEs: 1EXPL: 0

08 Apr 2025 — This could allow an authenticated remote attacker to execute arbitrary code with root privileges. • https://cert-portal.siemens.com/productcert/html/ssa-187636.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

07 Apr 2025 — This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins on the affected site's server which may make remote code execution possible. • https://packetstorm.news/files/id/190362 • CWE-862: Missing Authorization •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

07 Apr 2025 — After analyzing the configuration files, we observed that the server had set the TypeFilterLevel to Full which is dangerous as it can potentially lead to remote code execution using deserialization. • https://www.cve.org/CVERecord?id=CVE-2025-3425 • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.4EPSS: 0%CPEs: 1EXPL: 0

07 Apr 2025 — This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). • https://plugins.trac.wordpress.org/browser/simple-wp-events/trunk/admin/includes/wp-events-export-events.php#L399 • CWE-73: External Control of File Name or Path •

CVSS: 10.0EPSS: 8%CPEs: 1EXPL: 1

07 Apr 2025 — Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code. Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code. • https://www.horizon3.ai/attack-research/disclosures/unsafe-at-any-speed-abusing-python-exec-for-unauth-rce-in-langflow-ai • CWE-306: Missing Authentication for Critical Function •

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 0

07 Apr 2025 — A security flaw exists in WildFly and JBoss Enterprise Application Platform (EAP) within the Enterprise JavaBeans (EJB) remote invocation mechanism. ... This flaw allows an attacker to send a specially crafted serialized object, leading to remote code execution without requiring authentication. • https://access.redhat.com/security/cve/CVE-2025-2251 • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

07 Apr 2025 — Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Airflow Common SQL Provider. ... Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Airflow Common SQL Provider. • https://github.com/apache/airflow/pull/48098 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •