Vulnerabilities (CVE)

Filtered by CWE-94
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-22286 2 Google, Samsung 2 Android, Bixby Routines 2022-01-19 3.6 LOW 7.1 HIGH
A vulnerability using PendingIntent in Bixby Routines prior to version 3.1.21.8 in Android R(11.0) and 2.6.30.5 in Android Q(10.0) allows attackers to execute privileged action by hijacking and modifying the intent.
CVE-2022-22285 2 Google, Samsung 2 Android, Reminder 2022-01-19 3.6 LOW 7.1 HIGH
A vulnerability using PendingIntent in Reminder prior to version 12.2.05.0 in Android R(11.0) and 12.3.02.1000 in Android S(12.0) allows attackers to execute privileged action by hijacking and modifying the intent.
CVE-2021-39979 1 Huawei 1 Harmonyos 2022-01-13 10.0 HIGH 9.8 CRITICAL
HHEE system has a Code Injection vulnerability.Successful exploitation of this vulnerability may affect HHEE system integrity.
CVE-2020-26124 1 Openmediavault 1 Openmediavault 2022-01-06 9.0 HIGH 8.8 HIGH
openmediavault before 4.1.36 and 5.x before 5.5.12 allows authenticated PHP code injection attacks, via the sortfield POST parameter of rpc.php, because json_encode_safe is not used in config/databasebackend.inc. Successful exploitation allows arbitrary command execution on the underlying operating system as root.
CVE-2020-8518 3 Debian, Fedoraproject, Horde 3 Debian Linux, Fedora, Groupware 2022-01-01 7.5 HIGH 9.8 CRITICAL
Horde Groupware Webmail Edition 5.2.22 allows injection of arbitrary PHP code via CSV data, leading to remote code execution.
CVE-2021-43466 1 Thymeleaf 1 Thymeleaf 2021-12-28 6.8 MEDIUM 9.8 CRITICAL
In the thymeleaf-spring5:3.0.12 component, thymeleaf combined with specific scenarios in template injection may lead to remote code execution.
CVE-2021-44231 1 Sap 2 Abap Platform, Netweaver As Abap 2021-12-17 7.5 HIGH 9.8 CRITICAL
Internally used text extraction reports allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.
CVE-2021-37097 1 Huawei 3 Emui, Harmonyos, Magic Ui 2021-12-15 7.8 HIGH 7.5 HIGH
There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart.
CVE-2021-43811 1 Amazon 1 Sockeye 2021-12-13 6.8 MEDIUM 7.8 HIGH
Sockeye is an open-source sequence-to-sequence framework for Neural Machine Translation built on PyTorch. Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. The issue is fixed in version 2.3.24.
CVE-2021-44529 1 Ivanti 1 Endpoint Manager Cloud Services Appliance 2021-12-10 7.5 HIGH 9.8 CRITICAL
A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody).
CVE-2021-22336 1 Huawei 2 Emui, Magic Ui 2021-12-09 5.0 MEDIUM 7.5 HIGH
There is an Improper Control of Generation of Code vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause denial of security services on a rooted device.
CVE-2021-40348 2 Spacewalk Project, Uyuni Project 2 Spacewalk, Uyuni 2021-12-04 9.3 HIGH 8.8 HIGH
Spacewalk 2.10, and derivatives such as Uyuni 2021.08, allows code injection. rhn-config-satellite.pl doesn't sanitize the configuration filename used to append Spacewalk-specific key-value pair. The script is intended to be run by the tomcat user account with Sudo, according to the installation setup. This can lead to the ability of an attacker to use --option to append arbitrary code to a root-owned file that eventually will be executed by the system. This is fixed in Uyuni spacewalk-admin 4.3.2-1.
CVE-2021-38967 1 Ibm 1 Mq Appliance 2021-11-30 4.6 MEDIUM 6.7 MEDIUM
IBM MQ Appliance 9.2 CD and 9.2 LTS could allow a local privileged user to inject and execute malicious code. IBM X-Force ID: 212441.
CVE-2021-33493 1 Open-xchange 1 Ox App Suite 2021-11-23 3.6 LOW 6.0 MEDIUM
The middleware component in OX App Suite through 7.10.5 allows Code Injection via Java classes in a YAML format.
CVE-2021-22053 1 Vmware 1 Spring Cloud Netflix 2021-11-23 6.5 MEDIUM 8.8 HIGH
Applications using both `spring-cloud-netflix-hystrix-dashboard` and `spring-boot-starter-thymeleaf` expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at `/hystrix/monitor;[user-provided data]`, the path elements following `hystrix/monitor` are being evaluated as SpringEL expressions, which can lead to code execution.
CVE-2021-41269 1 Cron-utils Project 1 Cron-utils 2021-11-19 6.8 MEDIUM 9.8 CRITICAL
cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known.
CVE-2020-15227 2 Debian, Nette 2 Debian Linux, Application 2021-11-18 7.5 HIGH 9.8 CRITICAL
Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework.
CVE-2021-41653 1 Tp-link 2 Tl-wr840n, Tl-wr840n Firmware 2021-11-17 10.0 HIGH 9.8 CRITICAL
The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field.
CVE-2021-29679 2 Ibm, Netapp 2 Cognos Analytics, Oncommand Insight 2021-11-17 6.5 MEDIUM 8.8 HIGH
IBM Cognos Analytics 11.1.7 and 11.2.0 could allow an authenticated user to execute code remotely due to incorrectly neutralizaing user-contrlled input that could be interpreted a a server-side include (SSI) directive. IBM X-Force ID: 199915.
CVE-2021-33816 1 Dolibarr 1 Dolibarr 2021-11-12 7.5 HIGH 9.8 CRITICAL
The website builder module in Dolibarr 13.0.2 allows remote PHP code execution because of an incomplete protection mechanism in which system, exec, and shell_exec are blocked but backticks are not blocked.
CVE-2021-24721 1 Loco Translate Project 1 Loco Translate 2021-11-10 4.0 MEDIUM 6.5 MEDIUM
The Loco Translate WordPress plugin before 2.5.4 mishandles data inputs which get saved to a file, which can be renamed to an extension ending in .php, resulting in authenticated "translator" users being able to inject PHP code into files ending with .php in web accessible locations.
CVE-2021-41228 1 Google 1 Tensorflow 2021-11-10 4.6 MEDIUM 7.8 HIGH
TensorFlow is an open source platform for machine learning. In affected versions TensorFlow's `saved_model_cli` tool is vulnerable to a code injection as it calls `eval` on user supplied strings. This can be used by attackers to run arbitrary code on the plaform where the CLI tool runs. However, given that the tool is always run manually, the impact of this is not severe. We have patched this by adding a `safe` flag which defaults to `True` and an explicit warning for users. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
CVE-2021-42057 1 Obsidian 1 Obsidian Dataview 2021-11-08 9.3 HIGH 7.8 HIGH
Obsidian Dataview through 0.4.12-hotfix1 allows eval injection. The evalInContext function in executes user input, which allows an attacker to craft malicious Markdown files that will execute arbitrary code once opened. NOTE: 0.4.13 provides a mitigation for some use cases.
CVE-2021-43281 1 Mybb 1 Mybb 2021-11-05 6.5 MEDIUM 7.2 HIGH
MyBB before 1.8.29 allows Remote Code Injection by an admin with the "Can manage settings?" permission. The Admin CP's Settings management module does not validate setting types correctly on insertion and update, making it possible to add settings of supported type "php" with PHP code, executed on Change Settings pages.
CVE-2020-11057 1 Xwiki 1 Xwiki 2021-11-04 9.0 HIGH 8.8 HIGH
In XWiki Platform 7.2 through 11.10.2, registered users without scripting/programming permissions are able to execute python/groovy scripts while editing personal dashboards. This has been fixed 11.3.7 , 11.10.3 and 12.0.
CVE-2021-42754 1 Fortinet 1 Forticlient 2021-11-04 3.5 LOW 5.0 MEDIUM
An improper control of generation of code vulnerability [CWE-94] in FortiClientMacOS versions 7.0.0 and below and 6.4.5 and below may allow an authenticated attacker to hijack the MacOS camera without the user permission via the malicious dylib file.
CVE-2021-42139 1 Deno 1 Deno Standard Modules 2021-11-04 6.8 MEDIUM 9.8 CRITICAL
Deno Standard Modules before 0.107.0 allows Code Injection via an untrusted YAML file in certain configurations.
CVE-2021-41619 1 Gradle 1 Enterprise 2021-11-03 9.0 HIGH 7.2 HIGH
An issue was discovered in Gradle Enterprise before 2021.1.2. There is potential remote code execution via the application startup configuration. The installation configuration user interface (available to administrators) allows specifying arbitrary Java Virtual Machine startup options. Some of these options, such as -XX:OnOutOfMemoryError, allow specifying a command to be run on the host. This can be abused to run arbitrary commands on the host, should an attacker gain administrative access to the application.
CVE-2019-15599 1 Tree-kill Project 1 Tree-kill 2021-10-29 7.5 HIGH 9.8 CRITICAL
A Code Injection exists in tree-kill on Windows which allows a remote code execution when an attacker is able to control the input into the command.
CVE-2019-15597 1 Node-df Project 1 Node-df 2021-10-29 7.5 HIGH 9.8 CRITICAL
A code injection exists in node-df v0.1.4 that can allow an attacker to remote code execution by unsanitized input.
CVE-2020-23037 1 Portable 1 Playable 2021-10-27 7.5 HIGH 9.8 CRITICAL
Portable Ltd Playable v9.18 contains a code injection vulnerability in the filename parameter, which allows attackers to execute arbitrary web scripts or HTML via a crafted POST request.
CVE-2021-22961 1 Glasswire 1 Glasswire 2021-10-21 7.5 HIGH 9.8 CRITICAL
A code injection vulnerability exists within the firewall software of GlassWire v2.1.167 that could lead to arbitrary code execution from a file in the user path on first execution.
CVE-2017-9841 1 Phpunit Project 1 Phpunit 2021-10-20 7.5 HIGH 9.8 CRITICAL
Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
CVE-2021-40889 1 Cmsuno Project 1 Cmsuno 2021-10-19 7.5 HIGH 9.8 CRITICAL
CMSUno version 1.7.2 is affected by a PHP code execution vulnerability. sauvePass action in {webroot}/uno/central.php file calls to file_put_contents() function to write username in password.php file when a user successfully changed their password. The attacker can inject malicious PHP code into password.php and then use the login function to execute code.
CVE-2021-40499 1 Sap 1 Netweaver Application Server Abap 2021-10-18 7.5 HIGH 9.8 CRITICAL
Client-side printing services SAP Cloud Print Manager and SAPSprint for SAP NetWeaver Application Server for ABAP - versions 7.70, 7.70 PI, 7.70 BYD, allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.
CVE-2018-17207 1 Snapcreek 1 Duplicator 2021-10-18 7.5 HIGH 9.8 CRITICAL
An issue was discovered in Snap Creek Duplicator before 1.2.42. By accessing leftover installer files (installer.php and installer-backup.php), an attacker can inject PHP code into wp-config.php during the database setup step, achieving arbitrary code execution.
CVE-2021-24546 1 Extendify 1 Editorskit 2021-10-15 6.5 MEDIUM 8.8 HIGH
The Gutenberg Block Editor Toolkit – EditorsKit WordPress plugin before 1.31.6 does not sanitise and validate the Conditional Logic of the Custom Visibility settings, allowing users with a role as low contributor to execute Arbitrary PHP code
CVE-2021-22557 1 Google 1 Slo Generator 2021-10-14 6.8 MEDIUM 7.8 HIGH
SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173
CVE-2021-40323 1 Cobbler Project 1 Cobbler 2021-10-12 7.5 HIGH 9.8 CRITICAL
Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.
CVE-2013-3630 1 Moodle 1 Moodle 2021-10-12 4.6 MEDIUM N/A
Moodle through 2.5.2 allows remote authenticated administrators to execute arbitrary programs by configuring the aspell pathname and then triggering a spell-check operation within the TinyMCE editor.
CVE-2021-22952 1 Ui 1 Unifi Talk 2021-09-30 6.5 MEDIUM 8.8 HIGH
A vulnerability found in UniFi Talk application V1.12.3 and earlier permits a malicious actor who has already gained access to a network to subsequently control Talk device(s) assigned to said network if they are not yet adopted. This vulnerability is fixed in UniFi Talk application V1.12.5 and later.
CVE-2021-33693 1 Sap 1 Cloud Connector 2021-09-27 7.7 HIGH 6.8 MEDIUM
SAP Cloud Connector, version - 2.0, allows an authenticated administrator to modify a configuration file to inject malicious codes that could potentially lead to OS command execution.
CVE-2021-23358 4 Debian, Fedoraproject, Tenable and 1 more 4 Debian Linux, Fedora, Tenable.sc and 1 more 2021-09-22 6.5 MEDIUM 7.2 HIGH
The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
CVE-2021-40373 1 Playsms 1 Playsms 2021-09-21 7.5 HIGH 9.8 CRITICAL
playSMS before 1.4.5 allows Arbitrary Code Execution by entering PHP code at the #tabs-information-page of core_main_config, and then executing that code via the index.php?app=main&inc=core_welcome URI.
CVE-2021-39503 1 Phpmywind 1 Phpmywind 2021-09-14 6.5 MEDIUM 7.2 HIGH
PHPMyWind 5.6 is vulnerable to Remote Code Execution. Becase input is filtered without "<, >, ?, =, `,...." In WriteConfig() function, an attacker can inject php code to /include/config.cache.php file.
CVE-2021-37694 1 Asyncapi 1 Java-spring-cloud-stream-template 2021-09-13 6.8 MEDIUM 7.8 HIGH
@asyncapi/java-spring-cloud-stream-template generates a Spring Cloud Stream (SCSt) microservice. In versions prior to 0.7.0 arbitrary code injection was possible when an attacker controls the AsyncAPI document. An example is provided in GHSA-xj6r-2jpm-qvxp. There are no mitigations available and all users are advised to update.
CVE-2019-4000 2 Apple, Druva 2 Macos, Insync 2021-09-08 7.2 HIGH 7.8 HIGH
Improper neutralization of directives in dynamically evaluated code in Druva inSync Mac OS Client 6.5.0 allows a local, authenticated attacker to execute arbitrary Python expressions with root privileges.
CVE-2021-32621 1 Xwiki 1 Xwiki 2021-09-07 6.5 MEDIUM 8.8 HIGH
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions prior to 12.6.7 and 12.10.3, a user without Script or Programming right is able to execute script requiring privileges by editing gadget titles in the dashboard. The issue has been patched in XWiki 12.6.7, 12.10.3 and 13.0RC1.
CVE-2021-32831 1 Totaljs 1 Total.js 2021-09-07 6.5 MEDIUM 7.2 HIGH
Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to code-injection. This can cause a variety of impacts that include arbitrary code execution. This is fixed in version 3.4.9.
CVE-2021-29772 1 Ibm 1 Api Connect 2021-09-01 7.5 HIGH 9.8 CRITICAL
IBM API Connect 5.0.0.0 through 5.0.8.11 could allow a user to potentially inject code due to unsanitized user input. IBM X-Force ID: 202774.