



Red Hat Jboss Application Server Remote Code Execution Zoho Desktop Central contains an authentication bypass vulnerability that could allow an attacker to execute arbitrary code in the Desktop Central MSP server.Īpache Log4j2 contains a vulnerability where JNDI features do not protect against attacker-controlled JNDI-related endpoints, allowing for remote code execution. Desktop Central Authentication Bypass Vulnerability Pi-hole Web v4.3.2 (aka AdminLTE) allows Remote Code Execution by privileged dashboard users via a crafted DHCP static lease.įortinet FortiOS "execute restore src-vis" downloads code without integrity checking, allowing an attacker to arbitrarily download files. Exploitation allows for remote code execution. Sonatype Nexus Repository Manager before 3.15.0 has an incorrect access control vulnerability. Sonatype Nexus Repository Manager Incorrect Access Control Vulnerability This vulnerability can only be exploited when the Java Security Manager is not properly configured. JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, allows attackers to perform remote code execution. Red Hat Linux JBoss Seam 2 Remote Code Execution Kernel/ptrace.c in Linux kernel mishandles contains an improper privilege management vulnerability which allows local users to obtain root access.

Linux Kernel Improper Privilege Management Vulnerability Mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints that uses the `toBSON` method.Įmbedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. MongoDB mongo-express Remote Code Execution The optional Apache Solr module DataImportHandler contains a code injection vulnerability. Microsoft Windows AppX Installer contains a spoofing vulnerability which has a high impacts to confidentiality, integrity, and availability.įUEL CMS 1.4.7 allows SQL Injection via the col parameter to /pages/items, /permissions/items, or /navigation/items.Īpache Solr DataImportHandler Code Injection Vulnerability Microsoft Windows AppX Installer Spoofing Vulnerability Google Chromium V8 Engine contains a use-after-free vulnerability which can allow a remote attacker to execute arbitrary code on the target system. Google Chromium V8 Engine Use-After-Free Vulnerability
