CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Microsoft Exchange Remote Code Execution Vulnerability |
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft PowerPoint Remote Code Execution Vulnerability |
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft SharePoint Remote Code Execution Vulnerability |
Microsoft SharePoint Remote Code Execution Vulnerability |
Microsoft Exchange Remote Code Execution Vulnerability |
Windows NTFS Remote Code Execution Vulnerability |
Windows Hyper-V Remote Code Execution Vulnerability |
Versions of the package unisharp/laravel-filemanager before 2.9.1 are vulnerable to Remote Code Execution (RCE) through using a valid mimetype and inserting the . character after the php file extension. This allows the attacker to execute malicious code. |
Serviceware Processes 6.0 through 7.3 before 7.4 allows attackers without valid authentication to send a specially crafted HTTP request to a service endpoint resulting in remote code execution. |
Windows Cryptographic Services Remote Code Execution Vulnerability |
FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath. |
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke SQL injection into the program and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™. |
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke a local or remote executable and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™. |
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application allows users to upload encrypted backup files. As part of this backup, files can be restored without correctly checking the path of the restored file. This could allow an attacker with access to the backup encryption key to upload malicious files, that could potentially lead to remote code execution. |