| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Microsoft Virtual Trusted Platform Module Remote Code Execution Vulnerability |
| Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
| Layer 2 Tunneling Protocol Remote Code Execution Vulnerability |
| Layer 2 Tunneling Protocol Remote Code Execution Vulnerability |
| Layer 2 Tunneling Protocol Remote Code Execution Vulnerability |
| Layer 2 Tunneling Protocol Remote Code Execution Vulnerability |
| Layer 2 Tunneling Protocol Remote Code Execution Vulnerability |
| Layer 2 Tunneling Protocol Remote Code Execution Vulnerability |
| Layer 2 Tunneling Protocol Remote Code Execution Vulnerability |
| Layer 2 Tunneling Protocol Remote Code Execution Vulnerability |
| Skype for Business Remote Code Execution Vulnerability |
| Skype for Business Remote Code Execution Vulnerability |
| Windows Runtime Remote Code Execution Vulnerability |
| Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
| Planet eStream before 6.72.10.07 allows unauthenticated upload of arbitrary files: Choose a Video / Related Media or Upload Document. Upload2.ashx can be used, or Ajax.asmx/ProcessUpload2. This leads to remote code execution. |
| PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug." |
| The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set. |
| InvoicePlane (all versions tested as of December 2024) v.1.6.11 and before contains a remote code execution vulnerability in the upload_file method of the Upload controller. |
| Kashipara E-learning Management System v1.0 is vulnerable to Remote Code Execution via File Upload in /teacher_avatar.php. |
| An issue was discovered in phpMyAdmin. A user can execute a remote code execution attack against a server when phpMyAdmin is being run as a CGI application. Under certain server configurations, a user can pass a query string which is executed as a command-line argument by the file generator_plugin.sh. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected. |