Remote Code Execution
Remote Code Execution (RCE) vulnerabilities allow an attacker to execute arbitrary code on a remote system without authorization. These are among the most severe vulnerabilities as they can lead to complete system compromise.
289
CRITICAL
Execution
Understanding Remote Code Execution
Remote Code Execution vulnerabilities represent the most critical class of security flaws. When exploited, they allow attackers to run arbitrary commands on a target system, often with the same privileges as the vulnerable application.
RCE vulnerabilities commonly arise from unsafe deserialization, command injection, or memory corruption bugs. They're frequently found in web applications, network services, and system utilities.
How to Identify
- •Look for input validation bypasses in file upload functionality
- •Check for unsafe deserialization of user-controlled data
- •Test command execution functions with special characters
- •Review template engines for server-side template injection
Prevention Best Practices
- ✓Use parameterized queries and prepared statements
- ✓Implement strict input validation and sanitization
- ✓Run applications with minimal privileges
- ✓Keep all software dependencies up to date
- ✓Use security headers and Content Security Policy
Remote Code Execution CVEs (289)
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-3393 | 4.8 | This vulnerability allows an attacker to execute malicious code on a system by exploiting a flaw in the audio file handling function, which can lead to a buffer overflow. However, the attacker must have local access to the system to carry out the attack, and the issue has been publicly disclosed but remains unaddressed by the developers. | Unknown | Exploit Available | about 1 month agoMar 1, 2026 |
| CVE-2026-24488 | 6.5 | This vulnerability allows an attacker to send any file from the server, including sensitive information like database credentials and patient documents, to a phone number they control. It can be exploited by any authenticated user of the system, as the application does not properly restrict which files can be accessed or sent. | open-emropenemr | Exploit Available | about 1 month agoFeb 27, 2026 |
| CVE-2026-3304 | 8.7 | An attacker can exploit a flaw in Multer to overwhelm the server by sending poorly formatted requests, leading to a Denial of Service (DoS) that makes the application unavailable. This issue affects versions before 2.1.0, so it's crucial to upgrade to the latest version to prevent this problem. | Unknown | Exploit Available | about 1 month agoFeb 27, 2026 |
| CVE-2026-2359 | 8.7 | An attacker can cause a Denial of Service (DoS) by interrupting a file upload, which can overwhelm the server and make it unable to respond to legitimate requests. This vulnerability affects versions of Multer before 2.1.0, so it's crucial to upgrade to the latest version to protect against this issue. | Unknown | Exploit Available | about 1 month agoFeb 27, 2026 |
| CVE-2026-3327 | 4.8 | This vulnerability allows a malicious user who is already logged in to load any external website or resource within a Dato CMS Web Previews plugin, bypassing security restrictions. It specifically affects versions of the plugin before 1.0.31, meaning only users with access to the system can exploit it. | Unknown | Exploit Available | about 1 month agoFeb 27, 2026 |
| CVE-2025-11251 | 9.8 | This vulnerability allows an attacker to manipulate the database of the Dayneks E-Commerce Platform, potentially gaining access to sensitive information or altering data. It can be exploited through specially crafted input on the platform, and it remains a risk until at least February 2026. | daynexwoyio | Exploit Available | about 1 month agoFeb 27, 2026 |
| CVE-2026-1305 | 5.3 | An attacker can exploit this vulnerability to falsely mark orders as "Processing" or "Completed" without making any actual payments, allowing them to commit fraud. This can happen if they send a specially crafted request to the payment system's webhook, and it affects versions of the Japanized for WooCommerce plugin up to 2.8.4. | Unknown | Exploit Available | about 1 month agoFeb 27, 2026 |
| CVE-2026-2251 | 9.8 | This vulnerability allows an attacker to access unauthorized files on the system, potentially leading to remote code execution, which means they could run malicious software on the affected Xerox FreeFlow Core software. It affects versions up to 8.0.7, so upgrading to version 8.1.0 is crucial to protect against this risk. | xeroxfreeflow core | Exploit Available | about 1 month agoFeb 27, 2026 |
| CVE-2026-1626 | 9.1 | An attacker can potentially eavesdrop on or alter the encrypted communication between the lms1000 device and other systems using its SSH service, but they need to be able to intercept the network traffic first. This is possible because the device uses weak encryption methods that can be exploited. | sicklms1000 firmware | Exploit Available | about 1 month agoFeb 27, 2026 |
| CVE-2026-0980 | 8.8 | An attacker with the right permissions can exploit a flaw in the Red Hat Satellite system to run their own code remotely by creating a specially crafted username for the Baseboard Management Controller. This requires the attacker to already have access to create or update hosts within the system. | redhatsatellite | Exploit Available | about 1 month agoFeb 27, 2026 |
| CVE-2025-9909 | 6.7 | This vulnerability allows an attacker to steal user credentials by creating deceptive routes in the Red Hat Ansible Automation Platform, using a specific format that tricks the system. It requires a malicious or manipulated administrator to set up these routes, which can then capture sensitive information even after the attacker's access has been removed. | Unknown | Theoretical | about 1 month agoFeb 27, 2026 |
| CVE-2025-9572 | 5.0 | This vulnerability allows low-privileged users to access sensitive information that they shouldn't be able to see, due to weak security checks in the GraphQL API. It occurs because the API fails to properly enforce user permissions, unlike the more secure REST API, making it easier for attackers to bypass restrictions. | Unknown | Exploit Available | about 1 month agoFeb 27, 2026 |
| CVE-2026-3302 | 5.3 | An attacker can exploit a weakness in the Sign Up Page of the Doctor Appointment System to inject malicious scripts through the Email field, potentially allowing them to steal sensitive information from users who visit the site. This attack can be carried out remotely, meaning the attacker doesn't need physical access to the system, and the method to exploit this vulnerability is publicly available. | remyandradedoctor appointment system | Exploit Available | about 1 month agoFeb 27, 2026 |
| CVE-2026-1241 | 8.7 | An attacker can access live video streams from Pelco Sarix Professional 3 Series Cameras without proper login credentials, putting privacy and security at risk. This vulnerability occurs because the camera's web management interface does not properly enforce access controls, allowing unauthorized users to view sensitive footage. | Unknown | Exploit Available | about 1 month agoFeb 26, 2026 |
| CVE-2026-26937 | 7.5 | This vulnerability allows an attacker to overload the Kibana service, causing it to become unresponsive, effectively leading to a Denial of Service. It can be exploited by sending specially crafted input data to the Timelion component, which means that the attacker needs to have access to the Kibana interface to trigger the issue. | elastickibana | Theoretical | about 1 month agoFeb 26, 2026 |
| CVE-2026-22715 | 5.9 | An attacker with administrative access on one virtual machine (VM) can disrupt or eavesdrop on the network connections of other VMs on the same host. To fix this issue, users need to upgrade to the latest version of VMware Workstation or Fusion. | Unknown | Exploit Available | about 1 month agoFeb 26, 2026 |
| CVE-2026-26934 | 6.5 | An attacker with view-only access to Kibana can exploit this vulnerability to send specially crafted data that overwhelms the system, causing it to crash or become unresponsive. This means that even users who are not fully authorized can disrupt the service by manipulating input data. | elastickibana | Exploit Available | about 1 month agoFeb 26, 2026 |
| CVE-2026-26227 | 6.3 | This vulnerability allows an attacker to gain unauthorized access to the Remote Access Server feature in VLC for Android by repeatedly guessing a one-time password (OTP) without being locked out. The attacker needs to be able to reach the server over the network, and if successful, they can access media files that the legitimate user has shared. | Unknown | Theoretical | about 1 month agoFeb 26, 2026 |
| CVE-2026-26265 | 7.5 | This vulnerability allows an attacker to access private user information, such as phone numbers and addresses, from all users in a Discourse forum, even if they are not logged in. It occurs because the system does not properly check permissions for certain user data fields, making it easy for anyone to exploit this flaw and collect sensitive information. | discoursediscourse | Exploit Available | about 1 month agoFeb 26, 2026 |
| CVE-2026-26207 | 5.4 | This vulnerability allows any authenticated user to manipulate policies on posts they shouldn't be able to access, including private posts, and to discover which posts have policies based on error messages. It affects users of the discourse platform who have the `discourse-policy` plugin enabled and can be fixed by upgrading to the latest versions or disabling the plugin altogether. | discoursediscourse | Exploit Available | about 1 month agoFeb 26, 2026 |