Displaying 221 - 240 of 38219

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a Use-After-Free vulnerability in the JavaScript engine of Foxit PDF Reader. This vulnerability is due to improper handling of freed objects in the JavaScript popUpMenu method. A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted PDF file, resulting in possible execution of arbitrary code.

CVSS: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

This strike exploits a vulnerability in Microsoft Internet Explorer. By utilizing VBScript.Encode it is possible to bypass the MSHTML Security Zone security policy that is put in place to allow or restrict VBScript from execution.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike emulates a SQL injection attack on Magento e-commerce platform. The vulnerable code resides in vendor/magento/framework/DB/Adapter/Pdo/Mysql.php and the flaw is due to the way the request parameters are parsed. By exploiting the /catalog/product frontend action/synchronize endpoint, a remote unauthenticated attacker could access the database and even leverage the vulnerability to obtain...

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a vulnerability in the VMWare fusion. The vulnerability is due to lack of access control under WebSocket service. An attacker could exploit this vulnerability by enticing the victim to click a malicious link and execute the malicious web page. Successful exploitation may lead to remote command execution on the guest virtual Machine.

CVSS: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

This strike emulates remote DNS hijack attacks for several D-LINK routers. The vulnerability resides in the dnscfg.cgi script and is due to lack of authentication on server-side. A remote unauthenticated attacker may change the DNS configuration of the router which can result in man-in-the-middle attacks and information disclosure.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in the Microsoft mshtml Engine. The vulnerability is due to improper filtering of the edit parameter. An attacker could exploit this vulnerability by enticing the victim to click a malicious link and download the malicious html file. Successful exploitation may lead to remote code execution on the client.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a SQL injection vulnerability in the J2Store component 3.x - 3.3.6 for Joomla!. The vulnerability is due to the improper sanitization of requests sent to the application. An attacker could exploit this vulnerability by sending specifically crafted packets, potentially resulting in the execution of SQL commands which may lead to information disclosure.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits an insecure deserialization vulnerability in Apache Solr. The vulnerability is due to insufficient sanitization of requests made to the Config API. This vulnerability can be exploited by sending a specially crafted HTTP request to the Config API. Successful exploitation could lead to remote code execution withing the context of the server.

CVSS: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)

This strike emulates a remote code execution via a POP chain attack on PhpBB forum platform. The vulnerability resides in calling the file exists function with user supplied data when checking the ImageMagick binary path. An authenticated attacker may gain arbitrary code execution by uploading a polyglot JPEG-PHAR file beforehand then setting the ImageMagick path to the polyglot, using the phar://...

CVSS: 7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)

The strikes replicates an attack on Ruby on Rails which leads to arbitrary file disclosure. The vulnerability resides in the lack of validation of the Accept header which is further parsed within the template renderer.rb file in order to return the template file to be rendered. By exploiting this, a remote unauthenticated attacker may read arbitrary files on the host system.

CVSS: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)

The strike reproduces a remote code execution attack on Moodle CMS platform. The vulnerability resides in poor user input sanitization for answer parameter within questiontype.php, when defining a new quizz of type Calculated. By exploiting the issue, a remote authenticated attacker may execute arbitrary PHP code with HTTP Server privileges.

CVSS: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

This strike exploits a vulnerability in Apple Webkit. It is possible to craft Javascript in such a way that an Out of Bounds Read/Write can occur in shiftCountWithArrayStorage. This can cause memory corruption to occur leading to a denial of service in the browser or potentially lead to remote code execution.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a remote file inclusion vulnerability in WordPress Plugin Grace. The vulnerability is due to improper sanitization of the cfg parameter. By successfully exploiting this vulnerability, a remote, unauthenticated attacker could retrieve arbitrary files from the target server.

CVSS: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

This strike exploits an information disclosure vulnerability in the GDI Graphics Device Interface components of Microsoft Windows. The vulnerability is due to improper handling of EMF records in memory by the DoGdiCommentMultiFormats method pertaining to gdiplus.dll library. The vulnerability can be exploited by crafting a malicious EMF file and enticing a user to download and open it. Successful...

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in the Microsoft Internet Explorer browser. Specifically, the vulnerability exists in the VBScript engine. It is possible to create VBScript in such a way that can allow for a Use-After-Free condition to occur when a pointer to a SafeArray object is created and stored and the object is then destroyed. This may lead to a denial of service condition in the browser,...

CVSS: 4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)

This strike exploits a remote file inclusion vulnerability in phpMyAdmin. The vulnerability is due to an improper filter, and the ability to execute a SQL sentence. By successfully exploiting this vulnerability, a remote, authenticated attacker could retrieve arbitrary files from the target server.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a buffer overflow vulnerability in Microsoft Outlook client. The vulnerability is due to insufficient validation of the countOfFormNameStringObjects field in an RWZ file. A remote attacker could exploit this vulnerability by enticing a user to import a maliciously crafted file. Successful exploitation could lead to arbitrary code execution in the context of the user.

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits an input validation vulnerability found in WinRAR. The vulnerability is due to improper input validation while parsing specific header fields from an ACE archive. An attacker could exploit this vulnerability by crafting a special ACE file. A successful exploit could allow the attacker to execute arbitrary commands on the target system.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a remote code execution on Nexus Repository Manager 3. This vulnerability is due to improper handling of the value parameter under HTTP parameter when a client sends http traffic to the server. A remote unauthenticated attacker can exploit this vulnerability by sending crafted http requests to the target server. Successful exploitation results in remote code execution.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a remote file inclusion vulnerability in Elasticsearch Kibana. The vulnerability is due to improper sanitization of the apis parameter. By successfully exploiting this vulnerability, a remote, unauthenticated attacker could retrieve javascript files from the target server. The other file format can be found in a log file on the target server.

Pages