Displaying 241 - 260 of 38219

CVSS: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)

The strike exploits a local file inclusion vulnerability in WordPress platform, leveraged beforehand by a path traversal via the wp attached file parameter. By supplying a wp page template metadata parameter, the attacker determines the theme engine to include a malicious uploaded file. By exploiting this vulnerability an authenticated attacker gains remote code execution on the target host system...

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits an insecure deserialization via XML payload in OpenMRSs Webservices API module. By exploiting the vulnerability, an unauthenticated attacker might be able to execute system commands in the context of the user running the webserver process.

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in Apple Webkit. Specifically, an attacker can craft javascript that takes advantage of a vulnerability that exists in how the GetIndexedPropertyStorage can cause garbage collection via rope strings, which can lead to a Use-After-Free condition. This can cause a denial of service in the browser or potentially allow for remote code execution to occur.

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a command injection vulnerability in LAquis SCADA. The PAGINA parameter in HTTP requests to acompanhamentotela.lhtml and the TITULO parameter in requests to relatorioindividual.lhtml are not sanatized for command injection characters. An attacker can send a specially crafted HTTP GET or POST request to achieve command execution on the target Machine.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a command injection vulnerability in LAquis SCADA. The NOME parameter in HTTP requests to relatorionome.lhtml is not sanatized for command injection characters. An attacker can send a specially crafted HTTP GET or POST request to achieve command execution on the target Machine.

CVSS: 4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)

The strikes emulates a path traversal attack on WordPress CMS platform. The attack can be carried by a low privileged user by providing a wp attached file parameter when editing media files, thus modifying post metadata. By leveraging this vulnerability with a local file inclusion exploit, an attacker may gain code execution on the host system.

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

A remote code execution vulnerability exists in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. The vulnerability is due to the lack of data sanitization originating from non-form sources in the REST module. A remote attacker can exploit this vulnerability by sending a crafted HTTP packet to the target service. Successful exploitation could lead to arbitrary code execution or crash of the...

CVSS: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

This strike exploits a information disclosure vulnerability in the GDI Graphics Device Interface components of Microsoft Windows. The vulnerability is due to improper handling of EMF records in memory by the gdiplus.dll library. The vulnerability can be exploited by crafting a malicious EMF file and enticing a user to download and open it. Successful exploitation may result in execution of arbitrary...

CVSS: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)

This strike exploits a sql injection vulnerability in WordPress Plugin Booking Calendar 8.4.3. The vulnerability is due to improper sanitization of the booking id parameter. By successfully exploiting this vulnerability, an authenticated attacker could perform sql injection on the target server.

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in the Microsoft Edge browser. Specifically, the vulnerability exists in the Javascript Chakra engine. It is possible to craft Javascript in such a way that when using the NewScObjectNoCtor or InitProto methods with the SetIsPrototype method of the type handler, a transition to a new type can cause type confusion to occur. This can lead to a denial of service in...

CVSS: 6.9 (AV:L/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a buffer overflow vulnerability found in MatrixSSL. The vulnerability is due to improper validation of user-supplied key size within pubRsaDecryptSignedElementExt. An attacker could exploit this vulnerability by crafting special X.509 certificate. A successful exploit could lead to arbitrary code execution or crash of the vulnerable application.

CVSS: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)

This strike exploits a remote command execution vulnerability in Script Security Plugin pertaining to Jenkins master. The vulnerability is due to improper validation of data passed to the Jenkins master sandbox. A specially crafted HTTP POST request containing a sandbox script leads to remote code execution conditions on the vulnerable server.

CVSS: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

This strike exploits an out of bounds vulnerability in NTPsec ntpd. This vulnerability is due to insufficient validation of a parsed field from a NTP packet. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted NTP packet to the target server. Successful exploitation could lead to information disclosure of sensitive information.

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in the Microsoft Edge browser. Specifically, the vulnerability exists in the Javascript Chakra engine. It is possible to craft Javascript in such a way that when using the InjectJsBuiltInLibraryCode method an attacker can clear the disable-implicit-call flag can lead to a stack based Use-After-Free condition. This may lead to a denial of service condition in the...

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in the Microsoft Edge browser. Specifically a type confusion vulnerability exists inside the Chakra Javascript engine InitClass. It is possible for an attacker to craft javascript code in such a way that type confusion will cause a memory access violation to occur. This may lead to remote code execution or a denial of service condition in the browser.

CVSS: 8.0 (AV:N/AC:L/Au:S/C:C/I:P/A:P)

An OS command injection vulnerability exists in LibreOffice via path traversal in event listeners functionality. The vulnerability is due to missing string sanitization when parsing event listener script sources. By enticing an user to open a crafted fodt document, an attacker may achieve remote code execution on the target system.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a SQL injection vulnerability in the JE Photo Gallery component 1.1 for Joomla!. The vulnerability is due to the improper sanitization of requests sent to the application. An attacker could exploit this vulnerability by sending specifically crafted packets, potentially resulting in the execution of SQL commands which may lead to information disclosure.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a remote code execution in ThinkPHP framework. The flaw is rooted within the invokefunction method as a consequence of no parameter validation. A remote, unauthenticated attacker may thus be able to execute code on the vulnerable Machine with the permissions of the user running the web server.

CVSS: 6.1 (AV:L/AC:L/Au:N/C:P/I:P/A:C)

This strike exploits a integer overflow vulnerability found in SQLite with the FTS3 extension enabled. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by crafting special FTS3 shadow tables. A successful exploit could allow the attacker to execute arbitrary SQL statements.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike executes a vulnerability in Icona SpA C6 Messenger. When the DownloaderActiveX Control propPostDownloadAction parameter is set to run, a remote attacker can download and execute a file via a URL in propDownloadUrl parameter. This strike sends the initial html that contains these parameters before they make an outbound request to receive a malicious file via the propDownloadUrl parameter...

Pages