Important Information

On August 12th, 2022, many of Keysight’s Network Test, Network Visibility, & Edge to Core (NAS/formerly Ixia) products will migrate to a new license structure.

CRITICAL: If you perform licensing operations after August 12th, 2022, without upgrading the licensing software to the latest version, licenses may not register properly, and some features may be missing. This could impact testing and result in downtime.

For details, click here.

Displaying 261 - 280 of 58316

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits an integer overflow vulnerability in Adobe Acrobat Reader ImageConversion component. The vulnerability is due to improper parsing of EmfPlusDrawString data records in an EMF file. Successful exploitation may result in execution of arbitrary code with user privileges. Failure to exploit will not typically result in a crash.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in Mozilla Firefox. It is possible to craft Javascript in such a way that allows remote attackers to execute arbitrary JavaScript code or conduct cross-site scripting attack when calling the crypto.generateCRMFRequest function. This can lead to remote code execution on the victims Machine.

CVSS: 2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P)

This strike exploits an arbitrary file deletion vulnerability in Oracle SE 8. The vulnerability is due to improper filtering of jlnp URL variable. An attacker can entice the victim to click the malicious link. Successful exploitation may lead to file deletion on client side.

CVSS: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

This strike exploits a local file inclusion vulnerability in WordPress Plugin Anti-Malware and Brute-Force Firewall 4.18.63. The vulnerability is due to improper sanitization of the base64 encoded GOTMLS scan parameter. By successfully exploiting this vulnerability, an authenticated attacker could retrieve arbitrary files from the target server.

CVSS: 8.3 (AV:N/AC:M/Au:N/C:C/I:P/A:P)

This strike replicates a Use-After-Free exploit for Chromium browser engine. The vulnerability can be triggered via the FileReader JS API by creating two array references to the same file reader result then using another mechanism to free the underlying memory. By successfully exploiting this flaw, an attacker can execute arbitrary code in the context or the Chromes renderer process.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike emulates a SQL injection attack on Magento e-commerce platform. The vulnerable code resides in vendor/magento/framework/DB/Adapter/Pdo/Mysql.php and the flaw is due to the way the request parameters are parsed. By exploiting the /catalog/product frontend action/synchronize endpoint, a remote unauthenticated attacker could access the database and even leverage the vulnerability to obtain...

CVSS: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

This strike emulates remote DNS hijack attacks for several D-LINK routers. The vulnerability resides in the dnscfg.cgi script and is due to lack of authentication on server-side. A remote unauthenticated attacker may change the DNS configuration of the router which can result in man-in-the-middle attacks and information disclosure.

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a vulnerability in Apple Safari Webkit. It is possible to craft Javascript in such a way that will cause type confusion to occur when using a CustomGetterSetter object linked to regExpConstructorInput. This can lead to a denial of service in the browser or potentially allow for remote code execution to occur.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

A memory corruption vulnerability exists in the dhcpssvc.dll component of Windows DHCP Server. The vulnerability is triggered when the DHCP server parses a DHCP DISCOVER packet containing an altered Vendor Specific Information header field. By exploiting the vulnerability, an attacker may be able to execute arbitrary code with SYSTEM privileges.

CVSS: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

This strike exploits a vulnerability in Microsoft Internet Explorer. By utilizing VBScript.Encode it is possible to bypass the MSHTML Security Zone security policy that is put in place to allow or restrict VBScript from execution.

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a Use-After-Free vulnerability in the JavaScript engine of Foxit PDF Reader. This vulnerability is due to improper handling of freed objects in the JavaScript popUpMenu method. A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted PDF file, resulting in possible execution of arbitrary code.

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a vulnerability in the VMWare fusion. The vulnerability is due to lack of access control under WebSocket service. An attacker could exploit this vulnerability by enticing the victim to click a malicious link and execute the malicious web page. Successful exploitation may lead to remote command execution on the guest virtual Machine.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in the Microsoft mshtml Engine. The vulnerability is due to improper filtering of the edit parameter. An attacker could exploit this vulnerability by enticing the victim to click a malicious link and download the malicious html file. Successful exploitation may lead to remote code execution on the client.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a SQL injection vulnerability in the J2Store component 3.x - 3.3.6 for Joomla!. The vulnerability is due to the improper sanitization of requests sent to the application. An attacker could exploit this vulnerability by sending specifically crafted packets, potentially resulting in the execution of SQL commands which may lead to information disclosure.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits an insecure deserialization vulnerability in Apache Solr. The vulnerability is due to insufficient sanitization of requests made to the Config API. This vulnerability can be exploited by sending a specially crafted HTTP request to the Config API. Successful exploitation could lead to remote code execution withing the context of the server.

CVSS: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)

This strike emulates a remote code execution via a POP chain attack on PhpBB forum platform. The vulnerability resides in calling the file exists function with user supplied data when checking the ImageMagick binary path. An authenticated attacker may gain arbitrary code execution by uploading a polyglot JPEG-PHAR file beforehand then setting the ImageMagick path to the polyglot, using the phar://...

CVSS: 7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)

The strikes replicates an attack on Ruby on Rails which leads to arbitrary file disclosure. The vulnerability resides in the lack of validation of the Accept header which is further parsed within the template renderer.rb file in order to return the template file to be rendered. By exploiting this, a remote unauthenticated attacker may read arbitrary files on the host system.

CVSS: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

This strike exploits a vulnerability in Apple Webkit. It is possible to craft Javascript in such a way that an Out of Bounds Read/Write can occur in shiftCountWithArrayStorage. This can cause memory corruption to occur leading to a denial of service in the browser or potentially lead to remote code execution.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a remote file inclusion vulnerability in WordPress Plugin Grace. The vulnerability is due to improper sanitization of the cfg parameter. By successfully exploiting this vulnerability, a remote, unauthenticated attacker could retrieve arbitrary files from the target server.

CVSS: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

This strike exploits an information disclosure vulnerability in the GDI Graphics Device Interface components of Microsoft Windows. The vulnerability is due to improper handling of EMF records in memory by the DoGdiCommentMultiFormats method pertaining to gdiplus.dll library. The vulnerability can be exploited by crafting a malicious EMF file and enticing a user to download and open it. Successful...

Pages