Displaying 261 - 280 of 38219

CVSS: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

An integer overflow vulnerability has been discovered in ZeroMQ libzmq library. The vulnerability is due to improper sanitization of user-supplied data passed to zmq::v2 decoder t::size ready function when handling ZMTP messages. A remote attacker could exploit this vulnerability by sending a specially crafted packet to the vulnerable service. Successful exploitation could result in the execution of...

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike executes a vulnerability in a Microsoft Windows Contact file. Specifically a remote attacker can execute arbitrary code on Microsoft Windows by performing code injection in the email field of a Windows Contact file.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

A heap overflow vulnerability exists in the dhcpcore.dll component of Windows DHCP Client. The vulnerability is triggered by two subsequent null bytes in a Domain Search DHCP Option within a DHCP Offer packet, followed by an arbitrary number of bytes, causing a zero-length buffer to be written, thus overwriting a invalid memory space. By exploiting the vulnerability, an attacker may be able to...

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

A remote code execution vulnerability exists in the Cisco IOS Software and Cisco IOS XE Software. The vulnerability is due to improper validation of packet data in the Smart Install feature. A remote unauthenticated attacker can exploit this vulnerability by sending a malformed packet to the target service. Successful exploitation could lead to arbitrary code execution or denial of service DoS...

CVSS: 4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)

This strike exploits an ACL bypass vulnerability in Mosquitto. If the username or client ID field is set to # or +, ACLs will be completely bypassed. An attacker can send a crafted mqtt message to access mqtt topics without proper ACL rights.

CVSS: 7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)

This strike exploits a information disclosure vulnerability found in Cisco Small Business RV320 and RV325 routers. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed...

CVSS: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

An out-of-bounds read vulnerability exists in Foxit Reader and PhantomPDF. This vulnerability is due to improper handling of the xdpContent property of a submit object. A remote attacker could exploit this vulnerability by enticing a user to open a malicious PDF document. Successful exploitation would allow the attacker to gain sensitive information that may help in further attacks.

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a buffer overflow vulnerability in tiffcp component of libtiff. The vulnerability is due to insufficient input validation of an unknown TIFF header field . A remote attacker could exploit this vulnerability by enticing a user to import a specially crafted TIFF file. Successful exploitation could lead to arbitrary code execution or denial-of-service conditions in the context of...

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a buffer overflow vulnerability in OMRON CX-One CX-Position. When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application. Successful exploitation could lead to arbitrary code execution.

CVSS: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

A heap buffer overflow exists in Rockwell Automation RSLinx Classic. The vulnerability is due to a flaw in the module that processes EtherNet/IP SendRRData messages. A remote unauthenticated attacker can exploit this vulnerability by sending a malformed packet to the target service. Successful exploitation could lead to arbitrary code execution or crash of the vulnerable application.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a remote code execution in Zoho ManageEngine OpManager. The vulnerability is due to deserialization of untrusted data by the DataMigrationServlet component. A remote attacker can exploit this vulnerability by sending crafted HTTP requests to the target server. Successful exploitation results in remote code execution.

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits an vulnerability in the Microsoft Edge browser. Specifically the vulnerability exists inside the Javascript Chakra engine. It is possible to craft Javascript in such a way that when a push or pop method is used on an object with a numeric property the associated InlineArrayPop or InlineArrayPush instruction is called. It is possible to cause type confusion allowing for a denial...

CVSS: 6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)

This strike exploits a cross-site scripting vulnerability in Webmin. The vulnerability results from the lack of sanitization when displaying the POST parameter history in /shell/index.cgi. A successful exploitation leads to arbitrary code execution in visitors browsers or credentials theft.

CVSS: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a stack buffer overflow in Hewlett Packard Enterprise HPE Intelligent Management Center IMC. An overly long user supplied curDir parameter sent to the dbman service gets written to a stack-based buffer with a fixed size causing a buffer overflow to occur. This can cause a denial of service condition to occur or potentially allow for remote code execution.

CVSS: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a denial of service vulnerability in PowerDNS. In a normal DNS message, the minimum number of bytes in the Additional Section is 16. If this section contains less than 11 bytes, an error in validation will lead to a buffer overread, which then causes the pdns recursor service to terminate abnormally, leading to a denial of service condition

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a remote code execution vulnerability in the PHP imap open function on Ubuntu or Debian. This vulnerability is due to improper handling of the -oProxyCommand values when a client sends http traffic to the server which has some imap functionality. A remote attacker can exploit this vulnerability by sending crafted http requests to the target server. Successful exploitation results...

CVSS: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

This strike exploits an information disclosure vulnerability in the Mozilla Firefox browser. Specifically, the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that result in the stack pointer being off by 8 bytes. When this occurs a memory address gets leaked that can be used as part of an exploit. This strike demonstrates the information disclosure by dumping the leaked...

CVSS: 5.4 (AV:A/AC:M/Au:N/C:P/I:P/A:P)

An exploitable stack-based buffer overflow exists in Losant Arduino MQTT client library. The vulnerability is a result of improper checks when a MQTT PUBLISH packet is received by the client which leads to certain memory areas from the stack to be overwritten. By controlling a rogue server, an attacker may be able to obtain code execution on connected MQTT peers.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a heap buffer overflow vulnerability in libVNC LibVNCServer. The vulnerability is due to improper validation of the file transfer request size by the File Transfer extension. Successful exploitation may result in remote code execution on the target server.

CVSS: 4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)

This strike exploits a stored Cross-Site Scripting vulnerability in WordPress MapSVG Plugin. The vulnerability is a consequence of no user input sanitization when storing the data[mapsvg data]. A successful exploitation leads to arbitrary code execution in visitors browsers or credentials theft.

Pages