Displaying 121 - 140 of 38146
Last import : Jun 17 17:00

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

A remote code execution vulnerability exists in Drupal 7.x before 7.62, Drupal 8.5.x before 8.5.9 and Drupal 8.6.x before 8.6.6. The vulnerability is located within the PHPs built-in phar stream wrapper, when performing file operations on an untrusted phar:// URI. A remote attacker can exploit this vulnerability by sending a crafted HTTP packet to the target service. Successful exploitation could...

CVSS: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a null pointer dereference vulnerability in Memcached daemon. The vulnerability is due to inadequate lru command client request handing. By crafting a special MEMCACHE packet, an attacker can cause denial-of-service conditions in the context of the targeted application.

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in the Microsoft Edge browser. Specifically, the vulnerability exists in the javascript Chakra engine. It is possible to create javascript in such a way that allows for type confusion to occur when utilizing the Javascript localCompare method. This may lead to a denial of service condition in the browser, or potentially remote code execution.

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a vulnerability in Apple Safari Webkit. Specifically, it is possible to craft Javascript in such a way that allows for a use-after-free vulnerability to occur when calling the updateReferencedText method. This may lead to a denial of service condition in the browser, or potentially remote code execution.

CVSS: 5.5 (AV:N/AC:L/Au:S/C:P/I:P/A:N)

This strike simulates an arbitrary file upload attack on Oracle Weblogic. The vulnerability is a result of no sanitization for the wl upload application name header. Successful exploitation requires valid credentials and leads to arbitrary file upload and remote code execution.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike replicates an attack on Apache Tomcat based on a Windows command injection vulnerability. The flaw resides in the way the command arguments for a CGI script are transmitted from the requests parameters on the Windows OS. By exploiting this vulnerability, a remote unauthenticated attacker can execute commands on the host system.

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in the Microsoft Edge Chakra engine. Specifically the vulnerability is under the CrossSite class, which passes Javascript variables across different contexts. An attacker who successfully exploits the vulnerability could trigger a Use-After-Free condition.

CVSS: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

This strike exploits a memory leak denial of service vulnerability in ISC BIND. Requests with multiple edns-key-tag EDNS0 options result in a memory leak. An attacker can send multiple messages with multiple edns-key-tag EDNS0 options to exhaust system memory, resulting in a denial of corruption condition. Note: it takes thousands of malicious messages to exhaust a system's memory. However a...

CVSS: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

This strike exploits a PHP information disclosure vulnerability before version 5.6.31 and 7.x before 7.1.7 . This vulnerability is due to improper handling of objects in memory under GIF decoding function gdImageCreateFromGifCtx in gd gif in.c file. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted image file to the target server. Successful exploitation results in...

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in the Microsoft Edge Browser. Specifically, the vulnerability exists when the BoundFunction::NewInstance function is used to handle calls to a bound function. This method allocates a new argument array and copies the arguments into the new argument array. It will call the function without respecting the CallFlags_ExtraArg flag that indicates that there's an...

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike attempts to recreate a sequence of packets correlated with a buffer overflow vulnerability in Microsoft Windows SMBv1 service. Affected versions include Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold releases 1511 and 1607, and Windows Server 2016. The vulnerability is due to...

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a remote code execution on Realtek SDK Miniigd UPnP SOAP service. This vulnerability is due to improper handling of the parameter under xml tag when a client sends SOAP traffic to the server. A remote unauthenticated attacker can exploit this vulnerability by sending crafted http requests to the target server. Successful exploitation results in remote code execution.

CVSS: 9.0 (AV:N/AC:L/Au:N/C:C/I:P/A:P)

This strike replicates an integer overflow exploit for Chrome browser engine. The vulnerability can be triggered via the Array JS API by using the ArrayConcat or ArrayPrototypeFill as entry points. By successfully exploiting this flaw, an attacker can execute arbitrary code in the context of the Chromes renderer process.

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in the Microsoft Edge Browser. Specifically the vulnerability exists inside the Microsoft Chakra Javascript engine. It is possible to craft invalid Javascript that still gets parsed by the Chakra engine, which can result in type confusion in the InterpreterStackFrame::OP_ResumeYield method. This can cause a denial of service in the browser or potentially lead to...

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike attempts to recreate a sequence of packets correlated with a heap buffer overflow vulnerability in Microsoft Windows SMBv1 service. Affected versions include Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold releases 1511 and 1607, and Windows Server 2016. The vulnerability is due...

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a remote code execution in LimeSurvey. The vulnerability resides in a PHP Phar deserialization within the TCPDF component and can be exploited by uploading a malicious JPEG/Phar polyglot and exporting the survey that contains it. Exploiting this flaw requires authenticatiuon and results in remote code execution.

CVSS: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

This strike exhibits the network behavior of a buffer overflow vulnerability inside TP-Link WiFi router. The vulnerability is due do insufficient user input validation passed to ping addr parameter pertaining to PingIframeRpm.htm form. By crafting a malicious HTTP request, an attacker can cause DoS conditions or achieve code execution on the target device.

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a vulnerability in Apple Safari Webkit. It is possible to craft javascript and html in such a way that when calling the handleMenuItemSelected method a use after free vulnerability will occur. This can lead to a denial of service condition in the browser, or potentially allow for remote code execution.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a remote code execution vulnerability on Linksys E Series Router. This vulnerability is due to improper handling of the parameter under ttcp ip under http request. A remote unauthenticated attacker can exploit this vulnerability by sending crafted http requests to the target server. Successful exploitation results in remote code execution.

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in the Microsoft Edge Browser. Specifically, a type confusion vulnerability exists in the Chakra Javascript engine. When object header inlining is deoptimized, the type handler of the object is converted to a dictionary type handler. However, not all attributes belong to the dictionary type, and they are not taken into consideration. If these types are added or...

Pages