Important Information

On August 12th, 2022, many of Keysight’s Network Test, Network Visibility, & Edge to Core (NAS/formerly Ixia) products will migrate to a new license structure.

CRITICAL: If you perform licensing operations after August 12th, 2022, without upgrading the licensing software to the latest version, licenses may not register properly, and some features may be missing. This could impact testing and result in downtime.

For details, click here.

Displaying 181 - 200 of 58316

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in Apple Safari Webkit. Specifically after optimizations are performed on AIR code, a register gets marked as late use and ultimately is determined to be a dead register and discarded. It may be possible for an attacker to construct Javascript in such a way that it is possible to control the data in this dangling register. This can cause a denial of service...

CVSS: 4.0 (AV:L/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a vulnerability in Apple Safari Webkit. Specifically a JSValue ValueProfile pointing to a previously freed chunk of memory which will have its JSCell header overwritten. When this gets accessed out of bounds a crash will occur. An attacker can craft javascript in such a manner that will cause memory corruption to occur, causing a denial of service in the browser and potentially...

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in Apple Safari Webkit. It is possible for an attacker to construct Javascript in such a way that when the emitEqualityOpImpl method is called it will incorrectly replace the typeof instruction with the is cell with type instruction. This can cause a denial of service condition in the browser or potentially allow for remote code execution to occur.

CVSS: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

This strike exploits a remote code execution in the HPE Intelligent Management. The vulnerability is due to improper sanitization of user input beanName which is passed to the application via the IccSelectDevTypeBean class. A remote authorized attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation results in remote code execution on the...

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a remote code execution in the JIRA Template. The vulnerability is due to improper sanitization of user input which is passed to the application via the ContactAdministrators and SendBulkMail actions. A remote authorized attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation results in remote code execution on the target...

CVSS: 9.0 (AV:N/AC:L/Au:N/C:P/I:P/A:C)

An OS command injection vulnerability exists in Webmin 1.920 and prior versions. The flaw exists in the password change functionality and is reachable via the /password change.cgi endopint. By exploiting this vulnerability, a remote unauthenticated attacker may execute arbitrary OS commands on the target system.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

An integer underflow vulnerability exists in VxWorks 6.8 TCP stack. This strike simulates a denial of service attack by setting the URGENT TCP pointer to 0 zero when communicating with any network service. By exploiting this flaw, a remote attacker can cause denial of service by crashing the target network stack.

CVSS: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

This strike replicates a directory traversal attack on Fortinet FortiOS. The vulnerability resides in the /remote/fgt lang endpoint and affects product versions 5.6.3 to 5.6.7 and 6.0.0 to 6.0.4. By exploiting this flaw, a remote unauthenticated attacker may take over the device and perform attacks such as DNS hijacks.

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a format string vulnerability on Palo Alto GlobalProtect server. The flaw resides in the sslmgr endpoint due to lack of user input validation. A remote unauthenticated attacker may thus crash a vulnerable instance or even execute arbitrary code.

CVSS: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a denial of service vulnerability in HAProxy server. The vulnerability is due to incorrect handling of the cookie header under HTTP traffic. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to the target server. Successful exploitation results in denial-of-service on the target server.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a code execution vulnerability in LibreOffice. The vulnerability is due to unrestricted use of document event function to trigger LibreLogo to execute python contained within a document. An attacker could entice the victim to open the crafted odt file. Successful exploitation could lead to code execution on the victims Machine.

CVSS: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)

This strike emulates a DOS attack on HPE Intelligent Management Center. The vulnerability is due to no authentication being performed when the opcode 10014/kill is being processed. A remote unauthenticated attacker may create denial-of-service conditions by crashing the target server.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a command execution vulnerability in ZTE F460/F660 cable modem Web Interface. The vulnerability is due to improper access checks of the web platform resources. Successful exploitation can result in arbitrary commands on the target system.

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a vulnerability in Apple Safari Webkit. Specifically the vulnerability exists in the WebCore::RenderMultiColumnSet::updateMinimumColumnHeight method. It is possible to craft Javascript in such a way that allows for a Use-After-Free condition to occur when invoking the updateMinimumColumnHeight method. This can lead to a denial of service in the browser application or potentially...

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a command execution vulnerability in Netgear R7000 Router Web Interface. The vulnerability is due to improper access checks of the web platform resources. Successful exploitation can result in arbitrary commands via shell metacharacters in the path info to cgi-bin.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits an arbitrary file copy vulnerability in the ProFTPd. The vulnerability is due to a design flaw within the mod copy module. Successful exploitation can lead to remote code execution and information disclosure without authentication. NOTE: This issue is related to CVE-2015-3306.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a remote code execution vulnerability present in Adobe ColdFusion platform. This vulnerability is due to the JNBridge binary protocol port being exposed without any authentication. By exploiting an unpatched version of the application, an attacker is thus able to remotely execute arbitrary code as the root or SYSTEM privileges.

CVSS: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

This strike exploits a stack buffer overflow in iptables-restore v1.8.2. The flaw resides in the add param to argv function that handles argument parsing, due to a fixed-size buffer of 1024 bytes. A remote attacker can exploit it by enticing a privileged user to call iptables-restore using the malicious file, resulting in arbitrary code execution.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

A stack-based buffer overflow exists in ZeroMQ libzmq due to improper validation of the INITIATE command in curve server.cpp. A remote, unauthenticated attacker could exploit this vulnerability by sending a specially crafted packet to the vulnerable service. Successful exploitation could result in denial of service conditions, or execution of arbitrary code.

CVSS: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

This strike replicates a stack-based buffer overflow attack on a PostgreSQL database server. The flaw is a consequence of no string size checking when base64-decoding a stored hashed password. Successful exploitation by a remote authenticated attacker may result in arbitrary code execution or crashing the server.

Pages