Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown
CVE-2024-7448
Disclosure Date: August 21, 2024 (last updated February 26, 2025)
Magnet Forensics AXIOM Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Magnet Forensics AXIOM. User interaction is required to exploit this vulnerability in that the target must acquire data from a malicious mobile device.
The specific flaw exists within the Android device image acquisition functionality. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-23964.
0
Attacker Value
Unknown
CVE-2023-42128
Disclosure Date: May 03, 2024 (last updated February 26, 2025)
Magnet Forensics AXIOM Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Magnet Forensics AXIOM. User interaction is required to exploit this vulnerability in that the target must acquire data from a malicious mobile device.
The specific flaw exists within the Android device image acquisition functionality. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-21255.
0
Attacker Value
Unknown
CVE-2022-22919
Disclosure Date: January 30, 2022 (last updated February 23, 2025)
Adenza AxiomSL ControllerView through 10.8.1 allows redirection for SSO login URLs.
0
Attacker Value
Unknown
CVE-2022-24032
Disclosure Date: January 30, 2022 (last updated February 23, 2025)
Adenza AxiomSL ControllerView through 10.8.1 is vulnerable to user enumeration. An attacker can identify valid usernames on the platform because a failed login attempt produces a different error message when the username is valid.
0
Attacker Value
Unknown
CVE-2015-9486
Disclosure Date: October 11, 2019 (last updated November 27, 2024)
The ThemeMakers Axioma Premium Responsive theme through 2015-05-15 for WordPress allows remote attackers to obtain sensitive information (such as user_login, user_pass, and user_email values) via a direct request for the wp-content/uploads/tmm_db_migrate/wp_users.dat URI.
0
Attacker Value
Unknown
CVE-2019-0708
Disclosure Date: May 16, 2019 (last updated July 26, 2024)
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
0
Attacker Value
Unknown
CVE-2015-5462
Disclosure Date: April 03, 2019 (last updated November 27, 2024)
AxiomSL's Axiom Google Web Toolkit module 9.5.3 and earlier allows remote attackers to inject HTML into the scoping dashboard features.
0
Attacker Value
Unknown
CVE-2015-5384
Disclosure Date: April 03, 2019 (last updated November 27, 2024)
AxiomSL's Axiom Google Web Toolkit module 9.5.3 and earlier is vulnerable to a Session Fixation attack.
0
Attacker Value
Unknown
CVE-2015-5463
Disclosure Date: April 03, 2019 (last updated November 27, 2024)
AxiomSL's Axiom java applet module (used for editing uploaded Excel files and associated Java RMI services) 9.5.3 and earlier allows remote attackers to (1) access data of other basic users through arbitrary SQL commands, (2) perform a horizontal and vertical privilege escalation, (3) cause a Denial of Service on global application, or (4) write/read/delete arbitrary files on server hosting the application.
0
Attacker Value
Unknown
CVE-2014-1640
Disclosure Date: January 28, 2014 (last updated October 05, 2023)
axiom-test.sh in axiom 20100701-1.1 uses tempfile to create a safe temporary file but appends a suffix to the original filename and writes to this new filename, which allows local users to overwrite arbitrary files via a symlink attack on the new filename.
0