Show filters
224 Total Results
Displaying 131-140 of 224
Sort by:
Attacker Value
Unknown
CVE-2018-13681
Disclosure Date: July 09, 2018 (last updated November 27, 2024)
The mintToken function of a smart contract implementation for SOSCoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
0
Attacker Value
Unknown
CVE-2018-10236
Disclosure Date: April 19, 2018 (last updated November 26, 2024)
POSCMS 3.2.18 allows remote attackers to execute arbitrary PHP code via the diy\dayrui\controllers\admin\Syscontroller.php 'add' function because an attacker can control the value of $data['name'] with no restrictions, and this value is written to the FCPATH.$file file.
0
Attacker Value
Unknown
CVE-2018-10235
Disclosure Date: April 19, 2018 (last updated November 26, 2024)
POSCMS 3.2.10 allows remote attackers to execute arbitrary PHP code via the diy\module\member\controllers\admin\Setting.php 'index' function because an attacker can control the value of $cache['setting']['ucssocfg'] in diy\module\member\models\Member_model.php and write this code into the api/ucsso/config.php file.
0
Attacker Value
Unknown
diffoscope writes to arbitrary locations on disk based on the contents of an un…
Disclosure Date: April 13, 2018 (last updated November 26, 2024)
diffoscope before 77 writes to arbitrary locations on disk based on the contents of an untrusted archive.
0
Attacker Value
Unknown
CVE-2018-0220
Disclosure Date: March 08, 2018 (last updated November 26, 2024)
A vulnerability in the web-based management interface of Cisco Videoscape AnyRes Live could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvg87525.
0
Attacker Value
Unknown
CVE-2017-6745
Disclosure Date: August 07, 2017 (last updated November 26, 2024)
A vulnerability in the cache server within Cisco Videoscape Distribution Suite (VDS) for Television 3.2(5)ES1 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted appliance. The vulnerability is due to excessive mapped connections exhausting the allotted resources within the system. An attacker could exploit this vulnerability by sending large amounts of inbound traffic to a device with the intention of overloading certain resources. A successful exploit could cause the device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc39260.
0
Attacker Value
Unknown
CVE-2017-3221
Disclosure Date: July 22, 2017 (last updated November 26, 2024)
Blind SQL injection in Inmarsat AmosConnect 8 login form allows remote attackers to access user credentials, including user names and passwords.
0
Attacker Value
Unknown
CVE-2017-3222
Disclosure Date: July 22, 2017 (last updated November 26, 2024)
Hard-coded credentials in AmosConnect 8 allow remote attackers to gain full administrative privileges, including the ability to execute commands on the Microsoft Windows host platform with SYSTEM privileges by abusing AmosConnect Task Manager.
0
Attacker Value
Unknown
CVE-2017-10668
Disclosure Date: June 30, 2017 (last updated November 26, 2024)
A Padding Oracle exists in OSCI-Transport 1.2 as used in OSCI Transport Library 1.6.1 (Java) and OSCI Transport Library 1.6 (.NET). Under an MITM condition within the OSCI infrastructure, an attacker needs to send crafted protocol messages to analyse the CBC mode padding in order to decrypt the transport encryption.
0
Attacker Value
Unknown
CVE-2017-10669
Disclosure Date: June 30, 2017 (last updated November 26, 2024)
Signature Wrapping exists in OSCI-Transport 1.2 as used in OSCI Transport Library 1.6.1 (Java) and OSCI Transport Library 1.6 (.NET). An attacker with access to unencrypted OSCI protocol messages must send crafted protocol messages with duplicate IDs.
0