Show filters
51 Total Results
Displaying 21-30 of 51
Sort by:
Attacker Value
Unknown

CVE-2020-7778

Disclosure Date: November 26, 2020 (last updated February 22, 2025)
This affects the package systeminformation before 4.30.2. The attacker can overwrite the properties and functions of an object, which can lead to executing OS commands.
0
Attacker Value
Unknown

CVE-2020-7752

Disclosure Date: October 26, 2020 (last updated February 22, 2025)
This affects the package systeminformation before 4.27.11. This package is vulnerable to Command Injection. The attacker can concatenate curl's parameters to overwrite Javascript files and then execute any OS commands.
0
Attacker Value
Unknown

CVE-2020-16170

Disclosure Date: August 11, 2020 (last updated February 21, 2025)
Use of Hard-coded Credentials in temi Robox OS prior to 120, temi Android app up to 1.3.7931 allows remote attackers to listen in on any ongoing calls between temi robots and their users if they can brute-force/guess a six-digit value via unspecified vectors.
Attacker Value
Unknown

CVE-2020-16168

Disclosure Date: August 07, 2020 (last updated February 21, 2025)
Origin Validation Error in temi Robox OS prior to 120, temi Android app up to 1.3.7931 allows remote attackers to access the REST API and MQTT broker used by the temi and send it custom data/requests via unspecified vectors.
Attacker Value
Unknown

CVE-2020-13932

Disclosure Date: July 20, 2020 (last updated February 21, 2025)
In Apache ActiveMQ Artemis 2.5.0 to 2.13.0, a specially crafted MQTT packet which has an XSS payload as client-id or topic name can exploit this vulnerability. The XSS payload is being injected into the admin console's browser. The XSS payload is triggered in the diagram plugin; queue node and the info section.
Attacker Value
Unknown

CVE-2020-10727

Disclosure Date: June 26, 2020 (last updated February 21, 2025)
A flaw was found in ActiveMQ Artemis management API from version 2.7.0 up until 2.12.0, where a user inadvertently stores passwords in plaintext in the Artemis shadow file (etc/artemis-users.properties file) when executing the `resetUsers` operation. A local attacker can use this flaw to read the contents of the Artemis shadow file.
Attacker Value
Unknown

CVE-2017-12174

Disclosure Date: March 07, 2018 (last updated November 26, 2024)
It was found that when Artemis and HornetQ before 2.4.0 are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError.
Attacker Value
Unknown

CVE-2016-4978

Disclosure Date: September 27, 2016 (last updated November 25, 2024)
The getObject method of the javax.jms.ObjectMessage class in the (1) JMS Core client, (2) Artemis broker, and (3) Artemis REST component in Apache ActiveMQ Artemis before 1.4.0 might allow remote authenticated users with permission to send messages to the Artemis broker to deserialize arbitrary objects and execute arbitrary code by leveraging gadget classes being present on the Artemis classpath.
Attacker Value
Unknown

CVE-2014-2363

Disclosure Date: July 26, 2014 (last updated October 05, 2023)
Morpho Itemiser 3 8.17 has hardcoded administrative credentials, which makes it easier for remote attackers to obtain access via a login request.
0
Attacker Value
Unknown

CVE-2013-5968

Disclosure Date: October 29, 2013 (last updated October 05, 2023)
Cross-site scripting (XSS) vulnerability in CA SiteMinder 12.0 through 12.51, and SiteMinder 6 Web Agents, allows remote attackers to inject arbitrary web script or HTML via vectors involving a " (double quote) character.
0