Show filters
249 Total Results
Displaying 201-210 of 249
Sort by:
Attacker Value
Unknown
CVE-2018-11763
Disclosure Date: September 25, 2018 (last updated November 08, 2023)
In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.
0
Attacker Value
Unknown
CVE-2018-8032
Disclosure Date: August 02, 2018 (last updated November 08, 2023)
Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services.
0
Attacker Value
Unknown
A captured MAC/device ID of an iTrack Easy can be registered under multiple use…
Disclosure Date: July 13, 2018 (last updated November 27, 2024)
A captured MAC/device ID of an iTrack Easy can be registered under multiple user accounts allowing access to getgps GPS data, which can allow unauthenticated parties to track the device.
0
Attacker Value
Unknown
iTrack Easy's getgps data can be modified without authentication
Disclosure Date: July 13, 2018 (last updated November 27, 2024)
getgps data in iTrack Easy can be modified without authentication by setting the data using the parametercmd:setothergps. This vulnerability can be exploited to alter the GPS data of a lost device.
0
Attacker Value
Unknown
CVE-2018-8013
Disclosure Date: May 24, 2018 (last updated November 08, 2023)
In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.
0
Attacker Value
Unknown
CVE-2016-6598
Disclosure Date: January 30, 2018 (last updated November 26, 2024)
BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting file storage service (FileStorageService) on port 9010. This service contains a method that allows uploading a file to an arbitrary path on the machine that is running Track-It!. This can be used to upload a file to the web root and achieve code execution as NETWORK SERVICE or SYSTEM.
0
Attacker Value
Unknown
CVE-2016-6599
Disclosure Date: January 30, 2018 (last updated November 26, 2024)
BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting configuration service (ConfigurationService) on port 9010. This service contains a method that can be used to retrieve a configuration file that contains the application database name, username and password as well as the domain administrator username and password. These are encrypted with a fixed key and IV ("NumaraIT") using the DES algorithm. The domain administrator username and password can only be obtained if the Self-Service component is enabled, which is the most common scenario in enterprise deployments.
0
Attacker Value
Unknown
CVE-2017-1000068
Disclosure Date: July 17, 2017 (last updated November 26, 2024)
TestTrack Server versions 1.0 and earlier are vulnerable to an authentication flaw in the split disablement feature resulting in the ability to disable arbitrary running splits and cause denial of service to clients in the field.
0
Attacker Value
Unknown
CVE-2017-5645
Disclosure Date: April 17, 2017 (last updated November 08, 2023)
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
0
Attacker Value
Unknown
CVE-2015-5655
Disclosure Date: November 10, 2015 (last updated October 05, 2023)
The Adways Party Track SDK before 1.6.6 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0