Show filters
12,006 Total Results
Displaying 41-50 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
High

kubectl cp path traversal

Disclosure Date: April 01, 2019 (last updated November 08, 2023)
The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.
0
Attacker Value
High

Wordpress Post Meta Entry RCE

Disclosure Date: February 20, 2019 (last updated November 27, 2024)
WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.
0
Attacker Value
Unknown

CVE-2019-6447

Disclosure Date: January 16, 2019 (last updated November 27, 2024)
The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.
Attacker Value
Unknown

CVE-2016-7048

Disclosure Date: August 20, 2018 (last updated November 27, 2024)
The interactive installer in PostgreSQL before 9.3.15, 9.4.x before 9.4.10, and 9.5.x before 9.5.5 might allow remote attackers to execute arbitrary code by leveraging use of HTTP to download software.
Attacker Value
Unknown

CVE-2017-14723

Disclosure Date: September 23, 2017 (last updated November 26, 2024)
Before version 4.8.2, WordPress mishandled % characters and additional placeholder values in $wpdb->prepare, and thus did not properly address the possibility of plugins and themes enabling SQL injection attacks.
1
Attacker Value
Low

CVE-2014-9301

Disclosure Date: December 07, 2014 (last updated October 05, 2023)
Server-side request forgery (SSRF) vulnerability in the proxy servlet in Alfresco Community Edition before 5.0.a allows remote attackers to trigger outbound requests to intranet servers, conduct port scans, and read arbitrary files via a crafted URI in the endpoint parameter.
0
Attacker Value
Low

CVE-2011-2763

Disclosure Date: September 02, 2011 (last updated October 04, 2023)
The web interface on the LifeSize Room appliance LS_RM1_3.5.3 (11) and 4.7.18 allows remote attackers to execute arbitrary commands via a modified request to the LSRoom_Remoting.doCommand function in gateway.php.
0
Attacker Value
Unknown

CVE-2025-26757

Disclosure Date: February 22, 2025 (last updated February 23, 2025)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in FULL SERVICES FULL Customer allows PHP Local File Inclusion. This issue affects FULL Customer: from n/a through 3.1.26.
0
Attacker Value
Unknown

CVE-2024-52939

Disclosure Date: February 22, 2025 (last updated February 23, 2025)
Kernel software installed and running inside a Guest VM may post improper commands to the GPU Firmware to trigger a write data outside the Guest's virtualised GPU memory.
0
Attacker Value
Unknown

CVE-2024-47896

Disclosure Date: February 22, 2025 (last updated February 23, 2025)
Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data outside the Guest's virtualised GPU memory.
0