Show filters
63 Total Results
Displaying 51-60 of 63
Sort by:
Attacker Value
Unknown
CVE-2021-39301
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.
0
Attacker Value
Unknown
CVE-2021-39300
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.
0
Attacker Value
Unknown
CVE-2021-39299
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.
0
Attacker Value
Unknown
CVE-2021-39297
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.
0
Attacker Value
Unknown
CVE-2020-13151
Disclosure Date: August 05, 2020 (last updated February 21, 2025)
Aerospike Community Edition 4.9.0.5 allows for unauthenticated submission and execution of user-defined functions (UDFs), written in Lua, as part of a database query. It attempts to restrict code execution by disabling os.execute() calls, but this is insufficient. Anyone with network access can use a crafted UDF to execute arbitrary OS commands on all nodes of the cluster at the permission level of the user running the Aerospike service.
0
Attacker Value
Unknown
CVE-2014-3649
Disclosure Date: November 04, 2019 (last updated November 27, 2024)
JBoss AeroGear has reflected XSS via the password field
0
Attacker Value
Unknown
CVE-2016-10558
Disclosure Date: May 29, 2018 (last updated November 26, 2024)
aerospike is an Aerospike add-on module for Node.js. aerospike versions below 2.4.2 download binary resources over HTTP, which leaves the module vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
0
Attacker Value
Unknown
CVE-2017-8894
Disclosure Date: July 02, 2017 (last updated November 26, 2024)
AeroAdmin 4.1 uses an insecure protocol (HTTP) to perform software updates. An attacker can hijack an update via man-in-the-middle in order to execute code in the machine.
0
Attacker Value
Unknown
CVE-2017-8893
Disclosure Date: July 02, 2017 (last updated November 26, 2024)
AeroAdmin 4.1 uses a function to copy data between two pointers where the size of the data copied is taken directly from a network packet. This can cause a buffer overflow and denial of service.
0
Attacker Value
Unknown
CVE-2014-6976
Disclosure Date: October 16, 2014 (last updated October 05, 2023)
The Aeroexpress (aka ru.lynx.aero) application 2.6.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0