Show filters
812 Total Results
Displaying 91-100 of 812
Sort by:
Attacker Value
Moderate
CVE-2024-24725
Disclosure Date: March 23, 2024 (last updated April 02, 2024)
Gibbon through 26.0.00 allows remote authenticated users to conduct PHP deserialization attacks via columnOrder in a POST request to the modules/System%20Admin/import_run.php&type=externalAssessment&step=4 URI.
2
Attacker Value
Very High
Oracle Application Testing Suite DownloadServlet Directory Traversal Remote Cod…
Disclosure Date: April 23, 2019 (last updated February 13, 2020)
Oracle Application Testing Suite versions 13.3.0.1 and prior are vulnerable to a directory traversal attack. An attacker could leverage this to steal sensitive credentials, decrypt them, gain privileges, and get remote code execution.
0
Attacker Value
Very High
Java 7 Applet Remote Code Execution
Disclosure Date: August 28, 2012 (last updated February 13, 2020)
Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.
0
Attacker Value
Unknown
Microsoft Internet Explorer Use-After-Free Vulnerability
Disclosure Date: February 14, 2014 (last updated February 13, 2020)
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribute of a script element, as exploited in the wild in January and February 2014.
0
Attacker Value
Unknown
Microsoft Tagged Image File Format Heap Overflow
Disclosure Date: November 06, 2013 (last updated July 25, 2024)
GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013.
0
Attacker Value
Low
CVE-2018-18492: Mozilla Firefox Select Element Use-After-Free
Disclosure Date: February 28, 2019 (last updated February 13, 2020)
Firefox is a free and open-source web browser developed by the Mozilla Foundation.
A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection, which gets garbage collected, and results in a potentially exploitable crash. Originally, it was discovered by Nils.
0
Attacker Value
Unknown
Cisco Security Agent Management Console st_upload File Creation
Disclosure Date: February 19, 2011 (last updated February 13, 2020)
The Management Console (webagent.exe) in Cisco Security Agent 5.1, 5.2, and 6.0 before 6.0.2.145 allows remote attackers to create arbitrary files and execute arbitrary code via unspecified parameters in a crafted st_upload request.
0
Attacker Value
Unknown
HP iMC 5.0 TFTP WRQ "Remote Code Execution" Vulnerability
Disclosure Date: May 13, 2011 (last updated October 04, 2023)
tftpserver.exe in HP Intelligent Management Center (IMC) 5.0 before E0101L02 allows remote attackers to create or overwrite files, and subsequently execute arbitrary code, via a crafted WRQ request.
0
Attacker Value
Unknown
Microsoft Internet Explorer Use-After-Free Vulnerability
Disclosure Date: October 15, 2014 (last updated February 13, 2020)
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a "Sandworm" attack in June through October 2014, aka "Windows OLE Remote Code Execution Vulnerability."
0
Attacker Value
Unknown
Ruby on Rails DoubleTap Development Mode secret_key_base Vulnerability
Disclosure Date: March 27, 2019 (last updated February 13, 2020)
Ruby on Rails versions including 5.2.2.1 and prior are vulnerable to a predicatble secret_key_base in development mode, which could be used to recreated a signed message, such as a serialized object, and gain remote code execution.
0