Show filters
51 Total Results
Displaying 1-10 of 51
Sort by:
Attacker Value
Unknown

CVE-2024-56334

Disclosure Date: December 20, 2024 (last updated December 21, 2024)
systeminformation is a System and OS information library for node.js. In affected versions SSIDs are not sanitized when before they are passed as a parameter to cmd.exe in the `getWindowsIEEE8021x` function. This means that malicious content in the SSID can be executed as OS commands. This vulnerability may enable an attacker, depending on how the package is used, to perform remote code execution or local privilege escalation. This issue has been addressed in version 5.23.7 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
0
Attacker Value
Unknown

CVE-2023-50780

Disclosure Date: October 14, 2024 (last updated October 17, 2024)
Apache ActiveMQ Artemis allows access to diagnostic information and controls through MBeans, which are also exposed through the authenticated Jolokia endpoint. Before version 2.29.0, this also included the Log4J2 MBean. This MBean is not meant for exposure to non-administrative users. This could eventually allow an authenticated attacker to write arbitrary files to the filesystem and indirectly achieve RCE. Users are recommended to upgrade to version 2.29.0 or later, which fixes the issue.
Attacker Value
Unknown

CVE-2024-9166

Disclosure Date: September 26, 2024 (last updated September 27, 2024)
The device enables an unauthorized attacker to execute system commands with elevated privileges. This exploit is facilitated through the use of the 'getcommand' query within the application, allowing the attacker to gain root access.
0
Attacker Value
Unknown

CVE-2024-36459

Disclosure Date: June 14, 2024 (last updated June 15, 2024)
A CRLF cross-site scripting vulnerability has been identified in certain configurations of the SiteMinder Web Agent for IIS Web Server and SiteMinder Web Agent for Domino Web Server. As a result, an attacker can execute arbitrary Javascript code in a client browser.
0
Attacker Value
Unknown

CVE-2024-23683

Disclosure Date: January 19, 2024 (last updated January 27, 2024)
Artemis Java Test Sandbox versions less than 1.7.6 are vulnerable to a sandbox escape when an attacker crafts a special subclass of InvocationTargetException. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.
Attacker Value
Unknown

CVE-2024-23682

Disclosure Date: January 19, 2024 (last updated January 27, 2024)
Artemis Java Test Sandbox versions before 1.8.0 are vulnerable to a sandbox escape when an attacker includes class files in a package that Ares trusts. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.
Attacker Value
Unknown

CVE-2024-23681

Disclosure Date: January 19, 2024 (last updated January 27, 2024)
Artemis Java Test Sandbox versions before 1.11.2 are vulnerable to a sandbox escape when an attacker loads untrusted libraries using System.load or System.loadLibrary. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.
Attacker Value
Unknown

CVE-2023-42810

Disclosure Date: September 21, 2023 (last updated October 08, 2023)
systeminformation is a System Information Library for Node.JS. Versions 5.0.0 through 5.21.6 have a SSID Command Injection Vulnerability. The problem was fixed with a parameter check in version 5.21.7. As a workaround, check or sanitize parameter strings that are passed to `wifiConnections()`, `wifiNetworks()` (string only).
Attacker Value
Unknown

CVE-2023-23956

Disclosure Date: May 30, 2023 (last updated October 08, 2023)
A user can supply malicious HTML and JavaScript code that will be executed in the client browser
Attacker Value
Unknown

CVE-2021-4040

Disclosure Date: August 24, 2022 (last updated February 24, 2025)
A flaw was found in AMQ Broker. This issue can cause a partial interruption to the availability of AMQ Broker via an Out of memory (OOM) condition. This flaw allows an attacker to partially disrupt availability to the broker through a sustained attack of maliciously crafted messages. The highest threat from this vulnerability is system availability.