Page 2 of 35333 results (0.041 seconds)

CVSS: -EPSS: %CPEs: -EXPL: 0

A Client-Side Template Injection (CSTI) vulnerability in the component /project/new/scrum of Taiga v 8.6.1 allows remote attackers to execute arbitrary code by injecting a malicious payload within the new project details. • https://drive.google.com/file/d/1v2MLZn4Ro9TCpw-KtksUACYFIzsbuTkL/view?usp=sharing https://gist.githubusercontent.com/Tommywarren/5ed67ab173ed60faeb791215d68e3fac/raw/352cb4259c0d41d70a206d108b5578c15824b2ff/CVE-2024-53554 •

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized. • https://www.veritas.com/content/support/en_US/security/VTS24-014 •

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized. • https://www.veritas.com/content/support/en_US/security/VTS24-014 •

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized. • https://www.veritas.com/content/support/en_US/security/VTS24-014 •

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized. • https://www.veritas.com/content/support/en_US/security/VTS24-014 •