Page 267 of 8664 results (0.018 seconds)

CVSS: 8.0EPSS: 0%CPEs: 8EXPL: 0

Vulnerabilities exist in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways that could allow an attacker to execute arbitrary code early in the boot sequence. An attacker could exploit this vulnerability to gain access to and change underlying sensitive information in the affected controller leading to complete system compromise. Existen vulnerabilidades en la implementación de la BIOS de los Controladores y Gateways de las Series 9200 y 9000 de Aruba que podrían permitir a un atacante ejecutar código arbitrario en las primeras etapas de la secuencia de inicio. Un atacante podría aprovechar esta vulnerabilidad para obtener acceso y cambiar información sensible subyacente en el controlador afectado, lo que comprometería completamente el sistema. • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. • https://helpx.adobe.com/security/products/acrobat/apsb21-51.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. • https://helpx.adobe.com/security/products/acrobat/apsb21-51.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Path traversal vulnerability in SHIRASAGI prior to v1.18.0 allows a remote authenticated attacker to alter or create arbitrary files on the server, resulting in arbitrary code execution. • https://jvn.jp/en/jp/JVN82758000 https://www.ss-proj.org/support/954.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Cuppa CMS v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the email_outgoing parameter at /Configuration.php. This vulnerability is triggered via a crafted payload. Se descubrió que Cuppa CMS v1.0 contiene una vulnerabilidad de ejecución remota de código (RCE) a través del parámetro "email_outgoing parameter at /Configuration.php". Esta vulnerabilidad se activa a través de un payload manipulado. • https://github.com/yanbochen97/CuppaCMS_RCE • CWE-94: Improper Control of Generation of Code ('Code Injection') •