Page 3 of 38673 results (0.007 seconds)

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized. • https://www.veritas.com/content/support/en_US/security/VTS24-014 •

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized. • https://www.veritas.com/content/support/en_US/security/VTS24-014 •

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized. • https://www.veritas.com/content/support/en_US/security/VTS24-014 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the MJ_gmgt_user_avatar_image_upload() function in all versions up to, and including, 67.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://codecanyon.net/item/-wpgym-wordpress-gym-management-system/13352964 https://www.wordfence.com/threat-intel/vulnerabilities/id/bae5f22d-5085-4230-a7fc-5db85aa6fbdb?source=cve • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Possible Command injection Vulnerability in iManager has been discovered in OpenTextâ„¢ iManager 3.2.4.0000. • https://www.netiq.com/documentation/imanager-32/imanager325_releasenotes/data/imanager325_releasenotes.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •