Page 3 of 35321 results (0.044 seconds)

CVSS: -EPSS: 0%CPEs: -EXPL: 0

An arbitrary file upload vulnerability in ModbusMechanic v3.0 allows attackers to execute arbitrary code via uploading a crafted .xml file. • http://modbusmechanic.com https://github.com/Gelcon/PoC-ModbusMechanic-3.0-Insecure-Deserialization-and-RCE

CVSS: -EPSS: 0%CPEs: -EXPL: 0

An arbitrary file upload vulnerability in the importSettings method of VisiCut v2.1 allows attackers to execute arbitrary code via uploading a crafted Zip file. • http://visicut.com https://download.visicut.org https://github.com/Gelcon/PoC-of-VisiCut2_1-Stack-Overflow-Vul •

CVSS: -EPSS: 0%CPEs: -EXPL: 0

An arbitrary file upload vulnerability in the component \Roaming\Omega of OmegaT v6.0.1 allows attackers to execute arbitrary code via uploading a crafted .conf file. • http://omegat.com https://github.com/Gelcon/PoCofOmegaTV6_0_1 https://omegat.org •

CVSS: -EPSS: 0%CPEs: -EXPL: 0

An arbitrary file upload vulnerability in the component \Users\username.BlackBoard of BlackBoard v2.0.0.2 allows attackers to execute arbitrary code via uploading a crafted .xml file. • http://blackboard.com https://github.com/Gelcon/PoCofBlackBoard2.0.0.2 •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

IrfanView DWG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. ... An attacker can leverage this vulnerability to execute code in the context of the current process. ... This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. ... An attacker can leverage this vulnerability to execute code in the context of the current process. • https://www.zerodayinitiative.com/advisories/ZDI-24-1594 • CWE-125: Out-of-bounds Read •