Page 3 of 56211 results (0.032 seconds)

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

17 Apr 2025 — Hazelcast Management Center through 6.0 allows remote code execution via a JndiLoginModule user.provider.url in a hazelcast-client XML document (aka a client configuration file), which can be uploaded at the /cluster-connections URI. • https://docs.hazelcast.com/management-center/6.0-snapshot/getting-started/install •

CVSS: 8.3EPSS: 0%CPEs: -EXPL: 0

17 Apr 2025 — An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the function 0x41dda8 • https://gist.github.com/xyqer1/734fd1d93e4c08cea55dcb1e8b189a2b • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 0%CPEs: -EXPL: 0

17 Apr 2025 — An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41737c • https://gist.github.com/xyqer1/b3bebe4967a3093951273738f0be45ce • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 0%CPEs: -EXPL: 0

17 Apr 2025 — An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41710c • https://gist.github.com/xyqer1/101b7308bdf8618d8be30bd1d09ddd38 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 0%CPEs: -EXPL: 0

17 Apr 2025 — An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the macaddr key value to the function 0x42232c • https://gist.github.com/xyqer1/841e78a3c4029808dac8c439595a1358 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 0%CPEs: -EXPL: 0

17 Apr 2025 — An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the function 0x417234 • https://gist.github.com/xyqer1/d5a5b18743b7a2fcbc0f93001d8e2ad9 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 0%CPEs: -EXPL: 0

17 Apr 2025 — Buffer Overflow vulnerability in Netgear- R61 router V1.0.1.28 allows a remote attacker to execute arbitrary code via the QUERY_STRING key value • https://gist.github.com/xyqer1/09fe6488a6655776c8c5d33e630a0f2a • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 10.0EPSS: 0%CPEs: -EXPL: 0

17 Apr 2025 — Buffer Overflow vulnerability in ALFA_CAMPRO-co-2.29 allows a remote attacker to execute arbitrary code via the newap_text_0 key value • https://gist.github.com/xyqer1/16f6b44ef062374bc32c12952c7b81f8 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 10.0EPSS: 0%CPEs: -EXPL: 0

17 Apr 2025 — Buffer Overflow vulnerability inALFA WiFi CampPro router ALFA_CAMPRO-co-2.29 allows a remote attacker to execute arbitrary code via the GAPSMinute3 key value • https://gist.github.com/xyqer1/7f9970240aec0af412caee79271a5be5 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 10.0EPSS: 0%CPEs: -EXPL: 0

17 Apr 2025 — Buffer Overflow vulnerability inALFA WiFi CampPro router ALFA_CAMPRO-co-2.29 allows a remote attacker to execute arbitrary code via the hiddenIndex in the function StorageEditUser • https://gist.github.com/xyqer1/74adbc0249eeacf762fb4d33cf93a0f5 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •