Page 318 of 54321 results (0.214 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

01 Jul 2024 — A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. ... A remote attacker could possibly use this issue to bypass authentication. ... A remote attacker could possibly use this issue to execute scripts in directories not directly reachable by any URL, or cause a denial of service. ... A remote attacker could possibly use this issue to obtain sensitive information, execute local scripts, or perform SSRF attac... • https://httpd.apache.org/security/vulnerabilities_24.html • CWE-476: NULL Pointer Dereference •

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 0

01 Jul 2024 — In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10, a low-privileged user that does not hold the admin or power Splunk roles could cause a Remote Code Execution through an external lookup that references the “splunk_archiver“ application. • https://advisory.splunk.com/advisories/SVD-2024-0705 • CWE-253: Incorrect Check of Function Return Value CWE-687: Function Call With Incorrectly Specified Argument Value •

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 0

01 Jul 2024 — In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 on Windows, an authenticated user could execute a specially crafted query that they could then use to serialize untrusted data. The attacker could use the query to execute arbitrary code. • https://advisory.splunk.com/advisories/SVD-2024-0704 • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.0EPSS: 0%CPEs: 5EXPL: 0

01 Jul 2024 — The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance. • https://advisory.splunk.com/advisories/SVD-2024-0703 • CWE-75: Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 6.7EPSS: 0%CPEs: 475EXPL: 1

01 Jul 2024 — A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device. ... A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root. ... A vulnerabi... • https://github.com/Blootus/CVE-2024-20399-Cisco-RCE • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 95%CPEs: 6EXPL: 24

01 Jul 2024 — Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbi... • https://github.com/jakabakos/CVE-2024-36401-GeoServer-RCE • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

01 Jul 2024 — This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. • https://gist.github.com/mestrtee/9a2b522d59c53f31f45c1edb96459693 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

01 Jul 2024 — An issue in the component ControlCenter.sys/ControlCenter64.sys of ThundeRobot Control Center v2.0.0.10 allows attackers to access sensitive information, execute arbitrary code, or escalate privileges via sending crafted IOCTL requests. • https://github.com/Souhardya/Exploit-PoCs/tree/main/ThundeRobot_Control_center • CWE-782: Exposed IOCTL with Insufficient Access Control •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

01 Jul 2024 — This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. • https://gist.github.com/mestrtee/f09a507c8d59fbbb7fd40880cd9b87ed • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

01 Jul 2024 — This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. • https://gist.github.com/mestrtee/039e3e337642e6bb7f36aeddfde41b8b • CWE-94: Improper Control of Generation of Code ('Code Injection') •