Page 48 of 37406 results (0.046 seconds)

CVSS: 4.7EPSS: 0%CPEs: -EXPL: 0

Contao 5.4.1 allows an authenticated admin account to upload a SVG file containing malicious javascript code into the target system. If the file is accessed through the website, it could lead to a Cross-Site Scripting (XSS) attack or execute arbitrary code via a crafted javascript to the target. • https://grimthereaperteam.medium.com/contao-5-4-1-malicious-file-upload-xss-in-svg-30edb8820ecb • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: -EPSS: 0%CPEs: -EXPL: 0

An attacker can inject malicious JavaScript code into the "Add New Entry" section, which allows them to execute arbitrary code in the context of a victim's web browser. • https://github.com/paragbagul111/CVE-2024-33209 •

CVSS: 5.4EPSS: 0%CPEs: -EXPL: 0

Scriptcase v.9.10.023 and before is vulnerable to Cross Site Scripting (XSS) in nm_cor.php via the form and field parameters. • https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-xss • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.0EPSS: 0%CPEs: -EXPL: 0

Scriptcase 9.10.023 and before is vulnerable to Remote Code Execution (RCE) via the nm_unzip function. • http://scriptcase.com https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 5.7EPSS: 0%CPEs: -EXPL: 0

An issue in Malwarebytes Premium Security v5.0.0.883 allows attackers to execute arbitrary code via placing crafted binaries into unspecified directories. • https://googleprojectzero.blogspot.com/2016/02/the-definitive-guide-on-win32-to-nt.html https://medium.com/%40danielshaulov01/malwarebytes-premium-security-av-bypass-cve-2024-44744-97bb6192ed4a • CWE-94: Improper Control of Generation of Code ('Code Injection') •