Page 490 of 8799 results (0.019 seconds)

CVSS: 8.8EPSS: 0%CPEs: 288EXPL: 0

A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper input validation of specific values that are within a Cisco Discovery Protocol message. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to execute arbitrary code with root privileges or cause the Cisco Discovery Protocol process to crash and restart multiple times, which would cause the affected device to reload, resulting in a DoS condition. Note: Cisco Discovery Protocol is a Layer 2 protocol. • https://security.netapp.com/advisory/ntap-20220923-0001 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cdp-dos-ce-wWvPucC9 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

If a valid user is tricked into using maliciously crafted project files, an attacker could achieve arbitrary code execution. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-237-01 • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 1%CPEs: 21EXPL: 0

A remote user may cause an unexpected app termination or arbitrary code execution. • https://support.apple.com/en-us/HT213340 https://support.apple.com/en-us/HT213342 https://support.apple.com/en-us/HT213343 https://support.apple.com/en-us/HT213344 https://support.apple.com/en-us/HT213345 https://support.apple.com/en-us/HT213346 •

CVSS: 9.8EPSS: 0%CPEs: 10EXPL: 0

Movable Type XMLRPC API provided by Six Apart Ltd. contains a command injection vulnerability. Sending a specially crafted message by POST method to Movable Type XMLRPC API may allow arbitrary Perl script execution, and an arbitrary OS command may be executed through it. Affected products and versions are as follows: Movable Type 7 r.5202 and earlier, Movable Type Advanced 7 r.5202 and earlier, Movable Type 6.8.6 and earlier, Movable Type Advanced 6.8.6 and earlier, Movable Type Premium 1.52 and earlier, and Movable Type Premium Advanced 1.52 and earlier. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability. La API XMLRPC de Movable Type proporcionada por Six Apart Ltd. contiene una vulnerabilidad de inyección de comandos. • https://jvn.jp/en/jp/JVN57728859/index.html https://movabletype.org/news/2022/08/mt-795-687-released.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.1EPSS: 0%CPEs: 5EXPL: 1

The Classima WordPress theme before 2.1.11 and some of its required plugins (Classified Listing before 2.2.14, Classified Listing Pro before 2.0.20, Classified Listing Store & Membership before 1.4.20 and Classima Core before 1.10) do not escape a parameter before outputting it back in attributes, leading to Reflected Cross-Site Scripting El tema Classima de WordPress versiones anteriores a 2.1.11 y algunos de sus plugins necesarios (Classified Listing versiones anteriores a 2.2.14, Classified Listing Pro versiones anteriores a 2.0.20, Classified Listing Store & Membership versiones anteriores a 1.4.20 y Classima Core versiones anteriores a 1.10) no escapan un parámetro antes de devolverlo en atributos, conllevando a una taque de tipo Cross-Site Scripting Reflejado The Classima theme for WordPress is vulnerable to Reflected Cross-site Scripting in versions up to 2.1.11 due to insufficient input sanitization and output escaping on the 'q' parameter. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This also affects the Classified Listing plugin before 2.2.14, Classified Listing Pro plugin before 2.0.20, Classified Listing Store & Membership plugin before 1.4.20 and Classima Core plugin before 1.10 • https://wpscan.com/vulnerability/845f44ca-f572-48d7-a19a-89cace0b8993 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •