sj

3 exploits Active since Jan 2018
CVE-2017-8046 NOMISEC CRITICAL WORKING POC
Vmware Spring Boot < 1.5.9 - Improper Input Validation
Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.
1 stars
CVSS 9.8
CVE-2016-3957 NOMISEC CRITICAL WORKING POC
web2py <2.14.2 - Code Injection
The secure_load function in gluon/utils.py in web2py before 2.14.2 uses pickle.loads to deserialize session information stored in cookies, which might allow remote attackers to execute arbitrary code by leveraging knowledge of encryption_key.
CVSS 9.8
EIP-2026-103043 EXPLOITDB c WORKING POC
Xmame 0.102 - '-pb/-lang/-rec' Local Buffer Overflow