Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
delegate delegate vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2013-3171
The serialization functionality in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 does not properly check the permissions of delegate objects, which allows remote malicious users to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2)...
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.0
Microsoft .net Framework 4.5
Microsoft .net Framework 2.0
NA
CVE-2023-34449
ink! is an embedded domain specific language to write smart contracts in Rust for blockchains built on the Substrate framework. Starting in version 4.0.0 and prior to version 4.2.1, the return value when using delegate call mechanics, either through `CallBuilder::delegate` or `in...
Parity Ink\\!
9.3
CVSSv2
CVE-2013-3132
Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check the permissions of objects that use reflection, which allows remote malicious users to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET...
Microsoft .net Framework 1.0
Microsoft .net Framework 1.1
Microsoft .net Framework 2.0
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.0
Microsoft .net Framework 4.5
6
CVSSv2
CVE-2020-8495
In Kronos Web Time and Attendance (webTA) 3.8.x and later 3.x versions prior to 4.0, the com.threeis.webta.H491delegate servlet allows an attacker with Timekeeper or Supervisor privileges to gain unauthorized administrative privileges within the application via the delegate, dele...
Kronos Web Time And Attendance
6.3
CVSSv2
CVE-2020-14299
A flaw was found in JBoss EAP, where the authentication configuration is set-up using a legacy SecurityRealm, to delegate to a legacy PicketBox SecurityDomain, and then reloaded to admin-only mode. This flaw allows an malicious user to perform a complete authentication bypass by ...
Redhat Jboss Enterprise Application Platform
Redhat Openshift Application Runtimes -
Redhat Single Sign-on 7.0
7.5
CVSSv2
CVE-2005-4601
The delegate code in ImageMagick 6.2.4.5-0.3 allows remote malicious users to execute arbitrary commands via shell metacharacters in a filename that is processed by the display command.
Imagemagick Imagemagick 6.2.4.5
7.5
CVSSv2
CVE-2016-5239
The gnuplot delegate functionality in ImageMagick prior to 6.9.4-0 and GraphicsMagick allows remote malicious users to execute arbitrary commands via unspecified vectors.
Imagemagick Imagemagick
9.3
CVSSv2
CVE-2010-1898
The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP1, 2.0 SP2, 3.5, 3.5 SP1, and 3.5.1, and Microsoft Silverlight 2 and 3 prior to 3.0.50611.0 on Windows and prior to 3.0.41130.0 on Mac OS X, does not properly handle interfaces and delegations to virtual methods,...
Microsoft .net Framework 2.0
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft Silverlight
Microsoft Silverlight 3.0.40723.0
Microsoft Silverlight 3.0.40624.00
Microsoft Silverlight 2.0.40115.00
Microsoft Silverlight 2.0.31005.00
Microsoft Silverlight 3.0.40818.0
9.3
CVSSv2
CVE-2007-0770
Buffer overflow in GraphicsMagick and ImageMagick allows user-assisted remote malicious users to cause a denial of service and possibly execute arbitrary code via a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c. NOTE: this issue is due to ...
Graphicsmagick Graphicsmagick
Imagemagick Imagemagick 6.3.3.4
5.1
CVSSv2
CVE-2006-0082
Format string vulnerability in the SetImageInfo function in image.c for ImageMagick 6.2.3 and other versions, and GraphicsMagick, allows user-assisted malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a numeric format string specifier su...
Imagemagick Imagemagick 6.2.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »