Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
delegate delegate vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2013-3171
The serialization functionality in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 does not properly check the permissions of delegate objects, which allows remote malicious users to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2)...
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.0
Microsoft .net Framework 4.5
Microsoft .net Framework 2.0
NA
CVE-2023-34449
ink! is an embedded domain specific language to write smart contracts in Rust for blockchains built on the Substrate framework. Starting in version 4.0.0 and prior to version 4.2.1, the return value when using delegate call mechanics, either through `CallBuilder::delegate` or `in...
Parity Ink\\!
828
VMScore
CVE-2013-3132
Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check the permissions of objects that use reflection, which allows remote malicious users to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET...
Microsoft .net Framework 1.0
Microsoft .net Framework 1.1
Microsoft .net Framework 2.0
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.0
Microsoft .net Framework 4.5
534
VMScore
CVE-2020-8495
In Kronos Web Time and Attendance (webTA) 3.8.x and later 3.x versions prior to 4.0, the com.threeis.webta.H491delegate servlet allows an attacker with Timekeeper or Supervisor privileges to gain unauthorized administrative privileges within the application via the delegate, dele...
Kronos Web Time And Attendance
561
VMScore
CVE-2020-14299
A flaw was found in JBoss EAP, where the authentication configuration is set-up using a legacy SecurityRealm, to delegate to a legacy PicketBox SecurityDomain, and then reloaded to admin-only mode. This flaw allows an malicious user to perform a complete authentication bypass by ...
Redhat Jboss Enterprise Application Platform
Redhat Openshift Application Runtimes -
Redhat Single Sign-on 7.0
668
VMScore
CVE-2005-4601
The delegate code in ImageMagick 6.2.4.5-0.3 allows remote malicious users to execute arbitrary commands via shell metacharacters in a filename that is processed by the display command.
Imagemagick Imagemagick 6.2.4.5
668
VMScore
CVE-2016-5239
The gnuplot delegate functionality in ImageMagick prior to 6.9.4-0 and GraphicsMagick allows remote malicious users to execute arbitrary commands via unspecified vectors.
Imagemagick Imagemagick
828
VMScore
CVE-2010-1898
The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP1, 2.0 SP2, 3.5, 3.5 SP1, and 3.5.1, and Microsoft Silverlight 2 and 3 prior to 3.0.50611.0 on Windows and prior to 3.0.41130.0 on Mac OS X, does not properly handle interfaces and delegations to virtual methods,...
Microsoft .net Framework 2.0
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft Silverlight
Microsoft Silverlight 3.0.40723.0
Microsoft Silverlight 3.0.40624.00
Microsoft Silverlight 2.0.40115.00
Microsoft Silverlight 2.0.31005.00
Microsoft Silverlight 3.0.40818.0
454
VMScore
CVE-2006-3743
Multiple buffer overflows in ImageMagick prior to 6.2.9 allow user-assisted malicious users to execute arbitrary code via crafted XCF images.
Imagemagick Imagemagick 6.2.2
Imagemagick Imagemagick 6.2.2.5
Imagemagick Imagemagick 6.2.8
Imagemagick Imagemagick 6.2.1
Imagemagick Imagemagick 6.2.1.7
Imagemagick Imagemagick 6.2.5
Imagemagick Imagemagick 6.2.6
Imagemagick Imagemagick 6.2.7
Imagemagick Imagemagick 6.2.0.7
Imagemagick Imagemagick 6.2.0.8
Imagemagick Imagemagick 6.2.4
Imagemagick Imagemagick 6.2.4.5
Imagemagick Imagemagick 6.2
Imagemagick Imagemagick 6.2.0.4
Imagemagick Imagemagick 6.2.3
Imagemagick Imagemagick 6.2.3.6
454
VMScore
CVE-2006-0082
Format string vulnerability in the SetImageInfo function in image.c for ImageMagick 6.2.3 and other versions, and GraphicsMagick, allows user-assisted malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a numeric format string specifier su...
Imagemagick Imagemagick 6.2.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
CVE-2023-52162
CVE-2024-23670
CVE-2024-5404
man-in-the-middle
CVE-2024-5214
CVE-2024-4358
CVE-2024-20696
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »