Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 314 458

Количество 314 458

github логотип

GHSA-xw9p-c763-93fq

больше 3 лет назад

Ansible Tower before version 3.3.3 does not set a secure channel as it is using the default insecure configuration channel settings for messaging celery workers from RabbitMQ. This could lead in data leak of sensitive information such as passwords as well as denial of service attacks by deleting projects or inventory files.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-xw9p-2mr3-g9mx

почти 4 года назад

Mozilla Firefox 3.0.13 and earlier, 3.5, 3.6 a1 pre, and 3.7 a1 pre; SeaMonkey 1.1.17; and Mozilla 1.7.x and earlier do not properly handle javascript: URIs in HTML links within 302 error documents sent from web servers, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Location HTTP response header or (2) specifying the content of a Location HTTP response header.

EPSS: Низкий
github логотип

GHSA-xw9j-q9c9-cxm8

почти 4 года назад

SQL injection vulnerability in general_functions.php in TankLogger 2.4 allows remote attackers to execute arbitrary SQL commands via the (1) livestock_id parameter to showInfo.php and (2) tank_id parameter, possibly to livestock.php.

EPSS: Низкий
github логотип

GHSA-xw9j-h8x5-jqmq

больше 3 лет назад

A vulnerability in a CLI command related to the virtualization manager (VMAN) in Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with root privileges. The vulnerability is due to insufficient validation of arguments passed to a specific VMAN CLI command on an affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with root privileges, which may lead to complete system compromise. An attacker would need valid administrator credentials to exploit this vulnerability.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-xw9h-x6h4-fc8r

9 месяцев назад

The Badgearoo WordPress plugin through 1.0.14 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-xw9h-mxp6-gf7c

больше 1 года назад

A vulnerability was found in itsourcecode Vehicle Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file mybill.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-xw9h-8vfr-ppf5

больше 3 лет назад

Roundcube before 1.4.11 allows XSS via crafted Cascading Style Sheets (CSS) token sequences during HTML email rendering.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-xw9g-79q2-3vjw

больше 3 лет назад

Jool 3.5.0-3.5.1 is vulnerable to a kernel crashing packet resulting in a DOS.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xw9f-xv55-jhcr

почти 4 года назад

Directory traversal vulnerability in index.php in OpenCart 1.1.8 allows remote attackers to read arbitrary files via a .. (dot dot) in the route parameter.

EPSS: Низкий
github логотип

GHSA-xw9f-vg47-m9mf

8 дней назад

In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: fix NULL dereference on devlink_alloc() failure devlink_alloc() may return NULL on allocation failure, but prestera_devlink_alloc() unconditionally calls devlink_priv() on the returned pointer. This leads to a NULL pointer dereference if devlink allocation fails. Add a check for a NULL devlink pointer and return NULL early to avoid the crash.

EPSS: Низкий
github логотип

GHSA-xw9f-r7rv-2cfw

больше 3 лет назад

IBM WebSphere Service Registry and Repository (WSRR) 7.0.0 before FP1 does not properly implement access control, which allows remote attackers to perform governance actions via unspecified API requests to an EJB interface.

EPSS: Низкий
github логотип

GHSA-xw9f-jjf6-qcrc

больше 3 лет назад

Mitel MiCloud Management Portal before 6.1 SP5 could allow a remote attacker to conduct a SQL Injection attack and access user credentials due to improper input validation.

EPSS: Низкий
github логотип

GHSA-xw9f-hwxg-fq6r

больше 2 лет назад

Cross-Site Request Forgery (CSRF) vulnerability in The WordPress.Org community Health Check & Troubleshooting plugin <= 1.5.1 versions.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-xw9f-44rx-4f36

11 дней назад

The Easy Replace Image plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.5.2. This is due to missing capability checks on the `image_replacement_from_url` function that is hooked to the `eri_from_url` AJAX action. This makes it possible for authenticated attackers, with Contributor-level access and above, to replace arbitrary image attachments on the site with images from external URLs, potentially enabling site defacement, phishing attacks, or content manipulation.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-xw9c-r5pv-7f67

почти 4 года назад

Internet Explorer 5.5 and 6.0 allows remote attackers to bypass the cross-domain security model and access information on the local system or in other domains, and possibly execute code, via cached methods and objects, aka "Cross Domain Verification via Cached Methods."

EPSS: Высокий
github логотип

GHSA-xw9c-qm7m-c9wc

больше 3 лет назад

libvirt 1.1.0 and 1.1.1 allows local users to cause a denial of service (memory consumption) via a large number of domain migrate parameters in certain RPC calls in (1) daemon/remote.c and (2) remote/remote_driver.c.

EPSS: Низкий
github логотип

GHSA-xw9c-j6h9-9vjc

почти 4 года назад

Foundation in Apple Mac OS X 10.4.11 might allow context-dependent attackers to execute arbitrary code via a malformed selector name to the NSSelectorFromString API, which causes an "unexpected selector" to be used.

EPSS: Низкий
github логотип

GHSA-xw9c-79j7-p3p6

больше 3 лет назад

In FusionPBX up to v4.5.7, the file app\conferences_active\conference_interactive.php uses an unsanitized "c" variable coming from the URL, which is reflected in HTML, leading to XSS.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-xw9c-4vrc-64gr

11 дней назад

Rejected reason: Not used

EPSS: Низкий
github логотип

GHSA-xw99-vmpf-qpg4

больше 3 лет назад

A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1024, CVE-2020-1102.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-xw9p-c763-93fq

Ansible Tower before version 3.3.3 does not set a secure channel as it is using the default insecure configuration channel settings for messaging celery workers from RabbitMQ. This could lead in data leak of sensitive information such as passwords as well as denial of service attacks by deleting projects or inventory files.

CVSS3: 9.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw9p-2mr3-g9mx

Mozilla Firefox 3.0.13 and earlier, 3.5, 3.6 a1 pre, and 3.7 a1 pre; SeaMonkey 1.1.17; and Mozilla 1.7.x and earlier do not properly handle javascript: URIs in HTML links within 302 error documents sent from web servers, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Location HTTP response header or (2) specifying the content of a Location HTTP response header.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xw9j-q9c9-cxm8

SQL injection vulnerability in general_functions.php in TankLogger 2.4 allows remote attackers to execute arbitrary SQL commands via the (1) livestock_id parameter to showInfo.php and (2) tank_id parameter, possibly to livestock.php.

3%
Низкий
почти 4 года назад
github логотип
GHSA-xw9j-h8x5-jqmq

A vulnerability in a CLI command related to the virtualization manager (VMAN) in Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with root privileges. The vulnerability is due to insufficient validation of arguments passed to a specific VMAN CLI command on an affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with root privileges, which may lead to complete system compromise. An attacker would need valid administrator credentials to exploit this vulnerability.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw9h-x6h4-fc8r

The Badgearoo WordPress plugin through 1.0.14 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

CVSS3: 6.1
0%
Низкий
9 месяцев назад
github логотип
GHSA-xw9h-mxp6-gf7c

A vulnerability was found in itsourcecode Vehicle Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file mybill.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-xw9h-8vfr-ppf5

Roundcube before 1.4.11 allows XSS via crafted Cascading Style Sheets (CSS) token sequences during HTML email rendering.

CVSS3: 5.4
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw9g-79q2-3vjw

Jool 3.5.0-3.5.1 is vulnerable to a kernel crashing packet resulting in a DOS.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw9f-xv55-jhcr

Directory traversal vulnerability in index.php in OpenCart 1.1.8 allows remote attackers to read arbitrary files via a .. (dot dot) in the route parameter.

2%
Низкий
почти 4 года назад
github логотип
GHSA-xw9f-vg47-m9mf

In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: fix NULL dereference on devlink_alloc() failure devlink_alloc() may return NULL on allocation failure, but prestera_devlink_alloc() unconditionally calls devlink_priv() on the returned pointer. This leads to a NULL pointer dereference if devlink allocation fails. Add a check for a NULL devlink pointer and return NULL early to avoid the crash.

0%
Низкий
8 дней назад
github логотип
GHSA-xw9f-r7rv-2cfw

IBM WebSphere Service Registry and Repository (WSRR) 7.0.0 before FP1 does not properly implement access control, which allows remote attackers to perform governance actions via unspecified API requests to an EJB interface.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw9f-jjf6-qcrc

Mitel MiCloud Management Portal before 6.1 SP5 could allow a remote attacker to conduct a SQL Injection attack and access user credentials due to improper input validation.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw9f-hwxg-fq6r

Cross-Site Request Forgery (CSRF) vulnerability in The WordPress.Org community Health Check & Troubleshooting plugin <= 1.5.1 versions.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-xw9f-44rx-4f36

The Easy Replace Image plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.5.2. This is due to missing capability checks on the `image_replacement_from_url` function that is hooked to the `eri_from_url` AJAX action. This makes it possible for authenticated attackers, with Contributor-level access and above, to replace arbitrary image attachments on the site with images from external URLs, potentially enabling site defacement, phishing attacks, or content manipulation.

CVSS3: 5.3
0%
Низкий
11 дней назад
github логотип
GHSA-xw9c-r5pv-7f67

Internet Explorer 5.5 and 6.0 allows remote attackers to bypass the cross-domain security model and access information on the local system or in other domains, and possibly execute code, via cached methods and objects, aka "Cross Domain Verification via Cached Methods."

74%
Высокий
почти 4 года назад
github логотип
GHSA-xw9c-qm7m-c9wc

libvirt 1.1.0 and 1.1.1 allows local users to cause a denial of service (memory consumption) via a large number of domain migrate parameters in certain RPC calls in (1) daemon/remote.c and (2) remote/remote_driver.c.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw9c-j6h9-9vjc

Foundation in Apple Mac OS X 10.4.11 might allow context-dependent attackers to execute arbitrary code via a malformed selector name to the NSSelectorFromString API, which causes an "unexpected selector" to be used.

1%
Низкий
почти 4 года назад
github логотип
GHSA-xw9c-79j7-p3p6

In FusionPBX up to v4.5.7, the file app\conferences_active\conference_interactive.php uses an unsanitized "c" variable coming from the URL, which is reflected in HTML, leading to XSS.

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw9c-4vrc-64gr

Rejected reason: Not used

11 дней назад
github логотип
GHSA-xw99-vmpf-qpg4

A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1024, CVE-2020-1102.

29%
Средний
больше 3 лет назад

Уязвимостей на страницу