Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 290 572

Количество 290 572

github логотип

GHSA-xw38-r5v4-92p9

больше 3 лет назад

Unspecified vulnerability in Adaptive Micro Systems ALPHA Ethernet Adapter II Web-Manager 3.40.2 allows remote attackers to bypass authentication and read or write configuration files via unknown vectors.

EPSS: Низкий
github логотип

GHSA-xw37-xfrp-pmwc

около 1 года назад

Missing Authorization vulnerability in ThemeBoy SportsPress – Sports Club & League Manager.This issue affects SportsPress – Sports Club & League Manager: from n/a through 2.7.20.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-xw37-57qp-9mm4

около 4 лет назад

Consensus flaw during block processing in github.com/ethereum/go-ethereum

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-xw36-22jx-j7vq

больше 3 лет назад

An uncontrolled resource consumption vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series switches allows an attacker sending large amounts of legitimate traffic destined to the device to cause Interchassis Control Protocol (ICCP) interruptions, leading to an unstable control connection between the Multi-Chassis Link Aggregation Group (MC-LAG) nodes which can in turn lead to traffic loss. Continued receipt of this amount of traffic will create a sustained Denial of Service (DoS) condition. An indication that the system could be impacted by this issue is the following log message: "DDOS_PROTOCOL_VIOLATION_SET: Warning: Host-bound traffic for protocol/exception LOCALNH:aggregate exceeded its allowed bandwidth at fpc <fpc number> for <n> times, started at <timestamp>" This issue affects Juniper Networks Junos OS on QFX5000 Series and EX4600 Series: 15.1 versions prior to 15.1R7-S9; 17.3 versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S5...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xw35-x29w-q9gx

больше 3 лет назад

Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the Adobe Texture Format (ATF) module. Successful exploitation could lead to arbitrary code execution.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-xw35-rrcp-g7xm

около 1 года назад

Woodpecker's custom workspace allow to overwrite plugin entrypoint executable

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xw33-xmwc-73vf

больше 3 лет назад

SQL injection vulnerability in index.php in eazyPortal 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the session_vars cookie.

EPSS: Низкий
github логотип

GHSA-xw33-rcw2-jhhm

около 1 месяца назад

A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS up to 5.202506.a. This issue affects some unknown processing of the file publiccms-parent/publiccms/src/main/webapp/resource/plugins/pdfjs/viewer.html. The manipulation of the argument File leads to open redirect. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named f1af17af004ca9345c6fe4d5936d87d008d26e75. It is recommended to apply a patch to fix this issue.

CVSS3: 3.5
EPSS: Низкий
github логотип

GHSA-xw33-f5cf-9cw7

больше 3 лет назад

Microsoft Host Integration Server (HIS) 2000, 2004, and 2006 does not limit RPC access to administrative functions, which allows remote attackers to bypass authentication and execute arbitrary programs via a crafted SNA RPC message using opcode 1 or 6 to call the CreateProcess function, aka "HIS Command Execution Vulnerability."

EPSS: Высокий
github логотип

GHSA-xw32-c3jc-v6qh

21 день назад

A lack of signature verification in the bootloader of DENX Software Engineering Das U-Boot (U-Boot) v1.1.3 allows attackers to install crafted firmware files, leading to arbitrary code execution.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-xw32-6422-frqm

11 месяцев назад

Pagekit Cross-site Scripting vulnerability

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-xw32-2x94-232h

больше 3 лет назад

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters on the device. The vulnerability is due to improper input validation of the email body. An attacker could exploit this vulnerability by inserting specific character strings in the message. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-xw2x-258j-w7p8

больше 3 лет назад

Pivotal Greenplum Command Center versions 2.x prior to 2.5.1 contains a blind SQL injection vulnerability. An unauthenticated user can perform a SQL injection in the command center which results in disclosure of database contents.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xw2w-mmgv-hf8h

больше 3 лет назад

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1448.

EPSS: Средний
github логотип

GHSA-xw2w-jc5r-g6r7

3 месяца назад

Several OS command injection vulnerabilities exist in the device firmware in the /var/salia/mqtt.php script. By publishing a specially crafted message to a certain MQTT topic arbitrary OS commands can be executed with root permissions.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-xw2v-wvvx-29jq

больше 3 лет назад

Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology and unauthorized read access to a subset of Oracle Outside In Technology accessible data. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network th...

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-xw2v-vp7m-x4qc

больше 3 лет назад

core/nicklist.c in Irssi before 0.8.15 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an attempted fuzzy nick match at the instant that a victim leaves a channel.

EPSS: Низкий
github логотип

GHSA-xw2v-4pf9-qj5w

больше 3 лет назад

A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file in an instance in USDC file format PATHS section.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-xw2r-q7pv-2r5q

больше 3 лет назад

A local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCADA product v10.0 and prior. If exploited, this vulnerability could allow an adversary to modify the system, leading to the arbitrary execution of code. This vulnerability is only exploitable if an attacker has access to an authenticated session. GE Digital CIMPLICITY v11.0, released January 2020, contains mitigation for this local privilege escalation vulnerability. GE Digital recommends all users upgrade to GE CIMPLICITY v11.0 or newer.

EPSS: Низкий
github логотип

GHSA-xw2r-f8xv-c8xp

около 2 лет назад

PrestaShop XSS injection through Validate::isCleanHTML method

CVSS3: 8.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-xw38-r5v4-92p9

Unspecified vulnerability in Adaptive Micro Systems ALPHA Ethernet Adapter II Web-Manager 3.40.2 allows remote attackers to bypass authentication and read or write configuration files via unknown vectors.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw37-xfrp-pmwc

Missing Authorization vulnerability in ThemeBoy SportsPress – Sports Club & League Manager.This issue affects SportsPress – Sports Club & League Manager: from n/a through 2.7.20.

CVSS3: 4.3
0%
Низкий
около 1 года назад
github логотип
GHSA-xw37-57qp-9mm4

Consensus flaw during block processing in github.com/ethereum/go-ethereum

CVSS3: 5.3
0%
Низкий
около 4 лет назад
github логотип
GHSA-xw36-22jx-j7vq

An uncontrolled resource consumption vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series switches allows an attacker sending large amounts of legitimate traffic destined to the device to cause Interchassis Control Protocol (ICCP) interruptions, leading to an unstable control connection between the Multi-Chassis Link Aggregation Group (MC-LAG) nodes which can in turn lead to traffic loss. Continued receipt of this amount of traffic will create a sustained Denial of Service (DoS) condition. An indication that the system could be impacted by this issue is the following log message: "DDOS_PROTOCOL_VIOLATION_SET: Warning: Host-bound traffic for protocol/exception LOCALNH:aggregate exceeded its allowed bandwidth at fpc <fpc number> for <n> times, started at <timestamp>" This issue affects Juniper Networks Junos OS on QFX5000 Series and EX4600 Series: 15.1 versions prior to 15.1R7-S9; 17.3 versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S5...

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw35-x29w-q9gx

Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the Adobe Texture Format (ATF) module. Successful exploitation could lead to arbitrary code execution.

CVSS3: 9.8
70%
Средний
больше 3 лет назад
github логотип
GHSA-xw35-rrcp-g7xm

Woodpecker's custom workspace allow to overwrite plugin entrypoint executable

CVSS3: 8.8
1%
Низкий
около 1 года назад
github логотип
GHSA-xw33-xmwc-73vf

SQL injection vulnerability in index.php in eazyPortal 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the session_vars cookie.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw33-rcw2-jhhm

A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS up to 5.202506.a. This issue affects some unknown processing of the file publiccms-parent/publiccms/src/main/webapp/resource/plugins/pdfjs/viewer.html. The manipulation of the argument File leads to open redirect. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named f1af17af004ca9345c6fe4d5936d87d008d26e75. It is recommended to apply a patch to fix this issue.

CVSS3: 3.5
0%
Низкий
около 1 месяца назад
github логотип
GHSA-xw33-f5cf-9cw7

Microsoft Host Integration Server (HIS) 2000, 2004, and 2006 does not limit RPC access to administrative functions, which allows remote attackers to bypass authentication and execute arbitrary programs via a crafted SNA RPC message using opcode 1 or 6 to call the CreateProcess function, aka "HIS Command Execution Vulnerability."

85%
Высокий
больше 3 лет назад
github логотип
GHSA-xw32-c3jc-v6qh

A lack of signature verification in the bootloader of DENX Software Engineering Das U-Boot (U-Boot) v1.1.3 allows attackers to install crafted firmware files, leading to arbitrary code execution.

CVSS3: 6.5
0%
Низкий
21 день назад
github логотип
GHSA-xw32-6422-frqm

Pagekit Cross-site Scripting vulnerability

CVSS3: 6.1
0%
Низкий
11 месяцев назад
github логотип
GHSA-xw32-2x94-232h

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters on the device. The vulnerability is due to improper input validation of the email body. An attacker could exploit this vulnerability by inserting specific character strings in the message. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw2x-258j-w7p8

Pivotal Greenplum Command Center versions 2.x prior to 2.5.1 contains a blind SQL injection vulnerability. An unauthenticated user can perform a SQL injection in the command center which results in disclosure of database contents.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw2w-mmgv-hf8h

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1448.

43%
Средний
больше 3 лет назад
github логотип
GHSA-xw2w-jc5r-g6r7

Several OS command injection vulnerabilities exist in the device firmware in the /var/salia/mqtt.php script. By publishing a specially crafted message to a certain MQTT topic arbitrary OS commands can be executed with root permissions.

CVSS3: 6.5
0%
Низкий
3 месяца назад
github логотип
GHSA-xw2v-wvvx-29jq

Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology and unauthorized read access to a subset of Oracle Outside In Technology accessible data. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network th...

CVSS3: 7.1
1%
Низкий
больше 3 лет назад
github логотип
GHSA-xw2v-vp7m-x4qc

core/nicklist.c in Irssi before 0.8.15 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an attempted fuzzy nick match at the instant that a victim leaves a channel.

3%
Низкий
больше 3 лет назад
github логотип
GHSA-xw2v-4pf9-qj5w

A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file in an instance in USDC file format PATHS section.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw2r-q7pv-2r5q

A local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCADA product v10.0 and prior. If exploited, this vulnerability could allow an adversary to modify the system, leading to the arbitrary execution of code. This vulnerability is only exploitable if an attacker has access to an authenticated session. GE Digital CIMPLICITY v11.0, released January 2020, contains mitigation for this local privilege escalation vulnerability. GE Digital recommends all users upgrade to GE CIMPLICITY v11.0 or newer.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw2r-f8xv-c8xp

PrestaShop XSS injection through Validate::isCleanHTML method

CVSS3: 8.3
1%
Низкий
около 2 лет назад

Уязвимостей на страницу