Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 314 375

Количество 314 375

github логотип

GHSA-xw39-q6xj-4gq5

больше 3 лет назад

participants-database.php in the Participants Database plugin 1.9.5.5 and previous versions for WordPress has a time-based SQL injection vulnerability via the ascdesc, list_filter_count, or sortBy parameters. It is possible to exfiltrate data and potentially execute code (if certain conditions are met).

EPSS: Низкий
github логотип

GHSA-xw39-p8g9-hq9j

больше 3 лет назад

An exploitable information disclosure vulnerability exists in the Server Agent functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted TCP packet can cause information disclosure. An attacker can send a crafted TCP packet to trigger this vulnerability.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xw39-hrhx-6f53

больше 2 лет назад

In on_remove_iso_data_path of btm_iso_impl.h, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-236688764

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-xw39-hmhj-f95j

почти 4 года назад

Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows context-dependent attackers to cause a denial of service (device restart and BGP routing table rebuild) via certain regular expressions in a "show ip bgp regexp" command. NOTE: unauthenticated remote attacks are possible in environments with anonymous telnet and Looking Glass access.

EPSS: Средний
github логотип

GHSA-xw39-fhvp-3jj6

почти 4 года назад

The BigFix Client installer is created with InstallShield, which was affected by CVE-2021-41526, a vulnerability that could allow a local user to perform a privilege escalation. This vulnerability was resolved by updating to an InstallShield version with the underlying vulnerability fixed.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-xw39-57rx-4hr5

около 2 лет назад

It is possible to download the configuration backup without authorization and decrypt included passwords using hardcoded static key.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xw38-r5v4-92p9

больше 3 лет назад

Unspecified vulnerability in Adaptive Micro Systems ALPHA Ethernet Adapter II Web-Manager 3.40.2 allows remote attackers to bypass authentication and read or write configuration files via unknown vectors.

EPSS: Низкий
github логотип

GHSA-xw37-xfrp-pmwc

больше 1 года назад

Missing Authorization vulnerability in ThemeBoy SportsPress – Sports Club & League Manager.This issue affects SportsPress – Sports Club & League Manager: from n/a through 2.7.20.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-xw37-57qp-9mm4

больше 4 лет назад

Consensus flaw during block processing in github.com/ethereum/go-ethereum

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-xw36-22jx-j7vq

больше 3 лет назад

An uncontrolled resource consumption vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series switches allows an attacker sending large amounts of legitimate traffic destined to the device to cause Interchassis Control Protocol (ICCP) interruptions, leading to an unstable control connection between the Multi-Chassis Link Aggregation Group (MC-LAG) nodes which can in turn lead to traffic loss. Continued receipt of this amount of traffic will create a sustained Denial of Service (DoS) condition. An indication that the system could be impacted by this issue is the following log message: "DDOS_PROTOCOL_VIOLATION_SET: Warning: Host-bound traffic for protocol/exception LOCALNH:aggregate exceeded its allowed bandwidth at fpc <fpc number> for <n> times, started at <timestamp>" This issue affects Juniper Networks Junos OS on QFX5000 Series and EX4600 Series: 15.1 versions prior to 15.1R7-S9; 17.3 versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S5...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xw35-x29w-q9gx

больше 3 лет назад

Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the Adobe Texture Format (ATF) module. Successful exploitation could lead to arbitrary code execution.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-xw35-rrcp-g7xm

больше 1 года назад

Woodpecker's custom workspace allow to overwrite plugin entrypoint executable

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xw33-xmwc-73vf

почти 4 года назад

SQL injection vulnerability in index.php in eazyPortal 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the session_vars cookie.

EPSS: Низкий
github логотип

GHSA-xw33-rcw2-jhhm

7 месяцев назад

A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS up to 5.202506.a. This issue affects some unknown processing of the file publiccms-parent/publiccms/src/main/webapp/resource/plugins/pdfjs/viewer.html. The manipulation of the argument File leads to open redirect. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named f1af17af004ca9345c6fe4d5936d87d008d26e75. It is recommended to apply a patch to fix this issue.

CVSS3: 3.5
EPSS: Низкий
github логотип

GHSA-xw33-f5cf-9cw7

почти 4 года назад

Microsoft Host Integration Server (HIS) 2000, 2004, and 2006 does not limit RPC access to administrative functions, which allows remote attackers to bypass authentication and execute arbitrary programs via a crafted SNA RPC message using opcode 1 or 6 to call the CreateProcess function, aka "HIS Command Execution Vulnerability."

EPSS: Высокий
github логотип

GHSA-xw32-c3jc-v6qh

6 месяцев назад

A lack of signature verification in the bootloader of DENX Software Engineering Das U-Boot (U-Boot) v1.1.3 allows attackers to install crafted firmware files, leading to arbitrary code execution.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-xw32-6422-frqm

больше 1 года назад

Pagekit Cross-site Scripting vulnerability

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-xw32-2x94-232h

больше 3 лет назад

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters on the device. The vulnerability is due to improper input validation of the email body. An attacker could exploit this vulnerability by inserting specific character strings in the message. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-xw2x-258j-w7p8

больше 3 лет назад

Pivotal Greenplum Command Center versions 2.x prior to 2.5.1 contains a blind SQL injection vulnerability. An unauthenticated user can perform a SQL injection in the command center which results in disclosure of database contents.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xw2w-mmgv-hf8h

больше 3 лет назад

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1448.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-xw39-q6xj-4gq5

participants-database.php in the Participants Database plugin 1.9.5.5 and previous versions for WordPress has a time-based SQL injection vulnerability via the ascdesc, list_filter_count, or sortBy parameters. It is possible to exfiltrate data and potentially execute code (if certain conditions are met).

1%
Низкий
больше 3 лет назад
github логотип
GHSA-xw39-p8g9-hq9j

An exploitable information disclosure vulnerability exists in the Server Agent functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted TCP packet can cause information disclosure. An attacker can send a crafted TCP packet to trigger this vulnerability.

CVSS3: 7.5
3%
Низкий
больше 3 лет назад
github логотип
GHSA-xw39-hrhx-6f53

In on_remove_iso_data_path of btm_iso_impl.h, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-236688764

CVSS3: 5.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-xw39-hmhj-f95j

Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows context-dependent attackers to cause a denial of service (device restart and BGP routing table rebuild) via certain regular expressions in a "show ip bgp regexp" command. NOTE: unauthenticated remote attacks are possible in environments with anonymous telnet and Looking Glass access.

26%
Средний
почти 4 года назад
github логотип
GHSA-xw39-fhvp-3jj6

The BigFix Client installer is created with InstallShield, which was affected by CVE-2021-41526, a vulnerability that could allow a local user to perform a privilege escalation. This vulnerability was resolved by updating to an InstallShield version with the underlying vulnerability fixed.

CVSS3: 7.8
0%
Низкий
почти 4 года назад
github логотип
GHSA-xw39-57rx-4hr5

It is possible to download the configuration backup without authorization and decrypt included passwords using hardcoded static key.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
github логотип
GHSA-xw38-r5v4-92p9

Unspecified vulnerability in Adaptive Micro Systems ALPHA Ethernet Adapter II Web-Manager 3.40.2 allows remote attackers to bypass authentication and read or write configuration files via unknown vectors.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw37-xfrp-pmwc

Missing Authorization vulnerability in ThemeBoy SportsPress – Sports Club & League Manager.This issue affects SportsPress – Sports Club & League Manager: from n/a through 2.7.20.

CVSS3: 4.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-xw37-57qp-9mm4

Consensus flaw during block processing in github.com/ethereum/go-ethereum

CVSS3: 5.3
0%
Низкий
больше 4 лет назад
github логотип
GHSA-xw36-22jx-j7vq

An uncontrolled resource consumption vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series switches allows an attacker sending large amounts of legitimate traffic destined to the device to cause Interchassis Control Protocol (ICCP) interruptions, leading to an unstable control connection between the Multi-Chassis Link Aggregation Group (MC-LAG) nodes which can in turn lead to traffic loss. Continued receipt of this amount of traffic will create a sustained Denial of Service (DoS) condition. An indication that the system could be impacted by this issue is the following log message: "DDOS_PROTOCOL_VIOLATION_SET: Warning: Host-bound traffic for protocol/exception LOCALNH:aggregate exceeded its allowed bandwidth at fpc <fpc number> for <n> times, started at <timestamp>" This issue affects Juniper Networks Junos OS on QFX5000 Series and EX4600 Series: 15.1 versions prior to 15.1R7-S9; 17.3 versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S5...

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw35-x29w-q9gx

Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the Adobe Texture Format (ATF) module. Successful exploitation could lead to arbitrary code execution.

CVSS3: 9.8
70%
Средний
больше 3 лет назад
github логотип
GHSA-xw35-rrcp-g7xm

Woodpecker's custom workspace allow to overwrite plugin entrypoint executable

CVSS3: 8.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-xw33-xmwc-73vf

SQL injection vulnerability in index.php in eazyPortal 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the session_vars cookie.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xw33-rcw2-jhhm

A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS up to 5.202506.a. This issue affects some unknown processing of the file publiccms-parent/publiccms/src/main/webapp/resource/plugins/pdfjs/viewer.html. The manipulation of the argument File leads to open redirect. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named f1af17af004ca9345c6fe4d5936d87d008d26e75. It is recommended to apply a patch to fix this issue.

CVSS3: 3.5
0%
Низкий
7 месяцев назад
github логотип
GHSA-xw33-f5cf-9cw7

Microsoft Host Integration Server (HIS) 2000, 2004, and 2006 does not limit RPC access to administrative functions, which allows remote attackers to bypass authentication and execute arbitrary programs via a crafted SNA RPC message using opcode 1 or 6 to call the CreateProcess function, aka "HIS Command Execution Vulnerability."

85%
Высокий
почти 4 года назад
github логотип
GHSA-xw32-c3jc-v6qh

A lack of signature verification in the bootloader of DENX Software Engineering Das U-Boot (U-Boot) v1.1.3 allows attackers to install crafted firmware files, leading to arbitrary code execution.

CVSS3: 6.5
0%
Низкий
6 месяцев назад
github логотип
GHSA-xw32-6422-frqm

Pagekit Cross-site Scripting vulnerability

CVSS3: 6.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-xw32-2x94-232h

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters on the device. The vulnerability is due to improper input validation of the email body. An attacker could exploit this vulnerability by inserting specific character strings in the message. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw2x-258j-w7p8

Pivotal Greenplum Command Center versions 2.x prior to 2.5.1 contains a blind SQL injection vulnerability. An unauthenticated user can perform a SQL injection in the command center which results in disclosure of database contents.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xw2w-mmgv-hf8h

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1448.

46%
Средний
больше 3 лет назад

Уязвимостей на страницу