Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 323 571

Количество 323 571

github логотип

GHSA-xw37-xfrp-pmwc

почти 2 года назад

Missing Authorization vulnerability in ThemeBoy SportsPress – Sports Club & League Manager.This issue affects SportsPress – Sports Club & League Manager: from n/a through 2.7.20.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-xw37-57qp-9mm4

почти 5 лет назад

Consensus flaw during block processing in github.com/ethereum/go-ethereum

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-xw36-67f8-339x

13 дней назад

SimpleJWT has an Unauthenticated Denial of Service via JWE header tampering

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xw36-22jx-j7vq

почти 4 года назад

An uncontrolled resource consumption vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series switches allows an attacker sending large amounts of legitimate traffic destined to the device to cause Interchassis Control Protocol (ICCP) interruptions, leading to an unstable control connection between the Multi-Chassis Link Aggregation Group (MC-LAG) nodes which can in turn lead to traffic loss. Continued receipt of this amount of traffic will create a sustained Denial of Service (DoS) condition. An indication that the system could be impacted by this issue is the following log message: "DDOS_PROTOCOL_VIOLATION_SET: Warning: Host-bound traffic for protocol/exception LOCALNH:aggregate exceeded its allowed bandwidth at fpc <fpc number> for <n> times, started at <timestamp>" This issue affects Juniper Networks Junos OS on QFX5000 Series and EX4600 Series: 15.1 versions prior to 15.1R7-S9; 17.3 versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S5...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xw35-x29w-q9gx

почти 4 года назад

Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the Adobe Texture Format (ATF) module. Successful exploitation could lead to arbitrary code execution.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-xw35-rrcp-g7xm

больше 1 года назад

Woodpecker's custom workspace allow to overwrite plugin entrypoint executable

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xw33-xmwc-73vf

почти 4 года назад

SQL injection vulnerability in index.php in eazyPortal 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the session_vars cookie.

EPSS: Низкий
github логотип

GHSA-xw33-rcw2-jhhm

8 месяцев назад

A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS up to 5.202506.a. This issue affects some unknown processing of the file publiccms-parent/publiccms/src/main/webapp/resource/plugins/pdfjs/viewer.html. The manipulation of the argument File leads to open redirect. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named f1af17af004ca9345c6fe4d5936d87d008d26e75. It is recommended to apply a patch to fix this issue.

CVSS3: 3.5
EPSS: Низкий
github логотип

GHSA-xw33-f5cf-9cw7

почти 4 года назад

Microsoft Host Integration Server (HIS) 2000, 2004, and 2006 does not limit RPC access to administrative functions, which allows remote attackers to bypass authentication and execute arbitrary programs via a crafted SNA RPC message using opcode 1 or 6 to call the CreateProcess function, aka "HIS Command Execution Vulnerability."

EPSS: Высокий
github логотип

GHSA-xw32-c3jc-v6qh

8 месяцев назад

A lack of signature verification in the bootloader of DENX Software Engineering Das U-Boot (U-Boot) v1.1.3 allows attackers to install crafted firmware files, leading to arbitrary code execution.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-xw32-6422-frqm

больше 1 года назад

Pagekit Cross-site Scripting vulnerability

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-xw32-2x94-232h

почти 4 года назад

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters on the device. The vulnerability is due to improper input validation of the email body. An attacker could exploit this vulnerability by inserting specific character strings in the message. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-xw2x-258j-w7p8

почти 4 года назад

Pivotal Greenplum Command Center versions 2.x prior to 2.5.1 contains a blind SQL injection vulnerability. An unauthenticated user can perform a SQL injection in the command center which results in disclosure of database contents.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xw2w-mmgv-hf8h

почти 4 года назад

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1448.

EPSS: Средний
github логотип

GHSA-xw2w-jc5r-g6r7

10 месяцев назад

Several OS command injection vulnerabilities exist in the device firmware in the /var/salia/mqtt.php script. By publishing a specially crafted message to a certain MQTT topic arbitrary OS commands can be executed with root permissions.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-xw2v-wvvx-29jq

почти 4 года назад

Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology and unauthorized read access to a subset of Oracle Outside In Technology accessible data. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network th...

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-xw2v-vp7m-x4qc

почти 4 года назад

core/nicklist.c in Irssi before 0.8.15 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an attempted fuzzy nick match at the instant that a victim leaves a channel.

EPSS: Низкий
github логотип

GHSA-xw2v-8hw2-2rc4

около 1 месяца назад

WordPress Plugin "Survey Maker" versions 5.1.7.7 and prior contain a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed in the user's web browser.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-xw2v-4pf9-qj5w

почти 4 года назад

A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file in an instance in USDC file format PATHS section.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-xw2r-q7pv-2r5q

почти 4 года назад

A local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCADA product v10.0 and prior. If exploited, this vulnerability could allow an adversary to modify the system, leading to the arbitrary execution of code. This vulnerability is only exploitable if an attacker has access to an authenticated session. GE Digital CIMPLICITY v11.0, released January 2020, contains mitigation for this local privilege escalation vulnerability. GE Digital recommends all users upgrade to GE CIMPLICITY v11.0 or newer.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-xw37-xfrp-pmwc

Missing Authorization vulnerability in ThemeBoy SportsPress – Sports Club & League Manager.This issue affects SportsPress – Sports Club & League Manager: from n/a through 2.7.20.

CVSS3: 4.3
0%
Низкий
почти 2 года назад
github логотип
GHSA-xw37-57qp-9mm4

Consensus flaw during block processing in github.com/ethereum/go-ethereum

CVSS3: 5.3
0%
Низкий
почти 5 лет назад
github логотип
GHSA-xw36-67f8-339x

SimpleJWT has an Unauthenticated Denial of Service via JWE header tampering

CVSS3: 7.5
0%
Низкий
13 дней назад
github логотип
GHSA-xw36-22jx-j7vq

An uncontrolled resource consumption vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series switches allows an attacker sending large amounts of legitimate traffic destined to the device to cause Interchassis Control Protocol (ICCP) interruptions, leading to an unstable control connection between the Multi-Chassis Link Aggregation Group (MC-LAG) nodes which can in turn lead to traffic loss. Continued receipt of this amount of traffic will create a sustained Denial of Service (DoS) condition. An indication that the system could be impacted by this issue is the following log message: "DDOS_PROTOCOL_VIOLATION_SET: Warning: Host-bound traffic for protocol/exception LOCALNH:aggregate exceeded its allowed bandwidth at fpc <fpc number> for <n> times, started at <timestamp>" This issue affects Juniper Networks Junos OS on QFX5000 Series and EX4600 Series: 15.1 versions prior to 15.1R7-S9; 17.3 versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S5...

CVSS3: 7.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-xw35-x29w-q9gx

Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the Adobe Texture Format (ATF) module. Successful exploitation could lead to arbitrary code execution.

CVSS3: 9.8
70%
Средний
почти 4 года назад
github логотип
GHSA-xw35-rrcp-g7xm

Woodpecker's custom workspace allow to overwrite plugin entrypoint executable

CVSS3: 8.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-xw33-xmwc-73vf

SQL injection vulnerability in index.php in eazyPortal 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the session_vars cookie.

1%
Низкий
почти 4 года назад
github логотип
GHSA-xw33-rcw2-jhhm

A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS up to 5.202506.a. This issue affects some unknown processing of the file publiccms-parent/publiccms/src/main/webapp/resource/plugins/pdfjs/viewer.html. The manipulation of the argument File leads to open redirect. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named f1af17af004ca9345c6fe4d5936d87d008d26e75. It is recommended to apply a patch to fix this issue.

CVSS3: 3.5
0%
Низкий
8 месяцев назад
github логотип
GHSA-xw33-f5cf-9cw7

Microsoft Host Integration Server (HIS) 2000, 2004, and 2006 does not limit RPC access to administrative functions, which allows remote attackers to bypass authentication and execute arbitrary programs via a crafted SNA RPC message using opcode 1 or 6 to call the CreateProcess function, aka "HIS Command Execution Vulnerability."

85%
Высокий
почти 4 года назад
github логотип
GHSA-xw32-c3jc-v6qh

A lack of signature verification in the bootloader of DENX Software Engineering Das U-Boot (U-Boot) v1.1.3 allows attackers to install crafted firmware files, leading to arbitrary code execution.

CVSS3: 6.5
0%
Низкий
8 месяцев назад
github логотип
GHSA-xw32-6422-frqm

Pagekit Cross-site Scripting vulnerability

CVSS3: 6.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-xw32-2x94-232h

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters on the device. The vulnerability is due to improper input validation of the email body. An attacker could exploit this vulnerability by inserting specific character strings in the message. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email.

CVSS3: 5.3
0%
Низкий
почти 4 года назад
github логотип
GHSA-xw2x-258j-w7p8

Pivotal Greenplum Command Center versions 2.x prior to 2.5.1 contains a blind SQL injection vulnerability. An unauthenticated user can perform a SQL injection in the command center which results in disclosure of database contents.

CVSS3: 7.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-xw2w-mmgv-hf8h

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1448.

46%
Средний
почти 4 года назад
github логотип
GHSA-xw2w-jc5r-g6r7

Several OS command injection vulnerabilities exist in the device firmware in the /var/salia/mqtt.php script. By publishing a specially crafted message to a certain MQTT topic arbitrary OS commands can be executed with root permissions.

CVSS3: 6.5
1%
Низкий
10 месяцев назад
github логотип
GHSA-xw2v-wvvx-29jq

Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology and unauthorized read access to a subset of Oracle Outside In Technology accessible data. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network th...

CVSS3: 7.1
1%
Низкий
почти 4 года назад
github логотип
GHSA-xw2v-vp7m-x4qc

core/nicklist.c in Irssi before 0.8.15 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an attempted fuzzy nick match at the instant that a victim leaves a channel.

3%
Низкий
почти 4 года назад
github логотип
GHSA-xw2v-8hw2-2rc4

WordPress Plugin "Survey Maker" versions 5.1.7.7 and prior contain a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed in the user's web browser.

CVSS3: 6.1
0%
Низкий
около 1 месяца назад
github логотип
GHSA-xw2v-4pf9-qj5w

A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file in an instance in USDC file format PATHS section.

CVSS3: 7.8
0%
Низкий
почти 4 года назад
github логотип
GHSA-xw2r-q7pv-2r5q

A local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCADA product v10.0 and prior. If exploited, this vulnerability could allow an adversary to modify the system, leading to the arbitrary execution of code. This vulnerability is only exploitable if an attacker has access to an authenticated session. GE Digital CIMPLICITY v11.0, released January 2020, contains mitigation for this local privilege escalation vulnerability. GE Digital recommends all users upgrade to GE CIMPLICITY v11.0 or newer.

0%
Низкий
почти 4 года назад

Уязвимостей на страницу