Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 314 375

Количество 314 375

github логотип

GHSA-xvr2-gxcm-5972

больше 3 лет назад

Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).

CVSS3: 8.2
EPSS: Низкий
github логотип

GHSA-xvqx-w57v-q544

больше 3 лет назад

Red Hat libvirt, possibly 0.7.2 through 0.8.2, recurses into disk-image backing stores without extracting the defined disk backing-store format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors.

EPSS: Низкий
github логотип

GHSA-xvqv-w3m7-g397

больше 2 лет назад

A vulnerability was found in OpenRapid RapidCMS up to 1.3.1. It has been declared as critical. This vulnerability affects unknown code of the file /admin/upload.php. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-235204.

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-xvqv-pfrw-729j

10 месяцев назад

A vulnerability was found in TRENDnet TEW-818DRU 1.0.14.6. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /usr/sbin/httpd of the component HTTP Request Handler. The manipulation leads to denial of service. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-xvqv-m23r-hxp7

почти 2 года назад

In the Linux kernel, the following vulnerability has been resolved: mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report Fix possible array out of bound access in mt7921_mcu_tx_rate_report. Remove unnecessary varibable in mt7921_mcu_tx_rate_report

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-xvqv-5787-jrf9

больше 3 лет назад

FS Amazon Clone 1.0 has SQL Injection via the PATH_INFO to /VerAyari.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-xvqr-ggrj-qrvh

больше 2 лет назад

Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 31637.

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-xvqr-69v8-f3gv

9 дней назад

Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a "--log-file" argument to this directive, causing pkg-config to write to an attacker-controlled location.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-xvqq-m3qc-q58j

больше 1 года назад

A vulnerability was found in Tenda AC6, AC7, AC8, AC9, AC10, AC10U, AC15, AC18, AC500 and AC1206 up to 20241022. It has been rated as problematic. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-xvqq-827j-2246

больше 3 лет назад

Due to a race condition while processing the power stats debug file to read status, a double free condition can occur in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05.

CVSS3: 7
EPSS: Низкий
github логотип

GHSA-xvqp-fh48-4772

больше 3 лет назад

The Sacramento Kings (aka com.tibco.gse.sports) application 6.0.8 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

EPSS: Низкий
github логотип

GHSA-xvqp-2r5x-vqjr

почти 3 года назад

Cross Site Request Forgery vulnerability found in Milken DoyoCMS v.2.3 allows a remote attacker to execute arbitrary code via the background system settings.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xvqm-w94f-83x2

больше 3 лет назад

An issue was discovered in CImg v.220. A heap-based buffer over-read in load_bmp in CImg.h occurs when loading a crafted bmp image, a different vulnerability than CVE-2018-7588. This is in a "16 bits colors" case, aka case 16.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-xvqm-2ccw-fmg4

больше 2 лет назад

DedeCMS up to and including 5.7.110 was discovered to contain a cross-site scripting (XSS) vulnerability at /dede/freelist_add.php via the title parameter.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-xvqh-5m2j-7624

около 3 лет назад

OPTILINK OP-XT71000N V2.2 is vulnerable to Remote Code Execution. The issue occurs when the attacker sends an arbitrary code on "/diag_ping_admin.asp" to "PingTest" interface that leads to COMMAND EXECUTION. An attacker can successfully trigger the COMMAND and can compromise full system.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-xvqg-qvqg-pxf2

больше 3 лет назад

IOHIDFamily in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 does not properly validate resource-queue metadata, which allows attackers to execute arbitrary code in a privileged context via a crafted app.

EPSS: Низкий
github логотип

GHSA-xvqg-mv25-rwvw

больше 3 лет назад

Parsing issue in matrix-org/node-irc leading to room takeovers

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xvqc-4q7g-qm76

больше 3 лет назад

Stack buffer overflow in WebRTC in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit stack corruption via a crafted WebRTC packet.

EPSS: Низкий
github логотип

GHSA-xvq9-c88q-jf5x

больше 2 лет назад

Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xvq9-4vpv-227m

около 2 лет назад

Nginx-UI vulnerable to arbitrary file write through the Import Certificate feature

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-xvr2-gxcm-5972

Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).

CVSS3: 8.2
1%
Низкий
больше 3 лет назад
github логотип
GHSA-xvqx-w57v-q544

Red Hat libvirt, possibly 0.7.2 through 0.8.2, recurses into disk-image backing stores without extracting the defined disk backing-store format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-xvqv-w3m7-g397

A vulnerability was found in OpenRapid RapidCMS up to 1.3.1. It has been declared as critical. This vulnerability affects unknown code of the file /admin/upload.php. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-235204.

CVSS3: 4.7
5%
Низкий
больше 2 лет назад
github логотип
GHSA-xvqv-pfrw-729j

A vulnerability was found in TRENDnet TEW-818DRU 1.0.14.6. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /usr/sbin/httpd of the component HTTP Request Handler. The manipulation leads to denial of service. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.5
1%
Низкий
10 месяцев назад
github логотип
GHSA-xvqv-m23r-hxp7

In the Linux kernel, the following vulnerability has been resolved: mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report Fix possible array out of bound access in mt7921_mcu_tx_rate_report. Remove unnecessary varibable in mt7921_mcu_tx_rate_report

CVSS3: 7.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-xvqv-5787-jrf9

FS Amazon Clone 1.0 has SQL Injection via the PATH_INFO to /VerAyari.

CVSS3: 9.8
2%
Низкий
больше 3 лет назад
github логотип
GHSA-xvqr-ggrj-qrvh

Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 31637.

CVSS3: 7.1
0%
Низкий
больше 2 лет назад
github логотип
GHSA-xvqr-69v8-f3gv

Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a "--log-file" argument to this directive, causing pkg-config to write to an attacker-controlled location.

CVSS3: 7.8
0%
Низкий
9 дней назад
github логотип
GHSA-xvqq-m3qc-q58j

A vulnerability was found in Tenda AC6, AC7, AC8, AC9, AC10, AC10U, AC15, AC18, AC500 and AC1206 up to 20241022. It has been rated as problematic. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-xvqq-827j-2246

Due to a race condition while processing the power stats debug file to read status, a double free condition can occur in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05.

CVSS3: 7
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xvqp-fh48-4772

The Sacramento Kings (aka com.tibco.gse.sports) application 6.0.8 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-xvqp-2r5x-vqjr

Cross Site Request Forgery vulnerability found in Milken DoyoCMS v.2.3 allows a remote attacker to execute arbitrary code via the background system settings.

CVSS3: 8.8
1%
Низкий
почти 3 года назад
github логотип
GHSA-xvqm-w94f-83x2

An issue was discovered in CImg v.220. A heap-based buffer over-read in load_bmp in CImg.h occurs when loading a crafted bmp image, a different vulnerability than CVE-2018-7588. This is in a "16 bits colors" case, aka case 16.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xvqm-2ccw-fmg4

DedeCMS up to and including 5.7.110 was discovered to contain a cross-site scripting (XSS) vulnerability at /dede/freelist_add.php via the title parameter.

CVSS3: 5.4
0%
Низкий
больше 2 лет назад
github логотип
GHSA-xvqh-5m2j-7624

OPTILINK OP-XT71000N V2.2 is vulnerable to Remote Code Execution. The issue occurs when the attacker sends an arbitrary code on "/diag_ping_admin.asp" to "PingTest" interface that leads to COMMAND EXECUTION. An attacker can successfully trigger the COMMAND and can compromise full system.

CVSS3: 9.8
8%
Низкий
около 3 лет назад
github логотип
GHSA-xvqg-qvqg-pxf2

IOHIDFamily in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 does not properly validate resource-queue metadata, which allows attackers to execute arbitrary code in a privileged context via a crafted app.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-xvqg-mv25-rwvw

Parsing issue in matrix-org/node-irc leading to room takeovers

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xvqc-4q7g-qm76

Stack buffer overflow in WebRTC in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit stack corruption via a crafted WebRTC packet.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-xvq9-c88q-jf5x

Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
github логотип
GHSA-xvq9-4vpv-227m

Nginx-UI vulnerable to arbitrary file write through the Import Certificate feature

CVSS3: 9.8
3%
Низкий
около 2 лет назад

Уязвимостей на страницу