Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 324 360

Количество 324 360

github логотип

GHSA-xv6m-g863-2r99

около 3 лет назад

The Auto Featured Image (Auto Post Thumbnail) WordPress plugin before 3.9.16 includes an AJAX endpoint that allows any user with at least Author privileges to upload arbitrary files, such as PHP files. This is caused by incorrect file extension validation.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xv6j-rwrm-mgqv

больше 1 года назад

A vulnerability classified as critical was found in skyselang yylAdmin up to 3.0. Affected by this vulnerability is the function list of the file /app/admin/controller/file/File.php of the component Backend. The manipulation of the argument is_disable leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-xv6h-r36f-3gp5

16 дней назад

Keycloak: Denial of Service due to excessive SAMLRequest decompression

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-xv6h-23v7-jx2w

почти 4 года назад

Google Glass before XE6 does not properly restrict the processing of QR codes, which allows physically proximate attackers to modify the configuration or redirect users to arbitrary web sites via a crafted symbol, as demonstrated by selecting a Wi-Fi access point in order to conduct a man-in-the-middle attack.

EPSS: Низкий
github логотип

GHSA-xv6g-m8c4-67fr

почти 4 года назад

Google Chrome before 17.0.963.65 does not properly perform casts of unspecified variables during the splitting of anonymous blocks, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.

EPSS: Низкий
github логотип

GHSA-xv6g-jhvf-9jh9

почти 4 года назад

CRLF injection vulnerability in the web framework in Cisco Security Manager 4.2 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct redirection attacks via a crafted URL, aka Bug ID CSCun82349.

EPSS: Низкий
github логотип

GHSA-xv6g-g79p-x344

почти 4 года назад

An issue was discovered in PbootCMS. There is a SQL injection via the api.php/Cms/search order parameter.

EPSS: Низкий
github логотип

GHSA-xv6g-cccv-mjvg

почти 2 года назад

This High severity Injection vulnerability was introduced in versions 7.3.0 of Confluence Data Center. This Injection vulnerability, with a CVSS Score of 8.8, allows an unauthenticated attacker to modify the actions taken by a system call which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. Atlassian recommends that Confluence Data Center customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Confluence Data Center 8.5: Upgrade to a release greater than or equal to 8.5.8 See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). You can download the latest version of Confluence Data Center from the download center (https://www.atlassian.com/software/confluence/download-archives). This vulnerability was discovered by l3yx and reported via our Bug Bounty program

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xv6g-6g23-79w2

около 3 лет назад

This vulnerability allows remote attackers to bypass authentication on affected installations of Ivanti Avalanche 6.3.3.101. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetSettings class. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-15919.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-xv6f-92rh-2qr6

почти 4 года назад

An HTTP Host header injection vulnerability exists in YzmCMS V5.3. A malicious user can poison a web cache or trigger redirections.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-xv6f-5jw7-pmw8

почти 4 года назад

In tangro Business Workflow before 1.18.1, the documentId of attachment uploads to /api/document/attachments/upload can be manipulated. By doing this, users can add attachments to workitems that do not belong to them.

EPSS: Низкий
github логотип

GHSA-xv6f-4q9w-8q96

почти 2 года назад

In the Linux kernel, the following vulnerability has been resolved: parisc: BTLB: Fix crash when setting up BTLB at CPU bringup When using hotplug and bringing up a 32-bit CPU, ask the firmware about the BTLB information to set up the static (block) TLB entries. For that write access to the static btlb_info struct is needed, but since it is marked __ro_after_init the kernel segfaults with missing write permissions. Fix the crash by dropping the __ro_after_init annotation.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-xv6c-f5jj-3wwc

почти 4 года назад

An issued existed in the naming of screenshots. The issue was corrected with improved naming. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1. Screenshots of the Messages app may reveal additional message content.

EPSS: Низкий
github логотип

GHSA-xv69-hhpr-w3r5

почти 4 года назад

Html-edit CMS 3.1.8 allows remote attackers to obtain sensitive information via a direct request to (1) pages.php and (2) menu.php in includes/core_files and (3) extensions/login/frontend/pages/antihacker.php, which reveals the installation path in an error message.

EPSS: Низкий
github логотип

GHSA-xv69-f7x5-r4qw

больше 6 лет назад

Magento Cross-Site Scripting via Attribute Set Name

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-xv69-6rf3-w5g2

почти 4 года назад

Missing permission check in Jenkins Cloud Statistics Plugin

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-xv68-vxp8-qj76

11 месяцев назад

Cross-Site Request Forgery (CSRF) vulnerability in Rustaurius Ultimate WP Mail allows Cross Site Request Forgery. This issue affects Ultimate WP Mail: from n/a through 1.3.4.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-xv68-rrmw-9xwf

больше 1 года назад

Mautic vulnerable to Cross-site Scripting (XSS) - stored (edit form HTML field)

CVSS3: 4.8
EPSS: Низкий
github логотип

GHSA-xv67-vhc4-3v47

3 месяца назад

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in captivateaudio Captivate Sync captivatesync-trade allows Blind SQL Injection.This issue affects Captivate Sync: from n/a through <= 3.2.2.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-xv66-85xp-gvq8

6 месяцев назад

The ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution plugin for WordPress is vulnerable to unauthorized access due to an incorrect capability check on the post_save() function in all versions up to, and including, 4.8.3. This makes it possible for authenticated attackers, with Editor-level access and above, to update the plugin's settings.

CVSS3: 2.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-xv6m-g863-2r99

The Auto Featured Image (Auto Post Thumbnail) WordPress plugin before 3.9.16 includes an AJAX endpoint that allows any user with at least Author privileges to upload arbitrary files, such as PHP files. This is caused by incorrect file extension validation.

CVSS3: 8.8
1%
Низкий
около 3 лет назад
github логотип
GHSA-xv6j-rwrm-mgqv

A vulnerability classified as critical was found in skyselang yylAdmin up to 3.0. Affected by this vulnerability is the function list of the file /app/admin/controller/file/File.php of the component Backend. The manipulation of the argument is_disable leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-xv6h-r36f-3gp5

Keycloak: Denial of Service due to excessive SAMLRequest decompression

CVSS3: 5.3
0%
Низкий
16 дней назад
github логотип
GHSA-xv6h-23v7-jx2w

Google Glass before XE6 does not properly restrict the processing of QR codes, which allows physically proximate attackers to modify the configuration or redirect users to arbitrary web sites via a crafted symbol, as demonstrated by selecting a Wi-Fi access point in order to conduct a man-in-the-middle attack.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xv6g-m8c4-67fr

Google Chrome before 17.0.963.65 does not properly perform casts of unspecified variables during the splitting of anonymous blocks, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.

3%
Низкий
почти 4 года назад
github логотип
GHSA-xv6g-jhvf-9jh9

CRLF injection vulnerability in the web framework in Cisco Security Manager 4.2 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct redirection attacks via a crafted URL, aka Bug ID CSCun82349.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xv6g-g79p-x344

An issue was discovered in PbootCMS. There is a SQL injection via the api.php/Cms/search order parameter.

1%
Низкий
почти 4 года назад
github логотип
GHSA-xv6g-cccv-mjvg

This High severity Injection vulnerability was introduced in versions 7.3.0 of Confluence Data Center. This Injection vulnerability, with a CVSS Score of 8.8, allows an unauthenticated attacker to modify the actions taken by a system call which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. Atlassian recommends that Confluence Data Center customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Confluence Data Center 8.5: Upgrade to a release greater than or equal to 8.5.8 See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). You can download the latest version of Confluence Data Center from the download center (https://www.atlassian.com/software/confluence/download-archives). This vulnerability was discovered by l3yx and reported via our Bug Bounty program

CVSS3: 8.8
почти 2 года назад
github логотип
GHSA-xv6g-6g23-79w2

This vulnerability allows remote attackers to bypass authentication on affected installations of Ivanti Avalanche 6.3.3.101. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetSettings class. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-15919.

CVSS3: 9.8
36%
Средний
около 3 лет назад
github логотип
GHSA-xv6f-92rh-2qr6

An HTTP Host header injection vulnerability exists in YzmCMS V5.3. A malicious user can poison a web cache or trigger redirections.

CVSS3: 6.1
0%
Низкий
почти 4 года назад
github логотип
GHSA-xv6f-5jw7-pmw8

In tangro Business Workflow before 1.18.1, the documentId of attachment uploads to /api/document/attachments/upload can be manipulated. By doing this, users can add attachments to workitems that do not belong to them.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xv6f-4q9w-8q96

In the Linux kernel, the following vulnerability has been resolved: parisc: BTLB: Fix crash when setting up BTLB at CPU bringup When using hotplug and bringing up a 32-bit CPU, ask the firmware about the BTLB information to set up the static (block) TLB entries. For that write access to the static btlb_info struct is needed, but since it is marked __ro_after_init the kernel segfaults with missing write permissions. Fix the crash by dropping the __ro_after_init annotation.

CVSS3: 5.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-xv6c-f5jj-3wwc

An issued existed in the naming of screenshots. The issue was corrected with improved naming. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1. Screenshots of the Messages app may reveal additional message content.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xv69-hhpr-w3r5

Html-edit CMS 3.1.8 allows remote attackers to obtain sensitive information via a direct request to (1) pages.php and (2) menu.php in includes/core_files and (3) extensions/login/frontend/pages/antihacker.php, which reveals the installation path in an error message.

2%
Низкий
почти 4 года назад
github логотип
GHSA-xv69-f7x5-r4qw

Magento Cross-Site Scripting via Attribute Set Name

CVSS3: 5.4
0%
Низкий
больше 6 лет назад
github логотип
GHSA-xv69-6rf3-w5g2

Missing permission check in Jenkins Cloud Statistics Plugin

CVSS3: 4.3
0%
Низкий
почти 4 года назад
github логотип
GHSA-xv68-vxp8-qj76

Cross-Site Request Forgery (CSRF) vulnerability in Rustaurius Ultimate WP Mail allows Cross Site Request Forgery. This issue affects Ultimate WP Mail: from n/a through 1.3.4.

CVSS3: 5.4
0%
Низкий
11 месяцев назад
github логотип
GHSA-xv68-rrmw-9xwf

Mautic vulnerable to Cross-site Scripting (XSS) - stored (edit form HTML field)

CVSS3: 4.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-xv67-vhc4-3v47

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in captivateaudio Captivate Sync captivatesync-trade allows Blind SQL Injection.This issue affects Captivate Sync: from n/a through <= 3.2.2.

CVSS3: 9.8
0%
Низкий
3 месяца назад
github логотип
GHSA-xv66-85xp-gvq8

The ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution plugin for WordPress is vulnerable to unauthorized access due to an incorrect capability check on the post_save() function in all versions up to, and including, 4.8.3. This makes it possible for authenticated attackers, with Editor-level access and above, to update the plugin's settings.

CVSS3: 2.7
0%
Низкий
6 месяцев назад

Уязвимостей на страницу