Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 324 556

Количество 324 556

github логотип

GHSA-xrv8-2pf5-f3q7

4 месяца назад

nitro-tpm-pcr-compute may allow kernel command line modification by an account operator

CVSS3: 6
EPSS: Низкий
github логотип

GHSA-xrv7-w6wq-5f4g

почти 4 года назад

The "http-client" egg always used a HTTP_PROXY environment variable to determine whether HTTP traffic should be routed via a proxy, even when running as a CGI process. Under several web servers this would mean a user-supplied "Proxy" header could allow an attacker to direct all HTTP requests through a proxy (also known as a "httpoxy" attack). This affects all versions of http-client before 0.10.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xrv7-5mq8-pxvp

почти 3 года назад

In Parse of simdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783565References: N/A

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-xrv6-3vg3-5pm7

около 1 года назад

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Leetoo Toocheke Companion allows Stored XSS. This issue affects Toocheke Companion: from n/a through 1.166.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-xrv5-vhqh-hwxh

около 1 года назад

Cross Site Scripting vulnerability in PecanProject pecan v.1.7.2 allows a remote attacker to execute arbitrary code via the crafted payload to the hostname, sitegroupid, lat, lon and sitename parameters.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-xrv5-2wwg-jp3r

9 месяцев назад

A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.

EPSS: Низкий
github логотип

GHSA-xrv4-xm8w-pm47

больше 2 лет назад

An issue was discovered in freedesktop poppler version 20.12.1, allows remote attackers to cause a denial of service (DoS) via crafted .pdf file to FoFiType1C::cvtGlyph function.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-xrv3-jmcp-374j

больше 1 года назад

zerovec incorrectly uses `#[repr(packed)]`

CVSS3: 6.2
EPSS: Низкий
github логотип

GHSA-xrv2-p88f-5qw2

почти 4 года назад

A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.5. A local user may be able to read kernel memory.

EPSS: Низкий
github логотип

GHSA-xrrx-xr48-h4jv

почти 2 года назад

A vulnerability, which was classified as critical, has been found in itsourcecode Online Laundry Management System 1.0. Affected by this issue is some unknown functionality of the file admin_class.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268724.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-xrrx-hrm6-mxr7

почти 4 года назад

An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.

EPSS: Высокий
github логотип

GHSA-xrrw-wm7v-5p7r

почти 4 года назад

Apple iPhone OS 1.0 through 2.2.1 and iPhone OS for iPod touch 1.1 through 2.2.1 stores an exception for a hostname when the user accepts an untrusted Exchange server certificate, which causes it to be accepted without prompting in future usage and allows remote Exchange servers to obtain sensitive information such as credentials.

EPSS: Низкий
github логотип

GHSA-xrrw-gmgc-3q22

почти 4 года назад

dnstools.php for DNSTools 2.0 beta 4 and earlier allows remote attackers to bypass authentication and gain privileges by setting the user_logged_in or user_dnstools_administrator parameters.

EPSS: Низкий
github логотип

GHSA-xrrw-9j78-hpf3

около 2 лет назад

Jenkins HTML Publisher Plugin Stored XSS vulnerability

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-xrrw-7rr2-829v

около 2 лет назад

A logic issue was addressed with improved validation. This issue is fixed in tvOS 17.4, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 and iPadOS 17.4, watchOS 10.4, iOS 16.7.6 and iPadOS 16.7.6, Safari 17.4. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-xrrv-gjcc-h93v

больше 3 лет назад

Symantec Endpoint Protection (Windows) agent, prior to 14.3 RU6/14.3 RU5 Patch 1, may be susceptible to a Security Control Bypass vulnerability, which is a type of issue that can potentially allow a threat actor to circumvent existing security controls. This CVE applies narrowly to the Client User Interface Password protection and Policy Import/Export Password protection, if it has been enabled.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xrrv-33fc-mq2w

больше 2 лет назад

Windows Remote Desktop Security Feature Bypass Vulnerability

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-xrrr-c6cx-2756

10 месяцев назад

A vulnerability classified as critical has been found in Seeyon Zhiyuan OA Web Application System up to 8.1 SP2. This affects the function this.oursNetService.getData of the file com\ours\www\ehr\openPlatform1\open4ClientType\controller\ThirdMenuController.class. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-xrrq-xrcm-893x

больше 3 лет назад

F-Secure SAFE Browser 19.1 before 19.2 for Android allows an IDN homograph attack.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-xrrq-rrgq-h89w

9 месяцев назад

static-alloc vulnerability leads to uninitialized read after allocating MemBump

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-xrv8-2pf5-f3q7

nitro-tpm-pcr-compute may allow kernel command line modification by an account operator

CVSS3: 6
4 месяца назад
github логотип
GHSA-xrv7-w6wq-5f4g

The "http-client" egg always used a HTTP_PROXY environment variable to determine whether HTTP traffic should be routed via a proxy, even when running as a CGI process. Under several web servers this would mean a user-supplied "Proxy" header could allow an attacker to direct all HTTP requests through a proxy (also known as a "httpoxy" attack). This affects all versions of http-client before 0.10.

CVSS3: 7.5
1%
Низкий
почти 4 года назад
github логотип
GHSA-xrv7-5mq8-pxvp

In Parse of simdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783565References: N/A

CVSS3: 6.7
0%
Низкий
почти 3 года назад
github логотип
GHSA-xrv6-3vg3-5pm7

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Leetoo Toocheke Companion allows Stored XSS. This issue affects Toocheke Companion: from n/a through 1.166.

CVSS3: 5.9
0%
Низкий
около 1 года назад
github логотип
GHSA-xrv5-vhqh-hwxh

Cross Site Scripting vulnerability in PecanProject pecan v.1.7.2 allows a remote attacker to execute arbitrary code via the crafted payload to the hostname, sitegroupid, lat, lon and sitename parameters.

CVSS3: 6.1
0%
Низкий
около 1 года назад
github логотип
GHSA-xrv5-2wwg-jp3r

A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.

0%
Низкий
9 месяцев назад
github логотип
GHSA-xrv4-xm8w-pm47

An issue was discovered in freedesktop poppler version 20.12.1, allows remote attackers to cause a denial of service (DoS) via crafted .pdf file to FoFiType1C::cvtGlyph function.

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-xrv3-jmcp-374j

zerovec incorrectly uses `#[repr(packed)]`

CVSS3: 6.2
больше 1 года назад
github логотип
GHSA-xrv2-p88f-5qw2

A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.5. A local user may be able to read kernel memory.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xrrx-xr48-h4jv

A vulnerability, which was classified as critical, has been found in itsourcecode Online Laundry Management System 1.0. Affected by this issue is some unknown functionality of the file admin_class.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268724.

CVSS3: 6.3
0%
Низкий
почти 2 года назад
github логотип
GHSA-xrrx-hrm6-mxr7

An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.

78%
Высокий
почти 4 года назад
github логотип
GHSA-xrrw-wm7v-5p7r

Apple iPhone OS 1.0 through 2.2.1 and iPhone OS for iPod touch 1.1 through 2.2.1 stores an exception for a hostname when the user accepts an untrusted Exchange server certificate, which causes it to be accepted without prompting in future usage and allows remote Exchange servers to obtain sensitive information such as credentials.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xrrw-gmgc-3q22

dnstools.php for DNSTools 2.0 beta 4 and earlier allows remote attackers to bypass authentication and gain privileges by setting the user_logged_in or user_dnstools_administrator parameters.

4%
Низкий
почти 4 года назад
github логотип
GHSA-xrrw-9j78-hpf3

Jenkins HTML Publisher Plugin Stored XSS vulnerability

CVSS3: 8
0%
Низкий
около 2 лет назад
github логотип
GHSA-xrrw-7rr2-829v

A logic issue was addressed with improved validation. This issue is fixed in tvOS 17.4, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 and iPadOS 17.4, watchOS 10.4, iOS 16.7.6 and iPadOS 16.7.6, Safari 17.4. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.

CVSS3: 8.1
1%
Низкий
около 2 лет назад
github логотип
GHSA-xrrv-gjcc-h93v

Symantec Endpoint Protection (Windows) agent, prior to 14.3 RU6/14.3 RU5 Patch 1, may be susceptible to a Security Control Bypass vulnerability, which is a type of issue that can potentially allow a threat actor to circumvent existing security controls. This CVE applies narrowly to the Client User Interface Password protection and Policy Import/Export Password protection, if it has been enabled.

CVSS3: 7.5
8%
Низкий
больше 3 лет назад
github логотип
GHSA-xrrv-33fc-mq2w

Windows Remote Desktop Security Feature Bypass Vulnerability

CVSS3: 6.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-xrrr-c6cx-2756

A vulnerability classified as critical has been found in Seeyon Zhiyuan OA Web Application System up to 8.1 SP2. This affects the function this.oursNetService.getData of the file com\ours\www\ehr\openPlatform1\open4ClientType\controller\ThirdMenuController.class. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
0%
Низкий
10 месяцев назад
github логотип
GHSA-xrrq-xrcm-893x

F-Secure SAFE Browser 19.1 before 19.2 for Android allows an IDN homograph attack.

CVSS3: 5.4
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xrrq-rrgq-h89w

static-alloc vulnerability leads to uninitialized read after allocating MemBump

9 месяцев назад

Уязвимостей на страницу