Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 314 928

Количество 314 928

github логотип

GHSA-446w-rrm4-r47f

почти 4 года назад

Exposure of home directory through shescape on Unix with Bash

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-446w-q44c-4xj9

больше 3 лет назад

Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.

EPSS: Низкий
github логотип

GHSA-446v-vm34-72r6

29 дней назад

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fw_tracer, Validate format string parameters Add validation for format string parameters in the firmware tracer to prevent potential security vulnerabilities and crashes from malformed format strings received from firmware. The firmware tracer receives format strings from the device firmware and uses them to format trace messages. Without proper validation, bad firmware could provide format strings with invalid format specifiers (e.g., %s, %p, %n) that could lead to crashes, or other undefined behavior. Add mlx5_tracer_validate_params() to validate that all format specifiers in trace strings are limited to safe integer/hex formats (%x, %d, %i, %u, %llx, %lx, etc.). Reject strings containing other format types that could be used to access arbitrary memory or cause crashes. Invalid format strings are added to the trace output for visibility with "BAD_FORMAT: " prefix.

EPSS: Низкий
github логотип

GHSA-446v-mrg6-7hw8

больше 2 лет назад

The WP Activity Log Premium plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.0. This is due to missing or incorrect nonce validation on the ajax_switch_db function. This makes it possible for unauthenticated attackers to make changes to the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-446v-89xj-w74v

8 месяцев назад

A vulnerability was found in Campcodes Online Teacher Record Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /search-teacher.php. The manipulation of the argument searchteacher leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-446v-48hm-jgwm

6 месяцев назад

The Soledad theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pcsml_smartlists_h’ parameter in all versions up to, and including, 8.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVSS3: 6.4
EPSS: Низкий
github логотип

GHSA-446q-xxg5-3vhh

больше 3 лет назад

eZ Platform users with the Company admin role can assign any role to any user

EPSS: Низкий
github логотип

GHSA-446p-4x7p-gxv7

почти 4 года назад

intl/uconv/util/nsUnicodeDecodeHelper.cpp in Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 inserts a U+FFFD sequence into text in certain circumstances involving undefined positions, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted 8-bit text.

EPSS: Низкий
github логотип

GHSA-446p-4p8x-ff66

больше 3 лет назад

CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which could cause a stack overflow and create a denial-of-service condition or allow remote code execution.

EPSS: Низкий
github логотип

GHSA-446m-mv8f-q348

почти 8 лет назад

Regular Expression Denial of Service in moment

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-446m-hmmm-hm8m

больше 2 лет назад

Ckan remote code execution and private information access via crafted resource ids

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-446j-vwvf-m2wj

больше 3 лет назад

IBM Edge 4.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 189535.

EPSS: Низкий
github логотип

GHSA-446j-7c44-9q8x

почти 2 года назад

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Brevo for WooCommerce Sendinblue for WooCommerce.This issue affects Sendinblue for WooCommerce: from n/a through 4.0.17.

CVSS3: 8.5
EPSS: Низкий
github логотип

GHSA-446j-5cq2-4x7c

больше 3 лет назад

The libxenlight (libxl) toolstack library in Xen 4.0.x, 4.1.x, and 4.2.x uses weak permissions for xenstore keys for paravirtualised and emulated serial console devices, which allows local guest administrators to modify the xenstore value via unspecified vectors.

EPSS: Низкий
github логотип

GHSA-446j-5276-666q

почти 2 года назад

Insecure Permissions vulnerability in e-trust Horacius 1.0, 1.1, and 1.2 allows a local attacker to escalate privileges via the password reset function.

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-446h-xh8r-vwqx

больше 3 лет назад

** DISPUTED ** data_input.php in Cacti 1.2.8 allows remote code execution via a crafted Input String to Data Collection -> Data Input Methods -> Unix -> Ping Host. NOTE: the vendor has stated "This is a false alarm."

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-446h-6m77-5x8g

почти 4 года назад

The set_default_speeds function in backend/backend.c in NVidia NVClock before 0.8b2 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/nvclock temporary file.

EPSS: Низкий
github логотип

GHSA-446g-ch6r-4m6w

почти 3 года назад

This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of WMF files. Crafted data in a WMF file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-17638.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-446g-9pj4-3cgr

больше 3 лет назад

In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-446g-2w3w-mgwx

почти 4 года назад

Sourcecodester Covid-19 Directory on Vaccination System 1.0 is vulnerable to SQL Injection via cmdcategory.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-446w-rrm4-r47f

Exposure of home directory through shescape on Unix with Bash

CVSS3: 5.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-446w-q44c-4xj9

Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-446v-vm34-72r6

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fw_tracer, Validate format string parameters Add validation for format string parameters in the firmware tracer to prevent potential security vulnerabilities and crashes from malformed format strings received from firmware. The firmware tracer receives format strings from the device firmware and uses them to format trace messages. Without proper validation, bad firmware could provide format strings with invalid format specifiers (e.g., %s, %p, %n) that could lead to crashes, or other undefined behavior. Add mlx5_tracer_validate_params() to validate that all format specifiers in trace strings are limited to safe integer/hex formats (%x, %d, %i, %u, %llx, %lx, etc.). Reject strings containing other format types that could be used to access arbitrary memory or cause crashes. Invalid format strings are added to the trace output for visibility with "BAD_FORMAT: " prefix.

0%
Низкий
29 дней назад
github логотип
GHSA-446v-mrg6-7hw8

The WP Activity Log Premium plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.0. This is due to missing or incorrect nonce validation on the ajax_switch_db function. This makes it possible for unauthenticated attackers to make changes to the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-446v-89xj-w74v

A vulnerability was found in Campcodes Online Teacher Record Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /search-teacher.php. The manipulation of the argument searchteacher leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 7.3
0%
Низкий
8 месяцев назад
github логотип
GHSA-446v-48hm-jgwm

The Soledad theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pcsml_smartlists_h’ parameter in all versions up to, and including, 8.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVSS3: 6.4
0%
Низкий
6 месяцев назад
github логотип
GHSA-446q-xxg5-3vhh

eZ Platform users with the Company admin role can assign any role to any user

больше 3 лет назад
github логотип
GHSA-446p-4x7p-gxv7

intl/uconv/util/nsUnicodeDecodeHelper.cpp in Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 inserts a U+FFFD sequence into text in certain circumstances involving undefined positions, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted 8-bit text.

0%
Низкий
почти 4 года назад
github логотип
GHSA-446p-4p8x-ff66

CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which could cause a stack overflow and create a denial-of-service condition or allow remote code execution.

3%
Низкий
больше 3 лет назад
github логотип
GHSA-446m-mv8f-q348

Regular Expression Denial of Service in moment

CVSS3: 7.5
0%
Низкий
почти 8 лет назад
github логотип
GHSA-446m-hmmm-hm8m

Ckan remote code execution and private information access via crafted resource ids

CVSS3: 9.8
3%
Низкий
больше 2 лет назад
github логотип
GHSA-446j-vwvf-m2wj

IBM Edge 4.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 189535.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-446j-7c44-9q8x

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Brevo for WooCommerce Sendinblue for WooCommerce.This issue affects Sendinblue for WooCommerce: from n/a through 4.0.17.

CVSS3: 8.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-446j-5cq2-4x7c

The libxenlight (libxl) toolstack library in Xen 4.0.x, 4.1.x, and 4.2.x uses weak permissions for xenstore keys for paravirtualised and emulated serial console devices, which allows local guest administrators to modify the xenstore value via unspecified vectors.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-446j-5276-666q

Insecure Permissions vulnerability in e-trust Horacius 1.0, 1.1, and 1.2 allows a local attacker to escalate privileges via the password reset function.

CVSS3: 8.4
0%
Низкий
почти 2 года назад
github логотип
GHSA-446h-xh8r-vwqx

** DISPUTED ** data_input.php in Cacti 1.2.8 allows remote code execution via a crafted Input String to Data Collection -> Data Input Methods -> Unix -> Ping Host. NOTE: the vendor has stated "This is a false alarm."

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-446h-6m77-5x8g

The set_default_speeds function in backend/backend.c in NVidia NVClock before 0.8b2 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/nvclock temporary file.

0%
Низкий
почти 4 года назад
github логотип
GHSA-446g-ch6r-4m6w

This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of WMF files. Crafted data in a WMF file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-17638.

CVSS3: 5.5
1%
Низкий
почти 3 года назад
github логотип
GHSA-446g-9pj4-3cgr

In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-446g-2w3w-mgwx

Sourcecodester Covid-19 Directory on Vaccination System 1.0 is vulnerable to SQL Injection via cmdcategory.

CVSS3: 9.8
0%
Низкий
почти 4 года назад

Уязвимостей на страницу