Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 314 458

Количество 314 458

github логотип

GHSA-42mf-5456-q6fw

почти 2 года назад

Vulnerability in Oracle Audit Vault and Database Firewall (component: Firewall). Supported versions that are affected are 20.1-20.9. Difficult to exploit vulnerability allows high privileged attacker with network access via Oracle Net to compromise Oracle Audit Vault and Database Firewall. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Audit Vault and Database Firewall, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Audit Vault and Database Firewall accessible data. CVSS 3.1 Base Score 2.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N).

CVSS3: 2.6
EPSS: Низкий
github логотип

GHSA-42mc-fjx6-gh46

почти 4 года назад

changepassword.php in Phlatline's Personal Information Manager (pPIM) 1.0 and earlier does not require administrative authentication, which allows remote attackers to change arbitrary passwords.

EPSS: Низкий
github логотип

GHSA-42mc-7w38-vjxg

больше 3 лет назад

In Exiv2 before v0.27.2, there is an integer overflow vulnerability in the WebPImage::getHeaderOffset function in webpimage.cpp. It can lead to a buffer overflow vulnerability and a crash.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-42mc-4rwh-2wv6

10 месяцев назад

The Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.3.1. This is due to missing or incorrect nonce validation on the wclearfy_cache_delete functionality . This makes it possible for unauthenticated attackers to clear the cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-42m9-x54q-hrvm

больше 1 года назад

The Embed videos and respect privacy plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'v' parameter in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-42m9-f9c6-jjrj

больше 3 лет назад

An authentication bypass vulnerability exists in Windows Communication Foundation (WCF) and Windows Identity Foundation (WIF), allowing signing of SAML tokens with arbitrary symmetric keys, aka 'WCF/WIF SAML Token Authentication Bypass Vulnerability'.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-42m9-36rv-vf4h

почти 4 года назад

Unspecified vulnerability in core/ajax/translations.php in ownCloud before 4.0.12 and 4.5.x before 4.5.6 allows remote authenticated users to execute arbitrary PHP code via unknown vectors. NOTE: this entry has been SPLIT due to different affected versions. The core/settings.php issue is covered by CVE-2013-7344.

EPSS: Средний
github логотип

GHSA-42m8-gfgc-wg9v

больше 3 лет назад

Vulnerability in avatar_uploader v7.x-1.0-beta8 , The code in view.php doesn't verify users or sanitize the file path.

CVSS3: 7.5
EPSS: Высокий
github логотип

GHSA-42m8-7fjc-3h2p

почти 4 года назад

The Pricing Tables WordPress Plugin WordPress plugin before 3.1.3 does not verify the CSRF nonce when removing posts, allowing attackers to make a logged in admin remove arbitrary posts from the blog via a CSRF attack, which will be put in the trash

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-42m7-x4gf-gj25

больше 2 лет назад

A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-42m7-8557-x95x

больше 1 года назад

Windows Mobile Broadband Driver Denial of Service Vulnerability

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-42m7-33x8-mvrh

больше 1 года назад

OPW Fuel Management Systems SiteSentinel could allow an attacker to bypass authentication to the server and obtain full admin privileges.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-42m6-v976-v7cf

больше 3 лет назад

A Null Pointer dereference vulnerability exists in GPAC 2.1-DEV-revUNKNOWN-master via the function gf_filter_pid_set_property_full () at filter_core/filter_pid.c:5250,which causes a Denial of Service (DoS). This vulnerability was fixed in commit b43f9d1.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-42m6-mm85-f999

больше 3 лет назад

SQL Injection exists in the AllVideos Reloaded 1.2.x component for Joomla! via the divid parameter.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-42m6-m8gm-pwp9

больше 3 лет назад

Microsoft Internet Explorer 6 and 7 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Object Memory Corruption Vulnerability."

EPSS: Средний
github логотип

GHSA-42m6-m7p8-vqwv

2 месяца назад

An issue was discovered in the Thermo Fisher Torrent Suite Django application 5.18.1. A remote code execution vulnerability exists in the network configuration functionality, stemming from insufficient input validation when processing network configuration parameters through administrative endpoints. The application allows administrators to modify the server's network configuration through the Django application. This configuration is processed by Bash scripts (TSsetnoproxy and TSsetproxy) that write user-controlled data directly to environment variables without proper sanitization. After updating environment variables, the scripts execute a source command on /etc/environment; if an attacker injects malicious data into environment variables, this command can enable arbitrary command execution. The vulnerability begins with the /admin/network endpoint, which passes user-supplied form data as arguments to subprocess.Popen calls. The user-supplied input is then used to update environme...

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-42m6-g935-5vmq

больше 3 лет назад

@ianwalter/merge Prototype Pollution via `merge` function

CVSS3: 5.6
EPSS: Низкий
github логотип

GHSA-42m6-9p28-3cfp

почти 4 года назад

Directory traversal vulnerability in Flatnuke 2.5.6 allows remote attackers to access arbitrary files via a .. (dot dot) and null byte (%00) in the id parameter of the read module.

EPSS: Низкий
github логотип

GHSA-42m6-7xff-9v9m

больше 3 лет назад

Improper Neutralization of Input During Web Page Generation in Jenkins

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-42m6-6jcq-4m5x

больше 3 лет назад

Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG layout.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-42mf-5456-q6fw

Vulnerability in Oracle Audit Vault and Database Firewall (component: Firewall). Supported versions that are affected are 20.1-20.9. Difficult to exploit vulnerability allows high privileged attacker with network access via Oracle Net to compromise Oracle Audit Vault and Database Firewall. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Audit Vault and Database Firewall, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Audit Vault and Database Firewall accessible data. CVSS 3.1 Base Score 2.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N).

CVSS3: 2.6
0%
Низкий
почти 2 года назад
github логотип
GHSA-42mc-fjx6-gh46

changepassword.php in Phlatline's Personal Information Manager (pPIM) 1.0 and earlier does not require administrative authentication, which allows remote attackers to change arbitrary passwords.

6%
Низкий
почти 4 года назад
github логотип
GHSA-42mc-7w38-vjxg

In Exiv2 before v0.27.2, there is an integer overflow vulnerability in the WebPImage::getHeaderOffset function in webpimage.cpp. It can lead to a buffer overflow vulnerability and a crash.

CVSS3: 6.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-42mc-4rwh-2wv6

The Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.3.1. This is due to missing or incorrect nonce validation on the wclearfy_cache_delete functionality . This makes it possible for unauthenticated attackers to clear the cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVSS3: 5.3
0%
Низкий
10 месяцев назад
github логотип
GHSA-42m9-x54q-hrvm

The Embed videos and respect privacy plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'v' parameter in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

CVSS3: 6.1
1%
Низкий
больше 1 года назад
github логотип
GHSA-42m9-f9c6-jjrj

An authentication bypass vulnerability exists in Windows Communication Foundation (WCF) and Windows Identity Foundation (WIF), allowing signing of SAML tokens with arbitrary symmetric keys, aka 'WCF/WIF SAML Token Authentication Bypass Vulnerability'.

CVSS3: 7.5
3%
Низкий
больше 3 лет назад
github логотип
GHSA-42m9-36rv-vf4h

Unspecified vulnerability in core/ajax/translations.php in ownCloud before 4.0.12 and 4.5.x before 4.5.6 allows remote authenticated users to execute arbitrary PHP code via unknown vectors. NOTE: this entry has been SPLIT due to different affected versions. The core/settings.php issue is covered by CVE-2013-7344.

11%
Средний
почти 4 года назад
github логотип
GHSA-42m8-gfgc-wg9v

Vulnerability in avatar_uploader v7.x-1.0-beta8 , The code in view.php doesn't verify users or sanitize the file path.

CVSS3: 7.5
81%
Высокий
больше 3 лет назад
github логотип
GHSA-42m8-7fjc-3h2p

The Pricing Tables WordPress Plugin WordPress plugin before 3.1.3 does not verify the CSRF nonce when removing posts, allowing attackers to make a logged in admin remove arbitrary posts from the blog via a CSRF attack, which will be put in the trash

CVSS3: 6.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-42m7-x4gf-gj25

A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-42m7-8557-x95x

Windows Mobile Broadband Driver Denial of Service Vulnerability

CVSS3: 6.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-42m7-33x8-mvrh

OPW Fuel Management Systems SiteSentinel could allow an attacker to bypass authentication to the server and obtain full admin privileges.

CVSS3: 9.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-42m6-v976-v7cf

A Null Pointer dereference vulnerability exists in GPAC 2.1-DEV-revUNKNOWN-master via the function gf_filter_pid_set_property_full () at filter_core/filter_pid.c:5250,which causes a Denial of Service (DoS). This vulnerability was fixed in commit b43f9d1.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-42m6-mm85-f999

SQL Injection exists in the AllVideos Reloaded 1.2.x component for Joomla! via the divid parameter.

CVSS3: 9.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-42m6-m8gm-pwp9

Microsoft Internet Explorer 6 and 7 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Object Memory Corruption Vulnerability."

55%
Средний
больше 3 лет назад
github логотип
GHSA-42m6-m7p8-vqwv

An issue was discovered in the Thermo Fisher Torrent Suite Django application 5.18.1. A remote code execution vulnerability exists in the network configuration functionality, stemming from insufficient input validation when processing network configuration parameters through administrative endpoints. The application allows administrators to modify the server's network configuration through the Django application. This configuration is processed by Bash scripts (TSsetnoproxy and TSsetproxy) that write user-controlled data directly to environment variables without proper sanitization. After updating environment variables, the scripts execute a source command on /etc/environment; if an attacker injects malicious data into environment variables, this command can enable arbitrary command execution. The vulnerability begins with the /admin/network endpoint, which passes user-supplied form data as arguments to subprocess.Popen calls. The user-supplied input is then used to update environme...

CVSS3: 7.2
0%
Низкий
2 месяца назад
github логотип
GHSA-42m6-g935-5vmq

@ianwalter/merge Prototype Pollution via `merge` function

CVSS3: 5.6
0%
Низкий
больше 3 лет назад
github логотип
GHSA-42m6-9p28-3cfp

Directory traversal vulnerability in Flatnuke 2.5.6 allows remote attackers to access arbitrary files via a .. (dot dot) and null byte (%00) in the id parameter of the read module.

2%
Низкий
почти 4 года назад
github логотип
GHSA-42m6-7xff-9v9m

Improper Neutralization of Input During Web Page Generation in Jenkins

CVSS3: 5.4
0%
Низкий
больше 3 лет назад
github логотип
GHSA-42m6-6jcq-4m5x

Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG layout.

2%
Низкий
больше 3 лет назад

Уязвимостей на страницу