Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 290 844

Количество 290 844

github логотип

GHSA-2g4w-262r-45rr

около 3 лет назад

In openlibrary versions deploy-2016-07-0 through deploy-2021-12-22 are vulnerable to Stored XSS.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-2g4v-qc3v-672p

больше 3 лет назад

Buffer overflow in ByteCatcher FTP client 1.04b allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long FTP server banner.

EPSS: Низкий
github логотип

GHSA-2g4v-8vvw-r8m9

около 1 года назад

An issue discovered in skycaiji 2.8 allows attackers to run arbitrary code via crafted POST request to /index.php?s=/admin/develop/editor_save.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-2g4r-w789-9wg5

больше 3 лет назад

In macOS High Sierra before 10.13.4, there was an issue with the handling of smartcard PINs. This issue was addressed with additional logic.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-2g4r-fqm7-xqfm

больше 1 года назад

The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.5, iOS 16.6 and iPadOS 16.6, tvOS 16.6, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-2g4r-3v66-3h7f

7 месяцев назад

Open5GS MME version <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Modification Failure` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-2g4q-9vm9-9fw4

больше 1 года назад

Jenkins Script Security Plugin sandbox bypass vulnerability

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-2g4q-4f6w-5q4g

больше 3 лет назад

Multiple SQL injection vulnerabilities in myColex 1.4.2 allow remote attackers to execute arbitrary SQL commands via (1) the formUser parameter (aka the Name field) to common/login.php, and allow remote authenticated users to execute arbitrary SQL commands via the ID parameter in a Detail action to (2) kategorie.php, (3) medium.php, (4) person.php, or (5) schlagwort.php in modules/, related to classes/class.perform.php.

EPSS: Низкий
github логотип

GHSA-2g4p-864h-334x

больше 3 лет назад

Click Studios Passwordstate before 8.3 Build 8397 allows XSS by authenticated users via an uploaded HTML document.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-2g4m-frjw-86jj

больше 3 лет назад

The rfc2231 function in message.c in libclamav in ClamAV before 0.93 allows remote attackers to cause a denial of service (crash) via a crafted message that produces a string that is not null terminated, which triggers a buffer over-read.

EPSS: Низкий
github логотип

GHSA-2g4j-2xqp-4hq5

больше 3 лет назад

In coders/xbm.c in ImageMagick 7.0.6-1 Q16, a DoS in ReadXBMImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted XBM file, which claims large rows and columns fields in the header but does not contain sufficient backing data, is provided, the loop over the rows would consume huge CPU resources, since there is no EOF check inside the loop.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-2g4h-jr8q-95q6

9 месяцев назад

The Quick License Manager – WooCommerce Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'submit_qlm_products' parameter in all versions up to, and including, 2.4.17 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-2g4f-rm2w-x596

больше 1 года назад

The chartjs WordPress plugin through 2023.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-2g4f-r7cc-55q9

больше 3 лет назад

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use the knowledge gained by reading the insufficiently protected sensitive information to plan further attacks.

EPSS: Низкий
github логотип

GHSA-2g4c-jphf-67p6

почти 2 года назад

The leakage of channel access token in F.B.P members Line 13.6.1 allows remote attackers to send malicious notifications to victims.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-2g4c-jh83-m9h4

больше 3 лет назад

IBM Tivoli Federated Identity Manager (TFIM) and Tivoli Federated Identity Manager Business Gateway (TFIMBG) 6.1.1, 6.2.0, 6.2.1, and 6.2.2 allow remote attackers to establish sessions via a crafted message that leverages (1) a signature-validation bypass for SAML messages containing unsigned elements, (2) incorrect validation of XML messages, or (3) a certificate-chain validation bypass for an XML signature element that contains the signing certificate.

EPSS: Низкий
github логотип

GHSA-2g4c-8fpm-c46v

больше 1 года назад

web3-utils Prototype Pollution vulnerability

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-2g49-vjmj-qp9h

больше 3 лет назад

The ELF file parser in Norman Antivirus 6.06.12, eSafe 7.0.17.0, CA eTrust Vet Antivirus 36.1.8511, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified identsize field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.

EPSS: Низкий
github логотип

GHSA-2g49-gr5q-f4v2

больше 3 лет назад

On BIG-IP 11.5.1-11.5.4, 11.6.1, and 12.1.0, a virtual server configured with a Client SSL profile may be vulnerable to a chosen ciphertext attack against CBC ciphers. When exploited, this may result in plaintext recovery of encrypted messages through a man-in-the-middle (MITM) attack, despite the attacker not having gained access to the server's private key itself. (CVE-2019-6593 also known as Zombie POODLE and GOLDENDOODLE.)

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-2g49-fr8w-j923

5 месяцев назад

The WP RealEstate plugin for WordPress, used by the Homeo theme, is vulnerable to authentication bypass in all versions up to, and including, 1.6.26. This is due to insufficient role restrictions in the 'process_register' function. This makes it possible for unauthenticated attackers to register an account with the Administrator role.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-2g4w-262r-45rr

In openlibrary versions deploy-2016-07-0 through deploy-2021-12-22 are vulnerable to Stored XSS.

CVSS3: 5.4
0%
Низкий
около 3 лет назад
github логотип
GHSA-2g4v-qc3v-672p

Buffer overflow in ByteCatcher FTP client 1.04b allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long FTP server banner.

5%
Низкий
больше 3 лет назад
github логотип
GHSA-2g4v-8vvw-r8m9

An issue discovered in skycaiji 2.8 allows attackers to run arbitrary code via crafted POST request to /index.php?s=/admin/develop/editor_save.

CVSS3: 9.8
0%
Низкий
около 1 года назад
github логотип
GHSA-2g4r-w789-9wg5

In macOS High Sierra before 10.13.4, there was an issue with the handling of smartcard PINs. This issue was addressed with additional logic.

CVSS3: 5.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-2g4r-fqm7-xqfm

The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.5, iOS 16.6 and iPadOS 16.6, tvOS 16.6, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.

CVSS3: 8.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-2g4r-3v66-3h7f

Open5GS MME version <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Modification Failure` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.

CVSS3: 8.6
0%
Низкий
7 месяцев назад
github логотип
GHSA-2g4q-9vm9-9fw4

Jenkins Script Security Plugin sandbox bypass vulnerability

CVSS3: 8.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-2g4q-4f6w-5q4g

Multiple SQL injection vulnerabilities in myColex 1.4.2 allow remote attackers to execute arbitrary SQL commands via (1) the formUser parameter (aka the Name field) to common/login.php, and allow remote authenticated users to execute arbitrary SQL commands via the ID parameter in a Detail action to (2) kategorie.php, (3) medium.php, (4) person.php, or (5) schlagwort.php in modules/, related to classes/class.perform.php.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2g4p-864h-334x

Click Studios Passwordstate before 8.3 Build 8397 allows XSS by authenticated users via an uploaded HTML document.

CVSS3: 5.4
0%
Низкий
больше 3 лет назад
github логотип
GHSA-2g4m-frjw-86jj

The rfc2231 function in message.c in libclamav in ClamAV before 0.93 allows remote attackers to cause a denial of service (crash) via a crafted message that produces a string that is not null terminated, which triggers a buffer over-read.

5%
Низкий
больше 3 лет назад
github логотип
GHSA-2g4j-2xqp-4hq5

In coders/xbm.c in ImageMagick 7.0.6-1 Q16, a DoS in ReadXBMImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted XBM file, which claims large rows and columns fields in the header but does not contain sufficient backing data, is provided, the loop over the rows would consume huge CPU resources, since there is no EOF check inside the loop.

CVSS3: 6.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-2g4h-jr8q-95q6

The Quick License Manager – WooCommerce Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'submit_qlm_products' parameter in all versions up to, and including, 2.4.17 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

CVSS3: 6.1
0%
Низкий
9 месяцев назад
github логотип
GHSA-2g4f-rm2w-x596

The chartjs WordPress plugin through 2023.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

CVSS3: 5.4
0%
Низкий
больше 1 года назад
github логотип
GHSA-2g4f-r7cc-55q9

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use the knowledge gained by reading the insufficiently protected sensitive information to plan further attacks.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2g4c-jphf-67p6

The leakage of channel access token in F.B.P members Line 13.6.1 allows remote attackers to send malicious notifications to victims.

CVSS3: 6.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-2g4c-jh83-m9h4

IBM Tivoli Federated Identity Manager (TFIM) and Tivoli Federated Identity Manager Business Gateway (TFIMBG) 6.1.1, 6.2.0, 6.2.1, and 6.2.2 allow remote attackers to establish sessions via a crafted message that leverages (1) a signature-validation bypass for SAML messages containing unsigned elements, (2) incorrect validation of XML messages, or (3) a certificate-chain validation bypass for an XML signature element that contains the signing certificate.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2g4c-8fpm-c46v

web3-utils Prototype Pollution vulnerability

CVSS3: 7.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-2g49-vjmj-qp9h

The ELF file parser in Norman Antivirus 6.06.12, eSafe 7.0.17.0, CA eTrust Vet Antivirus 36.1.8511, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified identsize field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2g49-gr5q-f4v2

On BIG-IP 11.5.1-11.5.4, 11.6.1, and 12.1.0, a virtual server configured with a Client SSL profile may be vulnerable to a chosen ciphertext attack against CBC ciphers. When exploited, this may result in plaintext recovery of encrypted messages through a man-in-the-middle (MITM) attack, despite the attacker not having gained access to the server's private key itself. (CVE-2019-6593 also known as Zombie POODLE and GOLDENDOODLE.)

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
github логотип
GHSA-2g49-fr8w-j923

The WP RealEstate plugin for WordPress, used by the Homeo theme, is vulnerable to authentication bypass in all versions up to, and including, 1.6.26. This is due to insufficient role restrictions in the 'process_register' function. This makes it possible for unauthenticated attackers to register an account with the Administrator role.

CVSS3: 9.8
1%
Низкий
5 месяцев назад

Уязвимостей на страницу