Количество 289 529
Количество 289 529
GHSA-26ww-2c8f-2rgh
Dell BIOS contains an Improper Restriction of Excessive Authentication Attempts vulnerability. A local authenticated malicious administrator could exploit this vulnerability to bypass excessive NVMe password attempt mitigations in order to carry out a brute force attack.
GHSA-26wr-gh9h-wgmm
An issue was discovered in zzcms 8.2. user/licence_save.php allows remote attackers to delete arbitrary files via directory traversal sequences in the oldimg parameter in an action=modify request. This can be leveraged for database access by deleting install.lock.
GHSA-26wq-535g-r2w5
An issue has been discovered in GitLab EE affecting all versions before 16.8.6, all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. It was possible for an attacker to cause a denial of service using malicious crafted content in a junit test report file.
GHSA-26wp-gwfh-xx5j
A vulnerability was found in ShopXO up to 6.5.0 and classified as problematic. This issue affects some unknown processing of the file header.html. The manipulation of the argument lang/system_type leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
GHSA-26wp-cf2x-v6xh
IBM Cognos Analytics 11.0 and 11.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 176607.
GHSA-26wm-7r96-7phx
an Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker change his subscription plan without paying by making a POST request changing the parameters of the "/demos/embedai/pmt_cash_on_delivery/pay" endpoint.
GHSA-26wj-j8fv-r797
Improper access control in the firmware for the Intel(R) Ethernet I210 Controller series of network adapters before version 3.30 may potentially allow a privileged user to enable a denial of service via local access.
GHSA-26wj-g9q6-7j24
Search engine in Ultraseek 3.1 and 3.1.10 (aka Inktomi Search) allows remote attackers to cause a denial of service via a malformed URL.
GHSA-26wh-hvvw-2vc6
Unspecified vulnerability in the Oracle Data Mining component in Oracle Database 10.2.0.4 allows remote authenticated users to affect confidentiality and integrity, related to DMSYS.DBMS_DM_EXP_INTERNAL.
GHSA-26wh-cc3r-w6pj
canonical/get-workflow-version-action can leak a partial GITHUB_TOKEN in exception output
GHSA-26wh-22xw-qfqx
Flatpak before 1.0.7, and 1.1.x and 1.2.x before 1.2.3, exposes /proc in the apply_extra script sandbox, which allows attackers to modify a host-side executable file.
GHSA-26wg-qj4f-57xc
SQL injection vulnerability in index.php in the sondages module in KwsPHP 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter in a results action, a different module than CVE-2007-4956.2.
GHSA-26wg-3w7j-96gj
Fuji Electric Tellus Lite V-Simulator versions 4.0.12.0 and prior are vulnerable to a stack-based buffer overflow which may allow an attacker to execute arbitrary code.
GHSA-26wf-xmmh-wwqr
Cross-site scripting (XSS) vulnerability in Zenphoto before 1.4.3 allows remote attackers to inject arbitrary web script or HTML by triggering improper interaction with an unspecified library.
GHSA-26wf-vqvv-w3p8
VMware Identity Manager 2.x before 2.7 and vRealize Automation 7.0.x before 7.1 allow local users to obtain root access via unspecified vectors.
GHSA-26wc-mjpc-3f8m
Vulnerability in Realtek RtsPer driver for PCIe Card Reader (RtsPer.sys) before 10.0.22000.21355 and Realtek RtsUer driver for USB Card Reader (RtsUer.sys) before 10.0.22000.31274 leaks driver logs that contain addresses of kernel mode objects, weakening KASLR.
GHSA-26wc-fvf8-2rgq
arch/i386/kernel/sysenter.c in the Virtual Dynamic Shared Objects (vDSO) implementation in the Linux kernel before 2.6.21 does not properly check boundaries, which allows local users to gain privileges or cause a denial of service via unspecified vectors, related to the install_special_mapping, syscall, and syscall32_nopage functions.
GHSA-26wc-3wqp-g3rp
Deserialization of Untrusted Data in Jenkins
GHSA-26w9-85c6-ccr8
An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/addRouting route. This could lead to Command Injection via Shell Metacharacters.
GHSA-26w9-58jr-4jc3
After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-26ww-2c8f-2rgh Dell BIOS contains an Improper Restriction of Excessive Authentication Attempts vulnerability. A local authenticated malicious administrator could exploit this vulnerability to bypass excessive NVMe password attempt mitigations in order to carry out a brute force attack. | 0% Низкий | около 3 лет назад | ||
GHSA-26wr-gh9h-wgmm An issue was discovered in zzcms 8.2. user/licence_save.php allows remote attackers to delete arbitrary files via directory traversal sequences in the oldimg parameter in an action=modify request. This can be leveraged for database access by deleting install.lock. | CVSS3: 7.5 | 1% Низкий | больше 3 лет назад | |
GHSA-26wq-535g-r2w5 An issue has been discovered in GitLab EE affecting all versions before 16.8.6, all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. It was possible for an attacker to cause a denial of service using malicious crafted content in a junit test report file. | CVSS3: 4.3 | 0% Низкий | больше 1 года назад | |
GHSA-26wp-gwfh-xx5j A vulnerability was found in ShopXO up to 6.5.0 and classified as problematic. This issue affects some unknown processing of the file header.html. The manipulation of the argument lang/system_type leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | CVSS3: 4.3 | 0% Низкий | около 1 месяца назад | |
GHSA-26wp-cf2x-v6xh IBM Cognos Analytics 11.0 and 11.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 176607. | 0% Низкий | около 3 лет назад | ||
GHSA-26wm-7r96-7phx an Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker change his subscription plan without paying by making a POST request changing the parameters of the "/demos/embedai/pmt_cash_on_delivery/pay" endpoint. | CVSS3: 7.5 | 0% Низкий | 7 месяцев назад | |
GHSA-26wj-j8fv-r797 Improper access control in the firmware for the Intel(R) Ethernet I210 Controller series of network adapters before version 3.30 may potentially allow a privileged user to enable a denial of service via local access. | 0% Низкий | около 3 лет назад | ||
GHSA-26wj-g9q6-7j24 Search engine in Ultraseek 3.1 and 3.1.10 (aka Inktomi Search) allows remote attackers to cause a denial of service via a malformed URL. | 1% Низкий | больше 3 лет назад | ||
GHSA-26wh-hvvw-2vc6 Unspecified vulnerability in the Oracle Data Mining component in Oracle Database 10.2.0.4 allows remote authenticated users to affect confidentiality and integrity, related to DMSYS.DBMS_DM_EXP_INTERNAL. | 0% Низкий | больше 3 лет назад | ||
GHSA-26wh-cc3r-w6pj canonical/get-workflow-version-action can leak a partial GITHUB_TOKEN in exception output | CVSS3: 8.2 | 0% Низкий | 5 месяцев назад | |
GHSA-26wh-22xw-qfqx Flatpak before 1.0.7, and 1.1.x and 1.2.x before 1.2.3, exposes /proc in the apply_extra script sandbox, which allows attackers to modify a host-side executable file. | CVSS3: 8.2 | 0% Низкий | больше 3 лет назад | |
GHSA-26wg-qj4f-57xc SQL injection vulnerability in index.php in the sondages module in KwsPHP 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter in a results action, a different module than CVE-2007-4956.2. | 0% Низкий | больше 3 лет назад | ||
GHSA-26wg-3w7j-96gj Fuji Electric Tellus Lite V-Simulator versions 4.0.12.0 and prior are vulnerable to a stack-based buffer overflow which may allow an attacker to execute arbitrary code. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
GHSA-26wf-xmmh-wwqr Cross-site scripting (XSS) vulnerability in Zenphoto before 1.4.3 allows remote attackers to inject arbitrary web script or HTML by triggering improper interaction with an unspecified library. | 0% Низкий | больше 3 лет назад | ||
GHSA-26wf-vqvv-w3p8 VMware Identity Manager 2.x before 2.7 and vRealize Automation 7.0.x before 7.1 allow local users to obtain root access via unspecified vectors. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
GHSA-26wc-mjpc-3f8m Vulnerability in Realtek RtsPer driver for PCIe Card Reader (RtsPer.sys) before 10.0.22000.21355 and Realtek RtsUer driver for USB Card Reader (RtsUer.sys) before 10.0.22000.31274 leaks driver logs that contain addresses of kernel mode objects, weakening KASLR. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
GHSA-26wc-fvf8-2rgq arch/i386/kernel/sysenter.c in the Virtual Dynamic Shared Objects (vDSO) implementation in the Linux kernel before 2.6.21 does not properly check boundaries, which allows local users to gain privileges or cause a denial of service via unspecified vectors, related to the install_special_mapping, syscall, and syscall32_nopage functions. | 0% Низкий | больше 3 лет назад | ||
GHSA-26wc-3wqp-g3rp Deserialization of Untrusted Data in Jenkins | CVSS3: 9.8 | 94% Критический | больше 3 лет назад | |
GHSA-26w9-85c6-ccr8 An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/addRouting route. This could lead to Command Injection via Shell Metacharacters. | 29% Средний | около 3 лет назад | ||
GHSA-26w9-58jr-4jc3 After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password. | 1% Низкий | больше 3 лет назад |
Уязвимостей на страницу