Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 312 573

Количество 312 573

github логотип

GHSA-3p28-j3wx-qv7m

5 месяцев назад

A security flaw has been discovered in yangzongzhuan RuoYi up to 4.8.1. This impacts the function filterKeyword of the file /com/ruoyi/common/utils/sql/SqlUtil.java of the component Blacklist Handler. The manipulation results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be exploited.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-3p28-g7gh-66v2

больше 3 лет назад

eosfailoverservice.exe in C3-ilex EOScada before 11.0.19.2 allows remote attackers to obtain sensitive cleartext information via a session on TCP port 12000.

EPSS: Низкий
github логотип

GHSA-3p28-c6q8-qwmh

больше 3 лет назад

An elevation of privilege vulnerability exists in the way that the User-Mode Power Service (UMPS) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0934, CVE-2020-0983, CVE-2020-1009, CVE-2020-1011.

EPSS: Средний
github логотип

GHSA-3p28-9cmp-jwr5

больше 3 лет назад

SoPlanning 1.45 is vulnerable to SQL Injection in the OrderBy clause, as demonstrated by the projets.php?order=nom_createur&by= substring.

EPSS: Низкий
github логотип

GHSA-3p28-7652-rrq5

больше 3 лет назад

In Edge Client version 7.2.x before 7.2.1.1, 7.1.9.x before 7.1.9.8, and 7.1.x-7.1.8.x before 7.1.8.5, an untrusted search path vulnerability in the BIG-IP APM Client Troubleshooting Utility (CTU) for Windows could allow an attacker to load a malicious DLL library from its current directory. User interaction is required to exploit this vulnerability in that the victim must run this utility on the Windows system. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

EPSS: Низкий
github логотип

GHSA-3p27-9p9g-q639

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: usb: xhci-mtk: fix leakage of shared hcd when fail to set wakeup irq Can not set the @shared_hcd to NULL before decrease the usage count by usb_put_hcd(), this will cause the shared hcd not released.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-3p27-5462-4944

больше 3 лет назад

The safe-editor plugin before 1.2 for WordPress has no se_save authentication, with resultant XSS.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-3p27-3cv2-hrjm

почти 4 года назад

Directory traversal vulnerability in ContentServer.py in the Wiki Server in Apple Mac OS X 10.5.2 (aka Leopard) allows remote authenticated users to write arbitrary files via ".." sequences in file attachments.

EPSS: Низкий
github логотип

GHSA-3p26-86g2-9m7p

больше 3 лет назад

The DivFixppCore::avi_header_fix function in DivFix++Core.cpp in DivFix++ v0.34 allows remote attackers to cause a denial of service (invalid memory write and application crash) via a crafted avi file.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-3p26-6f92-v9vg

около 3 лет назад

In face detect driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-3p26-2mwr-qg2w

больше 3 лет назад

Genie Access WIP3BVAF WISH IP 3MP IR Auto Focus Bullet Camera devices through 3.x are vulnerable to directory traversal via the web interface, as demonstrated by reading /etc/shadow. NOTE: this product is discontinued, and its final firmware version has this vulnerability (4.x versions exist only for other Genie Access products).

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-3p25-cqr2-3jg2

больше 1 года назад

A flaw was found in Event-Driven Automation (EDA) in Ansible Automation Platform (AAP), which lacks encryption of sensitive information. An attacker with network access could exploit this vulnerability by sniffing the plaintext data transmitted between the EDA and AAP. An attacker with system access could exploit this vulnerability by reading the plaintext data stored in EDA and AAP databases.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-3p24-qq22-3v59

больше 3 лет назад

Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

EPSS: Высокий
github логотип

GHSA-3p24-p4jg-q3pq

больше 3 лет назад

An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (with TEEGRIS) software. The Esecomm Trustlet allows a stack overflow and arbitrary code execution. The Samsung ID is SVE-2019-15984 (February 2020).

EPSS: Низкий
github логотип

GHSA-3p24-gwpr-5f2q

почти 4 года назад

The file server in ActivePost Standard 3.1 and earlier allows remote authenticated users to obtain sensitive information by uploading a file, which reveals the path in a success message.

EPSS: Низкий
github логотип

GHSA-3p24-fq2f-mhqw

8 месяцев назад

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Marchetti Design Next Event Calendar allows Stored XSS. This issue affects Next Event Calendar: from n/a through 1.2.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-3p24-8mw5-x2hx

7 месяцев назад

Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer underflow, in mbedtls_pem_read_buffer and two mbedtls_pk_parse functions, via untrusted PEM input.

CVSS3: 4.8
EPSS: Низкий
github логотип

GHSA-3p23-x5x3-gwjm

больше 3 лет назад

Logout mechanism in SAP Disclosure Management, version 10.1, does not invalidate one of the session cookies, leading to Insufficient Session Expiration.

EPSS: Низкий
github логотип

GHSA-3p23-jfm6-493m

почти 4 года назад

This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-3p22-ghq8-v749

почти 4 года назад

Renderers can obtain access to random bluetooth device without permission in Electron

CVSS3: 3.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-3p28-j3wx-qv7m

A security flaw has been discovered in yangzongzhuan RuoYi up to 4.8.1. This impacts the function filterKeyword of the file /com/ruoyi/common/utils/sql/SqlUtil.java of the component Blacklist Handler. The manipulation results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be exploited.

CVSS3: 6.3
0%
Низкий
5 месяцев назад
github логотип
GHSA-3p28-g7gh-66v2

eosfailoverservice.exe in C3-ilex EOScada before 11.0.19.2 allows remote attackers to obtain sensitive cleartext information via a session on TCP port 12000.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-3p28-c6q8-qwmh

An elevation of privilege vulnerability exists in the way that the User-Mode Power Service (UMPS) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0934, CVE-2020-0983, CVE-2020-1009, CVE-2020-1011.

13%
Средний
больше 3 лет назад
github логотип
GHSA-3p28-9cmp-jwr5

SoPlanning 1.45 is vulnerable to SQL Injection in the OrderBy clause, as demonstrated by the projets.php?order=nom_createur&by= substring.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-3p28-7652-rrq5

In Edge Client version 7.2.x before 7.2.1.1, 7.1.9.x before 7.1.9.8, and 7.1.x-7.1.8.x before 7.1.8.5, an untrusted search path vulnerability in the BIG-IP APM Client Troubleshooting Utility (CTU) for Windows could allow an attacker to load a malicious DLL library from its current directory. User interaction is required to exploit this vulnerability in that the victim must run this utility on the Windows system. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-3p27-9p9g-q639

In the Linux kernel, the following vulnerability has been resolved: usb: xhci-mtk: fix leakage of shared hcd when fail to set wakeup irq Can not set the @shared_hcd to NULL before decrease the usage count by usb_put_hcd(), this will cause the shared hcd not released.

CVSS3: 5.5
0%
Низкий
5 месяцев назад
github логотип
GHSA-3p27-5462-4944

The safe-editor plugin before 1.2 for WordPress has no se_save authentication, with resultant XSS.

CVSS3: 6.1
1%
Низкий
больше 3 лет назад
github логотип
GHSA-3p27-3cv2-hrjm

Directory traversal vulnerability in ContentServer.py in the Wiki Server in Apple Mac OS X 10.5.2 (aka Leopard) allows remote authenticated users to write arbitrary files via ".." sequences in file attachments.

3%
Низкий
почти 4 года назад
github логотип
GHSA-3p26-86g2-9m7p

The DivFixppCore::avi_header_fix function in DivFix++Core.cpp in DivFix++ v0.34 allows remote attackers to cause a denial of service (invalid memory write and application crash) via a crafted avi file.

CVSS3: 5.5
3%
Низкий
больше 3 лет назад
github логотип
GHSA-3p26-6f92-v9vg

In face detect driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.

CVSS3: 5.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-3p26-2mwr-qg2w

Genie Access WIP3BVAF WISH IP 3MP IR Auto Focus Bullet Camera devices through 3.x are vulnerable to directory traversal via the web interface, as demonstrated by reading /etc/shadow. NOTE: this product is discontinued, and its final firmware version has this vulnerability (4.x versions exist only for other Genie Access products).

CVSS3: 7.5
61%
Средний
больше 3 лет назад
github логотип
GHSA-3p25-cqr2-3jg2

A flaw was found in Event-Driven Automation (EDA) in Ansible Automation Platform (AAP), which lacks encryption of sensitive information. An attacker with network access could exploit this vulnerability by sniffing the plaintext data transmitted between the EDA and AAP. An attacker with system access could exploit this vulnerability by reading the plaintext data stored in EDA and AAP databases.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-3p24-qq22-3v59

Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

83%
Высокий
больше 3 лет назад
github логотип
GHSA-3p24-p4jg-q3pq

An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (with TEEGRIS) software. The Esecomm Trustlet allows a stack overflow and arbitrary code execution. The Samsung ID is SVE-2019-15984 (February 2020).

0%
Низкий
больше 3 лет назад
github логотип
GHSA-3p24-gwpr-5f2q

The file server in ActivePost Standard 3.1 and earlier allows remote authenticated users to obtain sensitive information by uploading a file, which reveals the path in a success message.

0%
Низкий
почти 4 года назад
github логотип
GHSA-3p24-fq2f-mhqw

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Marchetti Design Next Event Calendar allows Stored XSS. This issue affects Next Event Calendar: from n/a through 1.2.

CVSS3: 5.9
0%
Низкий
8 месяцев назад
github логотип
GHSA-3p24-8mw5-x2hx

Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer underflow, in mbedtls_pem_read_buffer and two mbedtls_pk_parse functions, via untrusted PEM input.

CVSS3: 4.8
0%
Низкий
7 месяцев назад
github логотип
GHSA-3p23-x5x3-gwjm

Logout mechanism in SAP Disclosure Management, version 10.1, does not invalidate one of the session cookies, leading to Insufficient Session Expiration.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-3p23-jfm6-493m

This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191.

CVSS3: 7.8
0%
Низкий
почти 4 года назад
github логотип
GHSA-3p22-ghq8-v749

Renderers can obtain access to random bluetooth device without permission in Electron

CVSS3: 3.4
1%
Низкий
почти 4 года назад

Уязвимостей на страницу