Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 314 458

Количество 314 458

github логотип

GHSA-3r3r-7hrm-899h

больше 3 лет назад

Bluetooth module in some Huawei mobile phones with software LON-AL00BC00B229 and earlier versions has a buffer overflow vulnerability. Due to insufficient input validation, an unauthenticated attacker may craft Bluetooth AVDTP/AVCTP messages after successful paring, causing buffer overflow. Successful exploit may cause code execution.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-3r3r-2438-9jg4

почти 4 года назад

Cross-site scripting (XSS) vulnerability in (1) System Consultants La!Cooda WIZ 1.4.0 and earlier and (2) SpaceTag LacoodaST 2.1.3 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly involving upload of files containing XSS sequences.

EPSS: Низкий
github логотип

GHSA-3r3q-9qg7-7937

10 месяцев назад

Missing Authorization vulnerability in Team AtomChat AtomChat allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects AtomChat: from n/a through 1.1.6.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-3r3p-wccj-fg9q

7 месяцев назад

Rejected reason: Not used

EPSS: Низкий
github логотип

GHSA-3r3p-444m-2g4p

около 2 лет назад

EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-3r3m-gpwg-qcg3

больше 3 лет назад

Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.

EPSS: Низкий
github логотип

GHSA-3r3m-77rh-j78q

11 месяцев назад

Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the r_name variable inside the have_same_name function on the /addschedule.htm page.

CVSS3: 4.8
EPSS: Низкий
github логотип

GHSA-3r3j-9m7c-h35g

больше 3 лет назад

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-3r3j-4vrw-884j

7 месяцев назад

files-bucket-server vulnerable to Directory Traversal

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-3r3j-4cc8-xf5f

больше 1 года назад

A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.   This vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-3r3g-prmp-4m5w

больше 3 лет назад

Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE), prior to 14.2 RU2 MP1 and prior to 14.2.5569.2100 respectively, may be susceptible to an arbitrary file write vulnerability, which is a type of issue whereby an attacker is able to overwrite existing files on the resident system without proper privileges.

EPSS: Низкий
github логотип

GHSA-3r3g-g73x-g593

больше 4 лет назад

coreos-installer improperly verifies GPG signature when decompressing gzipped artifact

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-3r3f-mm7w-fqhr

больше 3 лет назад

An issue was discovered in VirusTotal. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-3r3f-hp6h-c44j

больше 3 лет назад

Cross-site scripting (XSS) vulnerability in EMC RSA Certificate Manager (RCM) before 6.9 build 558 and RSA Registration Manager (RRM) before 6.9 build 558 allows remote attackers to inject arbitrary web script or HTML via vectors related to the email address parameter.

EPSS: Низкий
github логотип

GHSA-3r3f-956m-rpvm

11 месяцев назад

Cross-Site Request Forgery (CSRF) vulnerability in bbodine1 cTabs allows Stored XSS. This issue affects cTabs: from n/a through 1.3.

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-3r3f-7rrr-c2h9

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: PCI/PM: Drain runtime-idle callbacks before driver removal A race condition between the .runtime_idle() callback and the .remove() callback in the rtsx_pcr PCI driver leads to a kernel crash due to an unhandled page fault [1]. The problem is that rtsx_pci_runtime_idle() is not expected to be running after pm_runtime_get_sync() has been called, but the latter doesn't really guarantee that. It only guarantees that the suspend and resume callbacks will not be running when it returns. However, if a .runtime_idle() callback is already running when pm_runtime_get_sync() is called, the latter will notice that the runtime PM status of the device is RPM_ACTIVE and it will return right away without waiting for the former to complete. In fact, it cannot wait for .runtime_idle() to complete because it may be called from that callback (it arguably does not make much sense to do that, but it is not strictly prohibited). Th...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-3r3c-xv8w-hfp3

около 4 лет назад

Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 is vulnerable to reflected cross-site scripting attacks. An attacker could inject JavaScript in a GET parameter of HTTP requests and perform unauthorized actions such as stealing internal information and performing actions in context of an authenticated user.

EPSS: Низкий
github логотип

GHSA-3r3c-9579-33c4

больше 3 лет назад

Cross-site request forgery (CSRF) vulnerability in Cisco TelePresence Server software 3.0(2.24) allows remote attackers to hijack the authentication of arbitrary users, aka Bug IDs CSCut63718, CSCut63724, and CSCut63760.

EPSS: Низкий
github логотип

GHSA-3r39-xhjj-cwp2

около 4 лет назад

dbeaver is vulnerable to Improper Restriction of XML External Entity Reference

EPSS: Низкий
github логотип

GHSA-3r39-xffq-r9cc

4 месяца назад

A Use-After-Free (UAF) vulnerability exists in the QuickJS engine's standard library when iterating over the global list of unhandled rejected promises (ts->rejected_promise_list). * The function js_std_promise_rejection_check attempts to iterate over the rejected_promise_list to report unhandled rejections using a standard list loop. * The reason for a promise rejection is processed inside the loop, including calling js_std_dump_error1(ctx, rp->reason). * If the promise rejection reason is an Error object that defines a custom property getter (e.g., via Object.defineProperty), this getter is executed during the error dumping process. * The malicious custom getter can execute JavaScript code that calls catch() on the same rejected promise being processed. * Calling catch() internally triggers js_std_promise_rejection_tracker, which then removes and frees the current promise entry (JSRejectedPromiseEntry) from the rejected_promise_list. * Since the list i...

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-3r3r-7hrm-899h

Bluetooth module in some Huawei mobile phones with software LON-AL00BC00B229 and earlier versions has a buffer overflow vulnerability. Due to insufficient input validation, an unauthenticated attacker may craft Bluetooth AVDTP/AVCTP messages after successful paring, causing buffer overflow. Successful exploit may cause code execution.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-3r3r-2438-9jg4

Cross-site scripting (XSS) vulnerability in (1) System Consultants La!Cooda WIZ 1.4.0 and earlier and (2) SpaceTag LacoodaST 2.1.3 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly involving upload of files containing XSS sequences.

1%
Низкий
почти 4 года назад
github логотип
GHSA-3r3q-9qg7-7937

Missing Authorization vulnerability in Team AtomChat AtomChat allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects AtomChat: from n/a through 1.1.6.

CVSS3: 4.3
0%
Низкий
10 месяцев назад
github логотип
GHSA-3r3p-wccj-fg9q

Rejected reason: Not used

7 месяцев назад
github логотип
GHSA-3r3p-444m-2g4p

EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
github логотип
GHSA-3r3m-gpwg-qcg3

Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-3r3m-77rh-j78q

Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the r_name variable inside the have_same_name function on the /addschedule.htm page.

CVSS3: 4.8
0%
Низкий
11 месяцев назад
github логотип
GHSA-3r3j-9m7c-h35g

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.

CVSS3: 5.9
9%
Низкий
больше 3 лет назад
github логотип
GHSA-3r3j-4vrw-884j

files-bucket-server vulnerable to Directory Traversal

CVSS3: 7.5
0%
Низкий
7 месяцев назад
github логотип
GHSA-3r3j-4cc8-xf5f

A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.   This vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.

CVSS3: 6.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-3r3g-prmp-4m5w

Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE), prior to 14.2 RU2 MP1 and prior to 14.2.5569.2100 respectively, may be susceptible to an arbitrary file write vulnerability, which is a type of issue whereby an attacker is able to overwrite existing files on the resident system without proper privileges.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-3r3g-g73x-g593

coreos-installer improperly verifies GPG signature when decompressing gzipped artifact

CVSS3: 7.8
0%
Низкий
больше 4 лет назад
github логотип
GHSA-3r3f-mm7w-fqhr

An issue was discovered in VirusTotal. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-3r3f-hp6h-c44j

Cross-site scripting (XSS) vulnerability in EMC RSA Certificate Manager (RCM) before 6.9 build 558 and RSA Registration Manager (RRM) before 6.9 build 558 allows remote attackers to inject arbitrary web script or HTML via vectors related to the email address parameter.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-3r3f-956m-rpvm

Cross-Site Request Forgery (CSRF) vulnerability in bbodine1 cTabs allows Stored XSS. This issue affects cTabs: from n/a through 1.3.

CVSS3: 7.1
0%
Низкий
11 месяцев назад
github логотип
GHSA-3r3f-7rrr-c2h9

In the Linux kernel, the following vulnerability has been resolved: PCI/PM: Drain runtime-idle callbacks before driver removal A race condition between the .runtime_idle() callback and the .remove() callback in the rtsx_pcr PCI driver leads to a kernel crash due to an unhandled page fault [1]. The problem is that rtsx_pci_runtime_idle() is not expected to be running after pm_runtime_get_sync() has been called, but the latter doesn't really guarantee that. It only guarantees that the suspend and resume callbacks will not be running when it returns. However, if a .runtime_idle() callback is already running when pm_runtime_get_sync() is called, the latter will notice that the runtime PM status of the device is RPM_ACTIVE and it will return right away without waiting for the former to complete. In fact, it cannot wait for .runtime_idle() to complete because it may be called from that callback (it arguably does not make much sense to do that, but it is not strictly prohibited). Th...

CVSS3: 5.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-3r3c-xv8w-hfp3

Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 is vulnerable to reflected cross-site scripting attacks. An attacker could inject JavaScript in a GET parameter of HTTP requests and perform unauthorized actions such as stealing internal information and performing actions in context of an authenticated user.

0%
Низкий
около 4 лет назад
github логотип
GHSA-3r3c-9579-33c4

Cross-site request forgery (CSRF) vulnerability in Cisco TelePresence Server software 3.0(2.24) allows remote attackers to hijack the authentication of arbitrary users, aka Bug IDs CSCut63718, CSCut63724, and CSCut63760.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-3r39-xhjj-cwp2

dbeaver is vulnerable to Improper Restriction of XML External Entity Reference

0%
Низкий
около 4 лет назад
github логотип
GHSA-3r39-xffq-r9cc

A Use-After-Free (UAF) vulnerability exists in the QuickJS engine's standard library when iterating over the global list of unhandled rejected promises (ts->rejected_promise_list). * The function js_std_promise_rejection_check attempts to iterate over the rejected_promise_list to report unhandled rejections using a standard list loop. * The reason for a promise rejection is processed inside the loop, including calling js_std_dump_error1(ctx, rp->reason). * If the promise rejection reason is an Error object that defines a custom property getter (e.g., via Object.defineProperty), this getter is executed during the error dumping process. * The malicious custom getter can execute JavaScript code that calls catch() on the same rejected promise being processed. * Calling catch() internally triggers js_std_promise_rejection_tracker, which then removes and frees the current promise entry (JSRejectedPromiseEntry) from the rejected_promise_list. * Since the list i...

CVSS3: 8.8
0%
Низкий
4 месяца назад

Уязвимостей на страницу