Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 314 458

Количество 314 458

github логотип

GHSA-3q5p-3558-364f

больше 2 лет назад

Fiber unauthorized access vulnerability in `ctx.IsFromLocal()`

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-3q5m-9r3g-pqfj

больше 2 лет назад

An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers when removing fake Authentication-Results header fields, which allows a remote attacker to craft an e-mail message with a fake sender address such that programs that rely on Authentication-Results from OpenDKIM will treat the message as having a valid DKIM signature when in fact it has none.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-3q5j-q7m3-mpx2

больше 3 лет назад

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.

EPSS: Низкий
github логотип

GHSA-3q5j-fh9m-jf9q

почти 4 года назад

Cross-site scripting (XSS) vulnerability in Safari in Apple iPhone 1.1.1, and Safari 3 before Beta Update 3.0.4 on Windows and Mac OS X 10.4 through 10.4.10, allows remote attackers to inject arbitrary web script or HTML via frame tags.

EPSS: Низкий
github логотип

GHSA-3q5h-r4qp-qqcg

около 2 лет назад

Malicious Code Execution Vulnerability due to External Control of File Name or Path in multiple Mitsubishi Electric FA Engineering Software Products allows a malicious attacker to execute a malicious code by having legitimate users open a specially crafted project file, which could result in information disclosure, tampering and deletion, or a denial-of-service (DoS) condition.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-3q5h-jx74-65fh

10 месяцев назад

Memory corruption while processing IOCTL calls to add route entry in the HW.

CVSS3: 6.6
EPSS: Низкий
github логотип

GHSA-3q5h-7hjh-52j2

около 3 лет назад

The SmartTrimProcessEvent module has a vulnerability of obtaining the read and write permissions on arbitrary system files. Successful exploitation of this vulnerability may affect data confidentiality.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-3q5g-jw35-qh3g

около 1 года назад

SQL Server Native Client Remote Code Execution Vulnerability

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-3q59-p3w9-wv54

больше 3 лет назад

themegrill-demo-importer before 1.6.2 does not require authentication for wiping the database, because of a reset_wizard_actions hook.

EPSS: Средний
github логотип

GHSA-3q59-h5wv-vgcg

больше 3 лет назад

XML injection vulnerability exists in the file of DedeCMS V5.7 SP2 version, which can be utilized by attackers to create script file to obtain webshell

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-3q59-83xj-cggf

больше 3 лет назад

A remote unauthorized read access to files vulnerability was discovered in Aruba Instant version(s): 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.19 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below; Aruba Instant 8.8.x.x: 8.8.0.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-3q58-x954-3hw4

почти 4 года назад

readline prior to 4.1, in OpenBSD 2.8 and earlier, creates history files with insecure permissions, which allows a local attacker to recover potentially sensitive information via readline history files.

EPSS: Низкий
github логотип

GHSA-3q58-fh6p-m7jw

почти 4 года назад

PHP remote file include vulnerability in functions_admin.php in Virtual War (VWar) 1.5.0 R10 allows remote attackers to include and execute arbitrary PHP code via unspecified attack vectors. NOTE: this issue has been referred to as XSS, but it is clear from the vendor description that it is a file inclusion problem.

EPSS: Низкий
github логотип

GHSA-3q58-8ch7-h333

больше 3 лет назад

A flaw was found in noobaa-operator in versions before 5.7.0, where internal RPC AuthTokens between the noobaa operator and the noobaa core are leaked into log files. An attacker with access to the log files could use this AuthToken to gain additional access into noobaa deployment and can read/modify system configuration.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-3q57-72xr-mr5m

больше 3 лет назад

An input validation issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An application may be able to gain elevated privileges.

EPSS: Низкий
github логотип

GHSA-3q56-mvp8-x9j4

почти 4 года назад

A heap-based buffer overflow vulnerability exists in the readDatHeadVec functionality of AnyCubic Chitubox AnyCubic Plugin 1.0.0. A specially-crafted GF file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-3q56-9cc2-46j4

больше 1 года назад

robinweser fast-loops vulnerable to prototype pollution

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-3q55-c9p4-pq2p

около 2 лет назад

The Syrus4 IoT gateway utilizes an unsecured MQTT server to download and execute arbitrary commands, allowing a remote unauthenticated attacker to execute code on any Syrus4 device connected to the cloud service. The MQTT server also leaks the location, video and diagnostic data from each connected device. An attacker who knows the IP address of the server is able to connect and perform the following operations: * Get location data of the vehicle the device is connected to * Send CAN bus messages via the ECU module ( https://syrus.digitalcomtech.com/docs/ecu-1 https://syrus.digitalcomtech.com/docs/ecu-1 ) * Immobilize the vehicle via the safe-immobilizer module ( https://syrus.digitalcomtech.com/docs/system-tools#safe-immobilization https://syrus.digitalcomtech.com/docs/system-tools#safe-immobilization ) * Get live video through the connected video camera * Send audio messages to the driver ( https://syrus.digitalcomtech.com/docs/system-tools#apx-tts https://syrus...

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-3q55-66g3-p8xq

почти 4 года назад

Cross-site Scripting in microweber

CVSS3: 4.8
EPSS: Низкий
github логотип

GHSA-3q54-c9pf-r635

почти 4 года назад

SQL injection vulnerability in the loginUser function in the XMLRPC server in XOOPS 2.0.11 and earlier allows remote attackers to execute arbitrary SQL commands and bypass authentication via crafted values in an XML file, as demonstrated using the blogger.getPost method.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-3q5p-3558-364f

Fiber unauthorized access vulnerability in `ctx.IsFromLocal()`

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-3q5m-9r3g-pqfj

An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers when removing fake Authentication-Results header fields, which allows a remote attacker to craft an e-mail message with a fake sender address such that programs that rely on Authentication-Results from OpenDKIM will treat the message as having a valid DKIM signature when in fact it has none.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-3q5j-q7m3-mpx2

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-3q5j-fh9m-jf9q

Cross-site scripting (XSS) vulnerability in Safari in Apple iPhone 1.1.1, and Safari 3 before Beta Update 3.0.4 on Windows and Mac OS X 10.4 through 10.4.10, allows remote attackers to inject arbitrary web script or HTML via frame tags.

1%
Низкий
почти 4 года назад
github логотип
GHSA-3q5h-r4qp-qqcg

Malicious Code Execution Vulnerability due to External Control of File Name or Path in multiple Mitsubishi Electric FA Engineering Software Products allows a malicious attacker to execute a malicious code by having legitimate users open a specially crafted project file, which could result in information disclosure, tampering and deletion, or a denial-of-service (DoS) condition.

CVSS3: 7.8
0%
Низкий
около 2 лет назад
github логотип
GHSA-3q5h-jx74-65fh

Memory corruption while processing IOCTL calls to add route entry in the HW.

CVSS3: 6.6
0%
Низкий
10 месяцев назад
github логотип
GHSA-3q5h-7hjh-52j2

The SmartTrimProcessEvent module has a vulnerability of obtaining the read and write permissions on arbitrary system files. Successful exploitation of this vulnerability may affect data confidentiality.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-3q5g-jw35-qh3g

SQL Server Native Client Remote Code Execution Vulnerability

CVSS3: 8.8
4%
Низкий
около 1 года назад
github логотип
GHSA-3q59-p3w9-wv54

themegrill-demo-importer before 1.6.2 does not require authentication for wiping the database, because of a reset_wizard_actions hook.

50%
Средний
больше 3 лет назад
github логотип
GHSA-3q59-h5wv-vgcg

XML injection vulnerability exists in the file of DedeCMS V5.7 SP2 version, which can be utilized by attackers to create script file to obtain webshell

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-3q59-83xj-cggf

A remote unauthorized read access to files vulnerability was discovered in Aruba Instant version(s): 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.19 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below; Aruba Instant 8.8.x.x: 8.8.0.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-3q58-x954-3hw4

readline prior to 4.1, in OpenBSD 2.8 and earlier, creates history files with insecure permissions, which allows a local attacker to recover potentially sensitive information via readline history files.

0%
Низкий
почти 4 года назад
github логотип
GHSA-3q58-fh6p-m7jw

PHP remote file include vulnerability in functions_admin.php in Virtual War (VWar) 1.5.0 R10 allows remote attackers to include and execute arbitrary PHP code via unspecified attack vectors. NOTE: this issue has been referred to as XSS, but it is clear from the vendor description that it is a file inclusion problem.

1%
Низкий
почти 4 года назад
github логотип
GHSA-3q58-8ch7-h333

A flaw was found in noobaa-operator in versions before 5.7.0, where internal RPC AuthTokens between the noobaa operator and the noobaa core are leaked into log files. An attacker with access to the log files could use this AuthToken to gain additional access into noobaa deployment and can read/modify system configuration.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-3q57-72xr-mr5m

An input validation issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An application may be able to gain elevated privileges.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-3q56-mvp8-x9j4

A heap-based buffer overflow vulnerability exists in the readDatHeadVec functionality of AnyCubic Chitubox AnyCubic Plugin 1.0.0. A specially-crafted GF file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 7.8
0%
Низкий
почти 4 года назад
github логотип
GHSA-3q56-9cc2-46j4

robinweser fast-loops vulnerable to prototype pollution

CVSS3: 7.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-3q55-c9p4-pq2p

The Syrus4 IoT gateway utilizes an unsecured MQTT server to download and execute arbitrary commands, allowing a remote unauthenticated attacker to execute code on any Syrus4 device connected to the cloud service. The MQTT server also leaks the location, video and diagnostic data from each connected device. An attacker who knows the IP address of the server is able to connect and perform the following operations: * Get location data of the vehicle the device is connected to * Send CAN bus messages via the ECU module ( https://syrus.digitalcomtech.com/docs/ecu-1 https://syrus.digitalcomtech.com/docs/ecu-1 ) * Immobilize the vehicle via the safe-immobilizer module ( https://syrus.digitalcomtech.com/docs/system-tools#safe-immobilization https://syrus.digitalcomtech.com/docs/system-tools#safe-immobilization ) * Get live video through the connected video camera * Send audio messages to the driver ( https://syrus.digitalcomtech.com/docs/system-tools#apx-tts https://syrus...

CVSS3: 10
2%
Низкий
около 2 лет назад
github логотип
GHSA-3q55-66g3-p8xq

Cross-site Scripting in microweber

CVSS3: 4.8
0%
Низкий
почти 4 года назад
github логотип
GHSA-3q54-c9pf-r635

SQL injection vulnerability in the loginUser function in the XMLRPC server in XOOPS 2.0.11 and earlier allows remote attackers to execute arbitrary SQL commands and bypass authentication via crafted values in an XML file, as demonstrated using the blogger.getPost method.

1%
Низкий
почти 4 года назад

Уязвимостей на страницу