Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 314 458

Количество 314 458

github логотип

GHSA-3pcq-f86j-jh8q

больше 3 лет назад

An issue was discovered in tnef before 1.4.13. Four type confusions have been identified in the file_add_mapi_attrs() function. These might lead to invalid read and write operations, controlled by an attacker.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-3pcq-5mc6-8j3p

больше 3 лет назад

In Tuxera NTFS-3G versions < 2021.8.22, a stack buffer overflow can occur when correcting differences in the MFT and MFTMirror allowing for code execution or escalation of privileges when setuid-root.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-3pcq-34w5-p4g2

больше 4 лет назад

modern-async's `forEachSeries` and `forEachLimit` functions do not limit the number of requests

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-3pcq-2643-8rg5

больше 3 лет назад

In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146428941

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-3pcp-j82c-wg8v

почти 3 года назад

In _ufdt_output_node_to_fdt of ufdt_convert.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-248085351

CVSS3: 4.4
EPSS: Низкий
github логотип

GHSA-3pcg-mr9h-79cf

8 месяцев назад

ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to SQL injections which could allow an attacker to leak arbitrary information and insert arbitrary SQL syntax into SQL queries.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-3pcg-3m3w-7636

больше 1 года назад

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dinesh Karki WP Armour Extended.This issue affects WP Armour Extended: from n/a through 1.26.

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-3pcg-2h4x-7rx6

6 месяцев назад

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Schiocco Support Board allows Reflected XSS. This issue affects Support Board: from n/a through 3.8.0.

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-3pc9-28mv-95h3

больше 3 лет назад

Multiple cross-site scripting vulnerabilities in Webmin versions prior to 1.830 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-3pc8-q9qj-vmvc

7 месяцев назад

Classic buffer overflow in certain Zoom Clients for Windows may allow an authorized user to conduct a denial of service via network access.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-3pc8-hwcr-cqrw

больше 1 года назад

An out-of-bounds write in the engine module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS allows a malformed Mach-O file to crash the application during file processing.

CVSS3: 5.1
EPSS: Низкий
github логотип

GHSA-3pc8-5mmp-rgj7

почти 4 года назад

Microsoft Outlook 2000 and 2003, when configured to use Microsoft Word 2000 or 2003 as the e-mail editor and when forwarding e-mail, does not properly handle an opening OBJECT tag that does not have a closing OBJECT tag, which causes Outlook to automatically download the URI in the data property of the OBJECT tag and might allow remote attackers to execute arbitrary code.

EPSS: Средний
github логотип

GHSA-3pc7-c3mc-73r6

около 1 года назад

By default, dedicated folders of CRYHOD for Windows up to 2024.3 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of CRYHOD has to be modified to prevent this vulnerability.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-3pc5-rvw8-v64m

7 месяцев назад

The Honeywell Experion PKS and OneWireless WDM contains Sensitive Information in Resource vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in buffer reuse which may cause incorrect system behavior. Honeywell also recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.  The affected Experion PKS products are C300, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are 520.1 before 520.2 TCU9 HF1 and 530 before 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-3pc4-w649-6gv6

больше 3 лет назад

System Server in Android 6.0 before 2015-12-01 allows attackers to obtain sensitive information and consequently gain privileges via a crafted application, aka internal bug 23936840.

EPSS: Низкий
github логотип

GHSA-3pc4-pj89-2j67

почти 4 года назад

A Reliance on Untrusted Inputs in a Security Decision vulnerability in the login proxy of the openSUSE Build service allowed attackers to present users with a expected login form that then sends the clear text credentials to an attacker specified server. This issue affects: openSUSE Build service login-proxy-scripts versions prior to dc000cdfe9b9b715fb92195b1a57559362f689ef.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-3pc4-7j85-539h

почти 4 года назад

The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the attacker to compute the corresponding private key and use the target's Session ID with the compromised key pair to masquerade as the target.

EPSS: Низкий
github логотип

GHSA-3pc3-xxxx-7pfj

6 месяцев назад

A security flaw has been discovered in Open5GS up to 2.7.5. The impacted element is the function gmm_state_exception of the file src/amf/gmm-sm.c. The manipulation results in reachable assertion. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited. The patch is identified as 8e5fed16114f2f5e40bee1b161914b592b2b7b8f. Applying a patch is advised to resolve this issue.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-3pc3-vcqg-prf6

больше 1 года назад

A deserialization of untrusted data vulnerability exists in NI VeriStand DataLogging Server that may result in remote code execution. Successful exploitation requires an attacker to send a specially crafted message. These vulnerabilities affect NI VeriStand 2024 Q2 and prior versions.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-3pc3-p9j7-xvq6

больше 1 года назад

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the "admin" or "power" Splunk roles could change the maintenance mode state of App Key Value Store (KVStore) through a Cross-Site Request Forgery (CSRF).

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-3pcq-f86j-jh8q

An issue was discovered in tnef before 1.4.13. Four type confusions have been identified in the file_add_mapi_attrs() function. These might lead to invalid read and write operations, controlled by an attacker.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-3pcq-5mc6-8j3p

In Tuxera NTFS-3G versions < 2021.8.22, a stack buffer overflow can occur when correcting differences in the MFT and MFTMirror allowing for code execution or escalation of privileges when setuid-root.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-3pcq-34w5-p4g2

modern-async's `forEachSeries` and `forEachLimit` functions do not limit the number of requests

CVSS3: 7.5
0%
Низкий
больше 4 лет назад
github логотип
GHSA-3pcq-2643-8rg5

In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146428941

CVSS3: 7.5
11%
Средний
больше 3 лет назад
github логотип
GHSA-3pcp-j82c-wg8v

In _ufdt_output_node_to_fdt of ufdt_convert.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-248085351

CVSS3: 4.4
0%
Низкий
почти 3 года назад
github логотип
GHSA-3pcg-mr9h-79cf

ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to SQL injections which could allow an attacker to leak arbitrary information and insert arbitrary SQL syntax into SQL queries.

CVSS3: 9.1
0%
Низкий
8 месяцев назад
github логотип
GHSA-3pcg-3m3w-7636

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dinesh Karki WP Armour Extended.This issue affects WP Armour Extended: from n/a through 1.26.

CVSS3: 7.1
1%
Низкий
больше 1 года назад
github логотип
GHSA-3pcg-2h4x-7rx6

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Schiocco Support Board allows Reflected XSS. This issue affects Support Board: from n/a through 3.8.0.

CVSS3: 7.1
0%
Низкий
6 месяцев назад
github логотип
GHSA-3pc9-28mv-95h3

Multiple cross-site scripting vulnerabilities in Webmin versions prior to 1.830 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-3pc8-q9qj-vmvc

Classic buffer overflow in certain Zoom Clients for Windows may allow an authorized user to conduct a denial of service via network access.

CVSS3: 6.5
0%
Низкий
7 месяцев назад
github логотип
GHSA-3pc8-hwcr-cqrw

An out-of-bounds write in the engine module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS allows a malformed Mach-O file to crash the application during file processing.

CVSS3: 5.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-3pc8-5mmp-rgj7

Microsoft Outlook 2000 and 2003, when configured to use Microsoft Word 2000 or 2003 as the e-mail editor and when forwarding e-mail, does not properly handle an opening OBJECT tag that does not have a closing OBJECT tag, which causes Outlook to automatically download the URI in the data property of the OBJECT tag and might allow remote attackers to execute arbitrary code.

21%
Средний
почти 4 года назад
github логотип
GHSA-3pc7-c3mc-73r6

By default, dedicated folders of CRYHOD for Windows up to 2024.3 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of CRYHOD has to be modified to prevent this vulnerability.

CVSS3: 7.8
0%
Низкий
около 1 года назад
github логотип
GHSA-3pc5-rvw8-v64m

The Honeywell Experion PKS and OneWireless WDM contains Sensitive Information in Resource vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in buffer reuse which may cause incorrect system behavior. Honeywell also recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.  The affected Experion PKS products are C300, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are 520.1 before 520.2 TCU9 HF1 and 530 before 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.

CVSS3: 6.5
0%
Низкий
7 месяцев назад
github логотип
GHSA-3pc4-w649-6gv6

System Server in Android 6.0 before 2015-12-01 allows attackers to obtain sensitive information and consequently gain privileges via a crafted application, aka internal bug 23936840.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-3pc4-pj89-2j67

A Reliance on Untrusted Inputs in a Security Decision vulnerability in the login proxy of the openSUSE Build service allowed attackers to present users with a expected login form that then sends the clear text credentials to an attacker specified server. This issue affects: openSUSE Build service login-proxy-scripts versions prior to dc000cdfe9b9b715fb92195b1a57559362f689ef.

CVSS3: 8.8
0%
Низкий
почти 4 года назад
github логотип
GHSA-3pc4-7j85-539h

The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the attacker to compute the corresponding private key and use the target's Session ID with the compromised key pair to masquerade as the target.

5%
Низкий
почти 4 года назад
github логотип
GHSA-3pc3-xxxx-7pfj

A security flaw has been discovered in Open5GS up to 2.7.5. The impacted element is the function gmm_state_exception of the file src/amf/gmm-sm.c. The manipulation results in reachable assertion. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited. The patch is identified as 8e5fed16114f2f5e40bee1b161914b592b2b7b8f. Applying a patch is advised to resolve this issue.

CVSS3: 5.3
0%
Низкий
6 месяцев назад
github логотип
GHSA-3pc3-vcqg-prf6

A deserialization of untrusted data vulnerability exists in NI VeriStand DataLogging Server that may result in remote code execution. Successful exploitation requires an attacker to send a specially crafted message. These vulnerabilities affect NI VeriStand 2024 Q2 and prior versions.

CVSS3: 9.8
6%
Низкий
больше 1 года назад
github логотип
GHSA-3pc3-p9j7-xvq6

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the "admin" or "power" Splunk roles could change the maintenance mode state of App Key Value Store (KVStore) through a Cross-Site Request Forgery (CSRF).

CVSS3: 4.3
0%
Низкий
больше 1 года назад

Уязвимостей на страницу