Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 289 031

Количество 289 031

github логотип

GHSA-2252-2x7m-w7r8

около 3 лет назад

Heap-based buffer overflow in the ms_escher_get_data function in plugins/excel/ms-escher.c in GNOME Office Gnumeric before 1.12.9 allows remote attackers to cause a denial of service (crash) via a crafted xls file with a crafted length value.

EPSS: Низкий
github логотип

GHSA-224x-44xc-3gcf

6 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
github логотип

GHSA-224v-g4hw-hwxj

больше 3 лет назад

Multiple buffer overflows in Tomahawk SteelArrow before 4.5 allow remote attackers to execute arbitrary code via (1) the Steelarrow Service (Steelarrow.exe) using a long UserIdent Cookie header, (2) DLLHOST.EXE (Steelarrow.dll) via a request for a long .aro file, or (3) DLLHOST.EXE via a Chunked Transfer-Encoding request.

EPSS: Низкий
github логотип

GHSA-224v-7q6x-2x5f

около 3 лет назад

Certain TP-Link devices allow Command Injection. This affects NC200 2.1.9 build 200225, NC210 1.0.9 build 200304, NC220 1.3.0 build 200304, NC230 1.3.0 build 200304, NC250 1.3.0 build 200304, NC260 1.5.2 build 200304, and NC450 1.5.3 build 200304.

CVSS3: 8.8
EPSS: Высокий
github логотип

GHSA-224v-6x99-6pp7

около 3 лет назад

In Progress MOVEit Transfer 10.2 before 10.2.6 (2018.3), 11.0 before 11.0.4 (2019.0.4), and 11.1 before 11.1.3 (2019.1.3), multiple SQL Injection vulnerabilities have been found in the REST API that could allow an unauthenticated attacker to gain unauthorized access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database or may be able to alter the database.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-224p-qx2h-m4rg

около 3 лет назад

A SQL injection vulnerability in /oa.php?c=Staff&a=read of Find a Place LJCMS v 1.3 allows attackers to access sensitive database information via a crafted POST request.

EPSS: Низкий
github логотип

GHSA-224p-qr6q-c376

больше 3 лет назад

Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Microsoft Browser ASLR Bypass."

EPSS: Средний
github логотип

GHSA-224p-h66f-prf2

около 2 лет назад

Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-224m-8wrv-4v8r

больше 3 лет назад

Mozilla Firefox 3.0.19, 3.5.x, and 3.6.x allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid (1) news:// or (2) nntp:// URIs.

EPSS: Низкий
github логотип

GHSA-224m-5fj7-xcf7

около 3 лет назад

Windows Remote Desktop Protocol Core Security Feature Bypass Vulnerability

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-224j-3632-5gqr

около 3 лет назад

The Jetpack Scan team identified a Reflected Cross-Site Scripting via the patreon_save_attachment_patreon_level AJAX action of the Patreon WordPress plugin before 1.7.2. This AJAX hook is used to update the pledge level required by Patreon subscribers to access a given attachment. This action is accessible for user accounts with the ‘manage_options’ privilege (i.e.., only administrators). Unfortunately, one of the parameters used in this AJAX endpoint is not sanitized before being printed back to the user, so the risk it represents is the same as the previous XSS vulnerability.

EPSS: Низкий
github логотип

GHSA-224h-vf26-wvfw

8 месяцев назад

The password change function at /cgi/admin.cgi does not require the current/old password, which makes the application vulnerable to account takeover. An attacker can use this to forcefully set a new password within the -rsetpass+-aaction+- parameter for a user without knowing the old password, e.g. by exploiting a CSRF issue.

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-224h-p7p5-rh85

почти 5 лет назад

Directory Traversal in wenluhong1

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-224h-mqw6-642p

больше 3 лет назад

The WP Statistics WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the browser parameter found in the ~/includes/class-wp-statistics-visitor.php file which allows attackers to inject arbitrary web scripts onto several pages that execute when site administrators view a sites statistics, in versions up to and including 13.1.5.

EPSS: Низкий
github логотип

GHSA-224h-m2mg-r929

10 месяцев назад

DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-224g-q27w-pv8f

больше 3 лет назад

Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-224g-5gvw-3m56

около 3 лет назад

A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.1 allows attackers to cause a denial of service via commands that attempt to launch a grid without previously providing a Compute Shader (CS).

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-224f-2jgg-f9vc

около 3 лет назад

Unspecified vulnerability in a SOAP feature in HP SiteScope 11.10 through 11.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1461.

EPSS: Средний
github логотип

GHSA-224c-qxxc-fqx7

больше 3 лет назад

login in util-linux-2.12a skips pam_acct_mgmt and chauth_tok when authentication is skipped, such as when a Kerberos krlogin session has been established, which might allow users to bypass intended access policies that would be enforced by pam_acct_mgmt and chauth_tok.

EPSS: Низкий
github логотип

GHSA-2249-qr5p-5wfx

больше 3 лет назад

Unspecified vulnerability in Oracle Database Server 9.2.0.7, Application Server 9.0.4.2 and 10.1.2.1, Collaboration Suite Release 2, version 9.0.4.2 (Oracle9i), and E-Business Suite and Applications 11.5.10 has unspecified impact and attack vectors, as identified by Oracle Vuln# WF01 in the Oracle Workflow Cartridge component.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-2252-2x7m-w7r8

Heap-based buffer overflow in the ms_escher_get_data function in plugins/excel/ms-escher.c in GNOME Office Gnumeric before 1.12.9 allows remote attackers to cause a denial of service (crash) via a crafted xls file with a crafted length value.

1%
Низкий
около 3 лет назад
github логотип
GHSA-224x-44xc-3gcf

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

6 месяцев назад
github логотип
GHSA-224v-g4hw-hwxj

Multiple buffer overflows in Tomahawk SteelArrow before 4.5 allow remote attackers to execute arbitrary code via (1) the Steelarrow Service (Steelarrow.exe) using a long UserIdent Cookie header, (2) DLLHOST.EXE (Steelarrow.dll) via a request for a long .aro file, or (3) DLLHOST.EXE via a Chunked Transfer-Encoding request.

6%
Низкий
больше 3 лет назад
github логотип
GHSA-224v-7q6x-2x5f

Certain TP-Link devices allow Command Injection. This affects NC200 2.1.9 build 200225, NC210 1.0.9 build 200304, NC220 1.3.0 build 200304, NC230 1.3.0 build 200304, NC250 1.3.0 build 200304, NC260 1.5.2 build 200304, and NC450 1.5.3 build 200304.

CVSS3: 8.8
83%
Высокий
около 3 лет назад
github логотип
GHSA-224v-6x99-6pp7

In Progress MOVEit Transfer 10.2 before 10.2.6 (2018.3), 11.0 before 11.0.4 (2019.0.4), and 11.1 before 11.1.3 (2019.1.3), multiple SQL Injection vulnerabilities have been found in the REST API that could allow an unauthenticated attacker to gain unauthorized access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database or may be able to alter the database.

CVSS3: 9.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-224p-qx2h-m4rg

A SQL injection vulnerability in /oa.php?c=Staff&a=read of Find a Place LJCMS v 1.3 allows attackers to access sensitive database information via a crafted POST request.

0%
Низкий
около 3 лет назад
github логотип
GHSA-224p-qr6q-c376

Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Microsoft Browser ASLR Bypass."

21%
Средний
больше 3 лет назад
github логотип
GHSA-224p-h66f-prf2

Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability

CVSS3: 5.9
1%
Низкий
около 2 лет назад
github логотип
GHSA-224m-8wrv-4v8r

Mozilla Firefox 3.0.19, 3.5.x, and 3.6.x allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid (1) news:// or (2) nntp:// URIs.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-224m-5fj7-xcf7

Windows Remote Desktop Protocol Core Security Feature Bypass Vulnerability

CVSS3: 8.8
1%
Низкий
около 3 лет назад
github логотип
GHSA-224j-3632-5gqr

The Jetpack Scan team identified a Reflected Cross-Site Scripting via the patreon_save_attachment_patreon_level AJAX action of the Patreon WordPress plugin before 1.7.2. This AJAX hook is used to update the pledge level required by Patreon subscribers to access a given attachment. This action is accessible for user accounts with the ‘manage_options’ privilege (i.e.., only administrators). Unfortunately, one of the parameters used in this AJAX endpoint is not sanitized before being printed back to the user, so the risk it represents is the same as the previous XSS vulnerability.

1%
Низкий
около 3 лет назад
github логотип
GHSA-224h-vf26-wvfw

The password change function at /cgi/admin.cgi does not require the current/old password, which makes the application vulnerable to account takeover. An attacker can use this to forcefully set a new password within the -rsetpass+-aaction+- parameter for a user without knowing the old password, e.g. by exploiting a CSRF issue.

CVSS3: 8.4
0%
Низкий
8 месяцев назад
github логотип
GHSA-224h-p7p5-rh85

Directory Traversal in wenluhong1

CVSS3: 7.5
почти 5 лет назад
github логотип
GHSA-224h-mqw6-642p

The WP Statistics WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the browser parameter found in the ~/includes/class-wp-statistics-visitor.php file which allows attackers to inject arbitrary web scripts onto several pages that execute when site administrators view a sites statistics, in versions up to and including 13.1.5.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-224h-m2mg-r929

DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS.

CVSS3: 6.1
0%
Низкий
10 месяцев назад
github логотип
GHSA-224g-q27w-pv8f

Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL.

CVSS3: 6.1
2%
Низкий
больше 3 лет назад
github логотип
GHSA-224g-5gvw-3m56

A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.1 allows attackers to cause a denial of service via commands that attempt to launch a grid without previously providing a Compute Shader (CS).

CVSS3: 5.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-224f-2jgg-f9vc

Unspecified vulnerability in a SOAP feature in HP SiteScope 11.10 through 11.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1461.

35%
Средний
около 3 лет назад
github логотип
GHSA-224c-qxxc-fqx7

login in util-linux-2.12a skips pam_acct_mgmt and chauth_tok when authentication is skipped, such as when a Kerberos krlogin session has been established, which might allow users to bypass intended access policies that would be enforced by pam_acct_mgmt and chauth_tok.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2249-qr5p-5wfx

Unspecified vulnerability in Oracle Database Server 9.2.0.7, Application Server 9.0.4.2 and 10.1.2.1, Collaboration Suite Release 2, version 9.0.4.2 (Oracle9i), and E-Business Suite and Applications 11.5.10 has unspecified impact and attack vectors, as identified by Oracle Vuln# WF01 in the Oracle Workflow Cartridge component.

2%
Низкий
больше 3 лет назад

Уязвимостей на страницу