Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 315 253

Количество 315 253

github логотип

GHSA-36xw-xp2j-w52g

больше 3 лет назад

Directory traversal vulnerability in index.php in BNCwi 1.04 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the newlanguage parameter.

EPSS: Низкий
github логотип

GHSA-36xw-hgfv-jwm7

больше 4 лет назад

Multiple security issues including data race, buffer overflow, and uninitialized memory drop in arr

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-36xw-fx78-c5r4

больше 4 лет назад

containerd-shim API Exposed to Host Network Containers

CVSS3: 5.2
EPSS: Средний
github логотип

GHSA-36xv-rp4j-w277

почти 4 года назад

Memory leak in eServ 2.9x allows remote attackers to cause a denial of service (memory exhaustion) via a large number of connections, whose memory is not freed when the connection is terminated.

EPSS: Средний
github логотип

GHSA-36xv-45pm-m623

больше 3 лет назад

Microsoft Publisher 2003 SP3, and 2007 SP2 and SP3, does not properly manage memory allocations for function pointers, which allows user-assisted remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Function Pointer Overwrite Vulnerability."

EPSS: Средний
github логотип

GHSA-36xr-hxmp-hqwm

почти 4 года назад

Mutt mail client allows a remote attacker to execute commands via shell metacharacters.

EPSS: Низкий
github логотип

GHSA-36xr-8q52-r359

6 месяцев назад

A vulnerability was found in xujeff tianti 天梯 up to 2.3. It has been rated as problematic. This issue affects the function exportOrder of the file /tianti-module-admin/user/ajax/save of the component com.jeff.tianti.controller. The manipulation leads to csv injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-36xr-52f8-hmpq

почти 4 года назад

Gadu-Gadu build 155 and earlier allows remote attackers to cause a denial of service (infinite loop) via a message that contains an image whose filename does not start with restricted characters.

EPSS: Низкий
github логотип

GHSA-36xr-4x2f-cfj9

почти 2 года назад

Deserialization of Untrusted Data in Apache Camel SQL

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-36xq-7w8w-xp68

больше 3 лет назад

Magento affected by a blind SSRF vulnerability in the bundled dotmailer extension

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-36xp-mvwg-23pf

больше 3 лет назад

IBM TRIRIGA Application Platform 3.3 before 3.3.2.6, 3.4 before 3.4.2.3, and 3.5 before 3.5.0.1 allows remote authenticated users to read or modify arbitrary reports by leveraging an incorrect grant of access. IBM X-Force ID: 111783.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-36xp-gf7g-mgvq

почти 4 года назад

XSS in Telligent Community 5.6.583.20496 via a flash file and related to the allowScriptAccess parameter.

EPSS: Низкий
github логотип

GHSA-36xm-wx7c-g2hq

почти 4 года назад

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u161 and 8u152; Java SE Embedded: 8u152; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or ...

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-36xm-w97x-vmwh

больше 3 лет назад

In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetry Server v4.2 & prior, Clinical Information Center (CIC) Versions 4.X and 5.X, CARESCAPE Central Station (CSCS) Versions 1.X, B450 Version 2.X, B650 Version 1.X, B650 Version 2.X, B850 Version 1.X, B850 Version 2.X, a vulnerability in the software update mechanism allows an authenticated attacker to upload arbitrary files on the system through a crafted update package.

EPSS: Низкий
github логотип

GHSA-36xm-f9vf-c2w5

почти 4 года назад

Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command.

EPSS: Высокий
github логотип

GHSA-36xm-ch76-gv9j

9 месяцев назад

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SaurabhSharma WP Post Modules for Elementor allows Reflected XSS. This issue affects WP Post Modules for Elementor: from n/a through 2.5.0.

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-36xm-4j44-qpm8

почти 4 года назад

On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. A strcpy overflows the buffer insteon_pubnub.channel_ak, which has a size of 16 bytes. An attacker can send an arbitrarily long "ak" parameter in order to exploit this vulnerability.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-36xm-35qq-795w

больше 2 лет назад

Inventory exposes reference to non-Sync data to an arbitrary thread

EPSS: Низкий
github логотип

GHSA-36xj-qg9x-f33m

почти 4 года назад

The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-36xj-gx8g-m5fr

больше 1 года назад

The goTenna Pro series allows unauthenticated attackers to remotely update the local public keys used for P2P and Group messages.

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-36xw-xp2j-w52g

Directory traversal vulnerability in index.php in BNCwi 1.04 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the newlanguage parameter.

3%
Низкий
больше 3 лет назад
github логотип
GHSA-36xw-hgfv-jwm7

Multiple security issues including data race, buffer overflow, and uninitialized memory drop in arr

CVSS3: 9.8
0%
Низкий
больше 4 лет назад
github логотип
GHSA-36xw-fx78-c5r4

containerd-shim API Exposed to Host Network Containers

CVSS3: 5.2
11%
Средний
больше 4 лет назад
github логотип
GHSA-36xv-rp4j-w277

Memory leak in eServ 2.9x allows remote attackers to cause a denial of service (memory exhaustion) via a large number of connections, whose memory is not freed when the connection is terminated.

13%
Средний
почти 4 года назад
github логотип
GHSA-36xv-45pm-m623

Microsoft Publisher 2003 SP3, and 2007 SP2 and SP3, does not properly manage memory allocations for function pointers, which allows user-assisted remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Function Pointer Overwrite Vulnerability."

28%
Средний
больше 3 лет назад
github логотип
GHSA-36xr-hxmp-hqwm

Mutt mail client allows a remote attacker to execute commands via shell metacharacters.

1%
Низкий
почти 4 года назад
github логотип
GHSA-36xr-8q52-r359

A vulnerability was found in xujeff tianti 天梯 up to 2.3. It has been rated as problematic. This issue affects the function exportOrder of the file /tianti-module-admin/user/ajax/save of the component com.jeff.tianti.controller. The manipulation leads to csv injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 4.3
0%
Низкий
6 месяцев назад
github логотип
GHSA-36xr-52f8-hmpq

Gadu-Gadu build 155 and earlier allows remote attackers to cause a denial of service (infinite loop) via a message that contains an image whose filename does not start with restricted characters.

1%
Низкий
почти 4 года назад
github логотип
GHSA-36xr-4x2f-cfj9

Deserialization of Untrusted Data in Apache Camel SQL

CVSS3: 7.8
5%
Низкий
почти 2 года назад
github логотип
GHSA-36xq-7w8w-xp68

Magento affected by a blind SSRF vulnerability in the bundled dotmailer extension

CVSS3: 8
3%
Низкий
больше 3 лет назад
github логотип
GHSA-36xp-mvwg-23pf

IBM TRIRIGA Application Platform 3.3 before 3.3.2.6, 3.4 before 3.4.2.3, and 3.5 before 3.5.0.1 allows remote authenticated users to read or modify arbitrary reports by leveraging an incorrect grant of access. IBM X-Force ID: 111783.

CVSS3: 5.4
0%
Низкий
больше 3 лет назад
github логотип
GHSA-36xp-gf7g-mgvq

XSS in Telligent Community 5.6.583.20496 via a flash file and related to the allowScriptAccess parameter.

0%
Низкий
почти 4 года назад
github логотип
GHSA-36xm-wx7c-g2hq

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u161 and 8u152; Java SE Embedded: 8u152; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or ...

CVSS3: 7.4
0%
Низкий
почти 4 года назад
github логотип
GHSA-36xm-w97x-vmwh

In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetry Server v4.2 & prior, Clinical Information Center (CIC) Versions 4.X and 5.X, CARESCAPE Central Station (CSCS) Versions 1.X, B450 Version 2.X, B650 Version 1.X, B650 Version 2.X, B850 Version 1.X, B850 Version 2.X, a vulnerability in the software update mechanism allows an authenticated attacker to upload arbitrary files on the system through a crafted update package.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-36xm-f9vf-c2w5

Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command.

74%
Высокий
почти 4 года назад
github логотип
GHSA-36xm-ch76-gv9j

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SaurabhSharma WP Post Modules for Elementor allows Reflected XSS. This issue affects WP Post Modules for Elementor: from n/a through 2.5.0.

CVSS3: 7.1
0%
Низкий
9 месяцев назад
github логотип
GHSA-36xm-4j44-qpm8

On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. A strcpy overflows the buffer insteon_pubnub.channel_ak, which has a size of 16 bytes. An attacker can send an arbitrarily long "ak" parameter in order to exploit this vulnerability.

CVSS3: 8.8
1%
Низкий
почти 4 года назад
github логотип
GHSA-36xm-35qq-795w

Inventory exposes reference to non-Sync data to an arbitrary thread

больше 2 лет назад
github логотип
GHSA-36xj-qg9x-f33m

The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().

CVSS3: 9.8
2%
Низкий
почти 4 года назад
github логотип
GHSA-36xj-gx8g-m5fr

The goTenna Pro series allows unauthenticated attackers to remotely update the local public keys used for P2P and Group messages.

CVSS3: 6.5
0%
Низкий
больше 1 года назад

Уязвимостей на страницу