Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 300 915

Количество 300 915

github логотип

GHSA-25qr-4mfj-987c

больше 3 лет назад

A Vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.9, 4.0.8 allowing a remote, authorized master server to cause a high CPU load or even prevent any further updates to any slave zone by sending a large number of NOTIFY messages. Note that only servers configured as slaves are affected by this issue.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-25qq-8gc4-fhg4

10 месяцев назад

In multiple locations, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-25qp-vg38-c324

6 дней назад

The Import Export For WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_setting() function in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's record setting.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-25qp-v6p8-wggj

больше 1 года назад

An issue in Bento4 Bento v.1.6.0-641 allows a remote attacker to execute arbitrary code via the Ap4MdhdAtom.cpp,AP4_MdhdAtom::AP4_MdhdAtom,mp4fragment

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-25qp-m5mq-65g8

больше 3 лет назад

Unspecified vulnerability in the management console in the S2 Security Linear eMerge Access Control System 2.5.x allows remote attackers to cause a denial of service (configuration reset) via a request to a crafted URI.

EPSS: Низкий
github логотип

GHSA-25qp-4x22-wqrg

почти 2 года назад

Rejected reason: Accidental request.

EPSS: Низкий
github логотип

GHSA-25qm-8qm2-g8hh

больше 3 лет назад

The Popular Brand Icons – Simple Icons WordPress plugin before 2.7.8 does not sanitise or validate some of its shortcode parameters, such as "color", "size" or "class", allowing users with a role as low as Contributor to set Cross-Site payload in them. A post made by a contributor would still have to be approved by an admin to have the XSS triggered in the frontend, however, higher privilege users, such as editor could exploit this without the need of approval, and even when the blog disallows the unfiltered_html capability.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-25qj-gfr4-9mhj

больше 3 лет назад

BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-25qh-vf9g-cg5r

больше 3 лет назад

Multiple PHP remote file inclusion vulnerabilities in phpRaid 3.0.4 and 3.0.5 allow remote attackers to execute arbitrary code via a URL in the phpraid_dir parameter to (1) configuration.php, (3) guilds.php, (4) index.php, (5) locations.php, (6) login.php, (7) lua_output.php, (8) permissions.php, (9) profile.php, (10) raids.php, (11) register.php, (12) roster.php, and (13) view.php.

EPSS: Низкий
github логотип

GHSA-25qh-j22f-pwp8

около 1 месяца назад

QOS.CH logback-core is vulnerable to Arbitrary Code Execution through file processing

EPSS: Низкий
github логотип

GHSA-25qh-ff2q-jm3q

7 месяцев назад

Cross-Site Request Forgery (CSRF) vulnerability in OTWthemes Sidebar Manager Light allows Cross Site Request Forgery. This issue affects Sidebar Manager Light: from n/a through 1.1.8.

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-25qh-97qq-x7c4

4 месяца назад

SAPCAR allows an attacker logged in with high privileges to override the permissions of the current and parent directories of the user or process extracting the archive, leading to privilege escalation. On successful exploitation, an attacker could modify the critical files by tampering with signed archives without breaking the signature, but it has a low impact on the confidentiality and availability of the system.

CVSS3: 6.9
EPSS: Низкий
github логотип

GHSA-25qg-qjjq-5wgr

больше 3 лет назад

SMB in Data ONTAP operating in 7-Mode versions prior to 8.2.5P3 has weak cryptography which when exploited could lead to information disclosure or addition or modification of data.

EPSS: Низкий
github логотип

GHSA-25qg-5w5q-f6xw

почти 4 года назад

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-25qg-4p93-qpvm

больше 3 лет назад

The (1) ListNetworkACL and (2) listNetworkACLLists APIs in Apache CloudStack before 4.2.1 allow remote authenticated users to list network ACLS for other users via a crafted request.

EPSS: Низкий
github логотип

GHSA-25qf-mc6x-fm76

около 3 лет назад

Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/delete_beneficiary.php.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-25q9-fqfh-fp5g

больше 3 лет назад

On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, on systems with Advanced WAF or BIG-IP ASM provisioned, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

EPSS: Низкий
github логотип

GHSA-25q8-wqrc-rrrr

больше 3 лет назад

SQL injection vulnerability in reward_points.post.php in the Reward points addon in CS-Cart before 2.0.6 allows remote authenticated users to execute arbitrary SQL commands via the sort_order parameter in a reward_points.userlog action to index.php, a different vulnerability than CVE-2005-4429.2.

EPSS: Низкий
github логотип

GHSA-25q8-m23x-4242

больше 3 лет назад

A buffer over-read issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the decode-mpls.c function DecodeMPLS is composed only of a packet of source address and destination address plus the correct type field and the right number for shim, an attacker can manipulate the control flow, such that the condition to leave the loop is true. After leaving the loop, the network packet has a length of 2 bytes. There is no validation of this length. Later on, the code tries to read at an empty position, leading to a crash.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-25q8-485x-mwx9

больше 3 лет назад

PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-25qr-4mfj-987c

A Vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.9, 4.0.8 allowing a remote, authorized master server to cause a high CPU load or even prevent any further updates to any slave zone by sending a large number of NOTIFY messages. Note that only servers configured as slaves are affected by this issue.

CVSS3: 4.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-25qq-8gc4-fhg4

In multiple locations, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 7.8
0%
Низкий
10 месяцев назад
github логотип
GHSA-25qp-vg38-c324

The Import Export For WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_setting() function in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's record setting.

CVSS3: 4.3
0%
Низкий
6 дней назад
github логотип
GHSA-25qp-v6p8-wggj

An issue in Bento4 Bento v.1.6.0-641 allows a remote attacker to execute arbitrary code via the Ap4MdhdAtom.cpp,AP4_MdhdAtom::AP4_MdhdAtom,mp4fragment

CVSS3: 8.1
10%
Низкий
больше 1 года назад
github логотип
GHSA-25qp-m5mq-65g8

Unspecified vulnerability in the management console in the S2 Security Linear eMerge Access Control System 2.5.x allows remote attackers to cause a denial of service (configuration reset) via a request to a crafted URI.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-25qp-4x22-wqrg

Rejected reason: Accidental request.

почти 2 года назад
github логотип
GHSA-25qm-8qm2-g8hh

The Popular Brand Icons – Simple Icons WordPress plugin before 2.7.8 does not sanitise or validate some of its shortcode parameters, such as "color", "size" or "class", allowing users with a role as low as Contributor to set Cross-Site payload in them. A post made by a contributor would still have to be approved by an admin to have the XSS triggered in the frontend, however, higher privilege users, such as editor could exploit this without the need of approval, and even when the blog disallows the unfiltered_html capability.

CVSS3: 5.4
0%
Низкий
больше 3 лет назад
github логотип
GHSA-25qj-gfr4-9mhj

BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.

CVSS3: 5.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-25qh-vf9g-cg5r

Multiple PHP remote file inclusion vulnerabilities in phpRaid 3.0.4 and 3.0.5 allow remote attackers to execute arbitrary code via a URL in the phpraid_dir parameter to (1) configuration.php, (3) guilds.php, (4) index.php, (5) locations.php, (6) login.php, (7) lua_output.php, (8) permissions.php, (9) profile.php, (10) raids.php, (11) register.php, (12) roster.php, and (13) view.php.

8%
Низкий
больше 3 лет назад
github логотип
GHSA-25qh-j22f-pwp8

QOS.CH logback-core is vulnerable to Arbitrary Code Execution through file processing

0%
Низкий
около 1 месяца назад
github логотип
GHSA-25qh-ff2q-jm3q

Cross-Site Request Forgery (CSRF) vulnerability in OTWthemes Sidebar Manager Light allows Cross Site Request Forgery. This issue affects Sidebar Manager Light: from n/a through 1.1.8.

CVSS3: 7.1
0%
Низкий
7 месяцев назад
github логотип
GHSA-25qh-97qq-x7c4

SAPCAR allows an attacker logged in with high privileges to override the permissions of the current and parent directories of the user or process extracting the archive, leading to privilege escalation. On successful exploitation, an attacker could modify the critical files by tampering with signed archives without breaking the signature, but it has a low impact on the confidentiality and availability of the system.

CVSS3: 6.9
0%
Низкий
4 месяца назад
github логотип
GHSA-25qg-qjjq-5wgr

SMB in Data ONTAP operating in 7-Mode versions prior to 8.2.5P3 has weak cryptography which when exploited could lead to information disclosure or addition or modification of data.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-25qg-5w5q-f6xw

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

CVSS3: 7.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-25qg-4p93-qpvm

The (1) ListNetworkACL and (2) listNetworkACLLists APIs in Apache CloudStack before 4.2.1 allow remote authenticated users to list network ACLS for other users via a crafted request.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-25qf-mc6x-fm76

Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/delete_beneficiary.php.

CVSS3: 9.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-25q9-fqfh-fp5g

On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, on systems with Advanced WAF or BIG-IP ASM provisioned, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-25q8-wqrc-rrrr

SQL injection vulnerability in reward_points.post.php in the Reward points addon in CS-Cart before 2.0.6 allows remote authenticated users to execute arbitrary SQL commands via the sort_order parameter in a reward_points.userlog action to index.php, a different vulnerability than CVE-2005-4429.2.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-25q8-m23x-4242

A buffer over-read issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the decode-mpls.c function DecodeMPLS is composed only of a packet of source address and destination address plus the correct type field and the right number for shim, an attacker can manipulate the control flow, such that the condition to leave the loop is true. After leaving the loop, the network packet has a length of 2 bytes. There is no validation of this length. Later on, the code tries to read at an empty position, leading to a crash.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-25q8-485x-mwx9

PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.

CVSS3: 5.3
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу