Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 300 405

Количество 300 405

github логотип

GHSA-23gw-f65f-5rw8

больше 3 лет назад

The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-23gw-97jj-g7f2

больше 3 лет назад

Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.

EPSS: Низкий
github логотип

GHSA-23gv-xgv3-fvq9

больше 3 лет назад

Microsoft Word Remote Code Execution Vulnerability

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-23gr-x4f6-vrp6

больше 3 лет назад

Ypsomed mylife Cloud, mylife Mobile Application:Ypsomed mylife Cloud,All versions prior to 1.7.2,Ypsomed mylife App,All versions prior to 1.7.5,he Ypsomed mylife Cloud reflects the user password during the login process after redirecting the user from a HTTPS endpoint to a HTTP endpoint.

EPSS: Низкий
github логотип

GHSA-23gq-p5v8-4xh3

больше 1 года назад

A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `profile` parameter at offset `0x4224b0` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-23gq-5hj3-m433

около 1 года назад

Chamilo LMS Version 1.11.26 is vulnerable to Incorrect Access Control. A non-authenticated attacker can request the number of messages and the number of online users via "/main/inc/ajax/message.ajax.php?a=get_count_message" AND "/main/inc/ajax/online.ajax.php?a=get_users_online."

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-23gq-5264-f9p4

больше 3 лет назад

In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 835, SD 845, while the DPM native process is processing framework events, the iterator pointer is deleted after processing an event. When processing subsequent events, a Use After Condition will occur.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-23gq-523p-hvrg

больше 3 лет назад

A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-23gm-hjpg-qfp3

больше 3 лет назад

ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise of the VNC server. The vulnerability exists even when authentication is turned on during the deployment of the VNC server. The password for authentication is stored in cleartext in a file that can be read via a ../../ThinVnc.ini directory traversal attack vector.

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-23gm-fr88-2r8c

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential OOBs in smb2_parse_contexts() Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts(). This fixes following oops when accessing invalid create contexts from server: BUG: unable to handle page fault for address: ffff8881178d8cc3 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 4a01067 P4D 4a01067 PUD 0 Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 3 PID: 1736 Comm: mount.cifs Not tainted 6.7.0-rc4 #1 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014 RIP: 0010:smb2_parse_contexts+0xa0/0x3a0 [cifs] Code: f8 10 75 13 48 b8 93 ad 25 50 9c b4 11 e7 49 39 06 0f 84 d2 00 00 00 8b 45 00 85 c0 74 61 41 29 c5 48 01 c5 41 83 fd 0f 76 55 <0f> b7 7d 04 0f b7 45 06 4c 8d 74 3d 00 66 83 f8 04 75 bc ba 04 00 RSP: 0018:ffffc900007939e0 EFLAGS: 00010...

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-23gm-cgq9-q86q

больше 3 лет назад

Multiple SONY Wireless Headphones have vulnerability that someone within the Bluetooth range can make the Bluetooth pairing.

EPSS: Низкий
github логотип

GHSA-23gj-x27g-r34f

больше 3 лет назад

MODX Revolution allows overwriting .htaccess

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-23gj-4cxv-h5x2

больше 3 лет назад

A vulnerability in the HTTP client feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to read and modify data that should normally have been sent via an encrypted channel. The vulnerability is due to TCP port information not being considered when matching new requests to existing, persistent HTTP connections. An attacker could exploit this vulnerability by acting as a man-in-the-middle and then reading and/or modifying data that should normally have been sent through an encrypted channel.

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-23gj-3f5h-m6mj

около 3 лет назад

OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6c0414.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-23gj-368h-92pq

больше 6 лет назад

Path Traversal in DKPro Core

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-23gh-v7pm-997j

больше 3 лет назад

Buffer overflow in CoreFoundation in Mac OS X 10.3.9 allows attackers to execute arbitrary code via command line arguments to an application that uses CoreFoundation.

EPSS: Низкий
github логотип

GHSA-23gh-5xvj-6hr9

больше 3 лет назад

NetSupport Manager (NSM) before 11.00.0005 sends HTTP headers with cleartext fields containing details about client machines, which allows remote attackers to obtain potentially sensitive information by sniffing the network.

EPSS: Низкий
github логотип

GHSA-23gg-x39r-7c9v

больше 3 лет назад

Ubuntu Metal as a Service (MaaS) 1.2 and 1.4 uses world-readable permissions for txlongpoll.yaml, which allows local users to obtain RabbitMQ authentication credentials by reading the file.

EPSS: Низкий
github логотип

GHSA-23gg-m473-8fr9

11 месяцев назад

A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-23gg-c2jg-23p5

больше 3 лет назад

** DISPUTED ** Directory traversal vulnerability in modules/file.php in Seir Anphin allows remote attackers to obtain sensitive information via a .. (dot dot) in the a[filepath] parameter. NOTE: a third party has disputed this issue because the a array is populated by a database query before use.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-23gw-f65f-5rw8

The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

CVSS3: 5.9
5%
Низкий
больше 3 лет назад
github логотип
GHSA-23gw-97jj-g7f2

Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.

7%
Низкий
больше 3 лет назад
github логотип
GHSA-23gv-xgv3-fvq9

Microsoft Word Remote Code Execution Vulnerability

CVSS3: 7.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-23gr-x4f6-vrp6

Ypsomed mylife Cloud, mylife Mobile Application:Ypsomed mylife Cloud,All versions prior to 1.7.2,Ypsomed mylife App,All versions prior to 1.7.5,he Ypsomed mylife Cloud reflects the user password during the login process after redirecting the user from a HTTPS endpoint to a HTTP endpoint.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-23gq-p5v8-4xh3

A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `profile` parameter at offset `0x4224b0` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115.

CVSS3: 7.2
1%
Низкий
больше 1 года назад
github логотип
GHSA-23gq-5hj3-m433

Chamilo LMS Version 1.11.26 is vulnerable to Incorrect Access Control. A non-authenticated attacker can request the number of messages and the number of online users via "/main/inc/ajax/message.ajax.php?a=get_count_message" AND "/main/inc/ajax/online.ajax.php?a=get_users_online."

CVSS3: 7.5
0%
Низкий
около 1 года назад
github логотип
GHSA-23gq-5264-f9p4

In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 835, SD 845, while the DPM native process is processing framework events, the iterator pointer is deleted after processing an event. When processing subsequent events, a Use After Condition will occur.

CVSS3: 9.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-23gq-523p-hvrg

A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting.

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-23gm-hjpg-qfp3

ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise of the VNC server. The vulnerability exists even when authentication is turned on during the deployment of the VNC server. The password for authentication is stored in cleartext in a file that can be read via a ../../ThinVnc.ini directory traversal attack vector.

CVSS3: 9.8
93%
Критический
больше 3 лет назад
github логотип
GHSA-23gm-fr88-2r8c

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential OOBs in smb2_parse_contexts() Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts(). This fixes following oops when accessing invalid create contexts from server: BUG: unable to handle page fault for address: ffff8881178d8cc3 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 4a01067 P4D 4a01067 PUD 0 Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 3 PID: 1736 Comm: mount.cifs Not tainted 6.7.0-rc4 #1 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014 RIP: 0010:smb2_parse_contexts+0xa0/0x3a0 [cifs] Code: f8 10 75 13 48 b8 93 ad 25 50 9c b4 11 e7 49 39 06 0f 84 d2 00 00 00 8b 45 00 85 c0 74 61 41 29 c5 48 01 c5 41 83 fd 0f 76 55 <0f> b7 7d 04 0f b7 45 06 4c 8d 74 3d 00 66 83 f8 04 75 bc ba 04 00 RSP: 0018:ffffc900007939e0 EFLAGS: 00010...

CVSS3: 8
0%
Низкий
больше 1 года назад
github логотип
GHSA-23gm-cgq9-q86q

Multiple SONY Wireless Headphones have vulnerability that someone within the Bluetooth range can make the Bluetooth pairing.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-23gj-x27g-r34f

MODX Revolution allows overwriting .htaccess

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-23gj-4cxv-h5x2

A vulnerability in the HTTP client feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to read and modify data that should normally have been sent via an encrypted channel. The vulnerability is due to TCP port information not being considered when matching new requests to existing, persistent HTTP connections. An attacker could exploit this vulnerability by acting as a man-in-the-middle and then reading and/or modifying data that should normally have been sent through an encrypted channel.

CVSS3: 7.4
0%
Низкий
больше 3 лет назад
github логотип
GHSA-23gj-3f5h-m6mj

OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6c0414.

CVSS3: 6.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-23gj-368h-92pq

Path Traversal in DKPro Core

CVSS3: 7.5
1%
Низкий
больше 6 лет назад
github логотип
GHSA-23gh-v7pm-997j

Buffer overflow in CoreFoundation in Mac OS X 10.3.9 allows attackers to execute arbitrary code via command line arguments to an application that uses CoreFoundation.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-23gh-5xvj-6hr9

NetSupport Manager (NSM) before 11.00.0005 sends HTTP headers with cleartext fields containing details about client machines, which allows remote attackers to obtain potentially sensitive information by sniffing the network.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-23gg-x39r-7c9v

Ubuntu Metal as a Service (MaaS) 1.2 and 1.4 uses world-readable permissions for txlongpoll.yaml, which allows local users to obtain RabbitMQ authentication credentials by reading the file.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-23gg-m473-8fr9

A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.

CVSS3: 8.8
0%
Низкий
11 месяцев назад
github логотип
GHSA-23gg-c2jg-23p5

** DISPUTED ** Directory traversal vulnerability in modules/file.php in Seir Anphin allows remote attackers to obtain sensitive information via a .. (dot dot) in the a[filepath] parameter. NOTE: a third party has disputed this issue because the a array is populated by a database query before use.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу