Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 314 458

Количество 314 458

github логотип

GHSA-2x6g-9jmv-rxr5

около 4 лет назад

IBM MQ Appliance could allow a local attacker to obtain sensitive information by inclusion of sensitive data within trace.

EPSS: Низкий
github логотип

GHSA-2x6f-xp8w-cxqp

почти 4 года назад

Multiple stack-based buffer overflows in a certain ActiveX control in ienipp.ocx in Novell iPrint Client for Windows before 4.36 allow remote attackers to execute arbitrary code via a long value of the (1) operation, (2) printer-url, or (3) target-frame parameter. NOTE: some of these details are obtained from third party information.

EPSS: Высокий
github логотип

GHSA-2x6c-m4cg-2qcg

почти 4 года назад

Cross-site request forgery (CSRF) vulnerability in Falcon Series One CMS 1.4.3 allows remote attackers to change a password via a certain changepass action to index.php.

EPSS: Низкий
github логотип

GHSA-2x6c-ggqq-38q8

больше 3 лет назад

On F5 BIG-IP versions 13.0.0, 12.1.0-12.1.3.1, 11.6.1-11.6.2, or 11.5.1-11.5.5, vCMP guests running on VIPRION 2100, 4200 and 4300 series blades cannot correctly decrypt ciphertext from established SSL sessions with small MTU.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-2x6c-642q-vfcc

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() The bnx2fc_destroy() functions are removing the interface before calling destroy_work. This results multiple WARNings from sysfs_remove_group() as the controller rport device attributes are removed too early. Replace the fcoe_port's destroy_work queue. It's not needed. The problem is easily reproducible with the following steps. Example: $ dmesg -w & $ systemctl enable --now fcoe $ fipvlan -s -c ens2f1 $ fcoeadm -d ens2f1.802 [ 583.464488] host2: libfc: Link down on port (7500a1) [ 583.472651] bnx2fc: 7500a1 - rport not created Yet!! [ 583.490468] ------------[ cut here ]------------ [ 583.538725] sysfs group 'power' not found for kobject 'rport-2:0-0' [ 583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80 [ 583.607130] Modules linked in: dm_service_time 8021q garp mrp stp...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-2x69-9fjp-rrmj

больше 3 лет назад

Race condition in the client in Symantec Endpoint Protection (SEP) 12.1 before RU6 MP5 allows local users to bypass intended restrictions on USB file transfer by conducting filesystem operations before the SEP device manager recognizes a new USB device.

CVSS3: 2.9
EPSS: Низкий
github логотип

GHSA-2x69-4mw7-9876

почти 4 года назад

Vulnerabilities in ColdFusion 2.0 through 4.5.1 SP 2 allow remote attackers to (1) read or delete arbitrary files, or (2) overwrite ColdFusion Server templates.

EPSS: Низкий
github логотип

GHSA-2x68-j592-36m7

больше 3 лет назад

In JetBrains TeamCity before 2020.1.5, the Guest user had access to audit records.

EPSS: Низкий
github логотип

GHSA-2x68-h5x4-c4qp

почти 4 года назад

ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."

EPSS: Средний
github логотип

GHSA-2x67-wqw2-r8c8

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix data races on remote_id Similar to the previous patch, address the data race on remote_id, adding the suitable ONCE annotations.

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-2x66-7652-38fv

6 месяцев назад

Foxit PDF Reader before 4.2.0.0928 does not properly bound-check the /Title entry in the PDF Info dictionary. A specially crafted PDF with an overlong Title string can overflow a fixed-size stack buffer, corrupt the Structured Exception Handler (SEH) chain, and lead to arbitrary code execution in the context of the user who opens the file.

EPSS: Низкий
github логотип

GHSA-2x65-fpch-2fcm

около 1 года назад

SimpleSAMLphp xml-common XXE vulnerability

EPSS: Низкий
github логотип

GHSA-2x64-ch34-4p29

почти 4 года назад

Format string vulnerability in DbgPrint function, used in debug messages for some Windows NT drivers (possibly when called through DebugMessage), may allow local users to gain privileges.

EPSS: Низкий
github логотип

GHSA-2x63-q6q6-5vh6

6 месяцев назад

Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to lack secure password requirements for its BIOS Supervisor and User accounts, allowing attackers to bypass authentication via a bruteforce attack.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-2x63-j65f-cq7x

почти 4 года назад

The encryption algorithms for enable and passwd commands on Cisco PIX Firewall can be executed quickly due to a limited number of rounds, which make it easier for an attacker to decrypt the passwords using brute force techniques.

EPSS: Низкий
github логотип

GHSA-2x62-m7rj-3gqw

больше 3 лет назад

A remote SQL injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.10.0, 6.9.6 and 6.8.9. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability.

EPSS: Низкий
github логотип

GHSA-2x5x-xqr8-2jhv

больше 3 лет назад

An information disclosure vulnerability exists in Azure Active Directory (AAD) Microsoft Account (MSA) during the login request session, aka 'Windows Information Disclosure Vulnerability'.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-2x5x-v4mj-wc7h

около 1 месяца назад

In display, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10149879; Issue ID: MSV-4658.

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-2x5w-q4pc-79qx

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog Syzbot reported [1] crash that happens for following tracing scenario: - create tracepoint perf event with attr.inherit=1, attach it to the process and set bpf program to it - attached process forks -> chid creates inherited event the new child event shares the parent's bpf program and tp_event (hence prog_array) which is global for tracepoint - exit both process and its child -> release both events - first perf_event_detach_bpf_prog call will release tp_event->prog_array and second perf_event_detach_bpf_prog will crash, because tp_event->prog_array is NULL The fix makes sure the perf_event_detach_bpf_prog checks prog_array is valid before it tries to remove the bpf program from it. [1] https://lore.kernel.org/bpf/Z1MR6dCIKajNS6nU@krava/T/#m91dbf0688221ec7a7fc95e896a7ef9ff93b0b8ad

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-2x5v-pj5c-wjvp

почти 4 года назад

Money Transfer Management System Version 1.0 allows an authenticated user to inject SQL queries in 'mtms/admin/?page=transaction/view_details' via the 'id' parameter.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-2x6g-9jmv-rxr5

IBM MQ Appliance could allow a local attacker to obtain sensitive information by inclusion of sensitive data within trace.

0%
Низкий
около 4 лет назад
github логотип
GHSA-2x6f-xp8w-cxqp

Multiple stack-based buffer overflows in a certain ActiveX control in ienipp.ocx in Novell iPrint Client for Windows before 4.36 allow remote attackers to execute arbitrary code via a long value of the (1) operation, (2) printer-url, or (3) target-frame parameter. NOTE: some of these details are obtained from third party information.

70%
Высокий
почти 4 года назад
github логотип
GHSA-2x6c-m4cg-2qcg

Cross-site request forgery (CSRF) vulnerability in Falcon Series One CMS 1.4.3 allows remote attackers to change a password via a certain changepass action to index.php.

1%
Низкий
почти 4 года назад
github логотип
GHSA-2x6c-ggqq-38q8

On F5 BIG-IP versions 13.0.0, 12.1.0-12.1.3.1, 11.6.1-11.6.2, or 11.5.1-11.5.5, vCMP guests running on VIPRION 2100, 4200 and 4300 series blades cannot correctly decrypt ciphertext from established SSL sessions with small MTU.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-2x6c-642q-vfcc

In the Linux kernel, the following vulnerability has been resolved: scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() The bnx2fc_destroy() functions are removing the interface before calling destroy_work. This results multiple WARNings from sysfs_remove_group() as the controller rport device attributes are removed too early. Replace the fcoe_port's destroy_work queue. It's not needed. The problem is easily reproducible with the following steps. Example: $ dmesg -w & $ systemctl enable --now fcoe $ fipvlan -s -c ens2f1 $ fcoeadm -d ens2f1.802 [ 583.464488] host2: libfc: Link down on port (7500a1) [ 583.472651] bnx2fc: 7500a1 - rport not created Yet!! [ 583.490468] ------------[ cut here ]------------ [ 583.538725] sysfs group 'power' not found for kobject 'rport-2:0-0' [ 583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80 [ 583.607130] Modules linked in: dm_service_time 8021q garp mrp stp...

CVSS3: 5.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-2x69-9fjp-rrmj

Race condition in the client in Symantec Endpoint Protection (SEP) 12.1 before RU6 MP5 allows local users to bypass intended restrictions on USB file transfer by conducting filesystem operations before the SEP device manager recognizes a new USB device.

CVSS3: 2.9
0%
Низкий
больше 3 лет назад
github логотип
GHSA-2x69-4mw7-9876

Vulnerabilities in ColdFusion 2.0 through 4.5.1 SP 2 allow remote attackers to (1) read or delete arbitrary files, or (2) overwrite ColdFusion Server templates.

3%
Низкий
почти 4 года назад
github логотип
GHSA-2x68-j592-36m7

In JetBrains TeamCity before 2020.1.5, the Guest user had access to audit records.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2x68-h5x4-c4qp

ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."

13%
Средний
почти 4 года назад
github логотип
GHSA-2x67-wqw2-r8c8

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix data races on remote_id Similar to the previous patch, address the data race on remote_id, adding the suitable ONCE annotations.

CVSS3: 4.7
0%
Низкий
больше 1 года назад
github логотип
GHSA-2x66-7652-38fv

Foxit PDF Reader before 4.2.0.0928 does not properly bound-check the /Title entry in the PDF Info dictionary. A specially crafted PDF with an overlong Title string can overflow a fixed-size stack buffer, corrupt the Structured Exception Handler (SEH) chain, and lead to arbitrary code execution in the context of the user who opens the file.

7%
Низкий
6 месяцев назад
github логотип
GHSA-2x65-fpch-2fcm

SimpleSAMLphp xml-common XXE vulnerability

0%
Низкий
около 1 года назад
github логотип
GHSA-2x64-ch34-4p29

Format string vulnerability in DbgPrint function, used in debug messages for some Windows NT drivers (possibly when called through DebugMessage), may allow local users to gain privileges.

0%
Низкий
почти 4 года назад
github логотип
GHSA-2x63-q6q6-5vh6

Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to lack secure password requirements for its BIOS Supervisor and User accounts, allowing attackers to bypass authentication via a bruteforce attack.

CVSS3: 9.8
0%
Низкий
6 месяцев назад
github логотип
GHSA-2x63-j65f-cq7x

The encryption algorithms for enable and passwd commands on Cisco PIX Firewall can be executed quickly due to a limited number of rounds, which make it easier for an attacker to decrypt the passwords using brute force techniques.

0%
Низкий
почти 4 года назад
github логотип
GHSA-2x62-m7rj-3gqw

A remote SQL injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.10.0, 6.9.6 and 6.8.9. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-2x5x-xqr8-2jhv

An information disclosure vulnerability exists in Azure Active Directory (AAD) Microsoft Account (MSA) during the login request session, aka 'Windows Information Disclosure Vulnerability'.

CVSS3: 4.3
7%
Низкий
больше 3 лет назад
github логотип
GHSA-2x5x-v4mj-wc7h

In display, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10149879; Issue ID: MSV-4658.

CVSS3: 6.7
0%
Низкий
около 1 месяца назад
github логотип
GHSA-2x5w-q4pc-79qx

In the Linux kernel, the following vulnerability has been resolved: bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog Syzbot reported [1] crash that happens for following tracing scenario: - create tracepoint perf event with attr.inherit=1, attach it to the process and set bpf program to it - attached process forks -> chid creates inherited event the new child event shares the parent's bpf program and tp_event (hence prog_array) which is global for tracepoint - exit both process and its child -> release both events - first perf_event_detach_bpf_prog call will release tp_event->prog_array and second perf_event_detach_bpf_prog will crash, because tp_event->prog_array is NULL The fix makes sure the perf_event_detach_bpf_prog checks prog_array is valid before it tries to remove the bpf program from it. [1] https://lore.kernel.org/bpf/Z1MR6dCIKajNS6nU@krava/T/#m91dbf0688221ec7a7fc95e896a7ef9ff93b0b8ad

CVSS3: 5.5
0%
Низкий
около 1 года назад
github логотип
GHSA-2x5v-pj5c-wjvp

Money Transfer Management System Version 1.0 allows an authenticated user to inject SQL queries in 'mtms/admin/?page=transaction/view_details' via the 'id' parameter.

CVSS3: 4.3
0%
Низкий
почти 4 года назад

Уязвимостей на страницу