Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 314 458

Количество 314 458

github логотип

GHSA-2wr5-jh9c-7ffx

больше 3 лет назад

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

EPSS: Низкий
github логотип

GHSA-2wr5-76pc-gh2p

больше 3 лет назад

Xpress Server in SAP POS does not require authentication for read/write/delete file access. This is SAP Security Note 2520064.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-2wr3-xjqg-6q48

больше 1 года назад

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing an Authority Key Identifier extension that lacks the keyIdentifier field. Fort references this pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-2wr3-w5rh-2qx4

больше 3 лет назад

A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.

CVSS3: 4.4
EPSS: Низкий
github логотип

GHSA-2wr3-hxqg-qp94

почти 2 года назад

A vulnerability was found in Tenda FH1203 2.0.1.6. It has been declared as critical. Affected by this vulnerability is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258163. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-2wr3-gj53-w272

больше 3 лет назад

Arbitrary file upload exists in the Jimtawl 2.1.6 and 2.2.5 component for Joomla! via a view=upload&task=upload&pop=true&tmpl=component request.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-2wr3-8g8v-wc39

больше 1 года назад

A null-dereference vulnerability involving parsing requests specifying invalid protocols can cause the application to crash or potentially result in other undesirable effects. This issue affects Facebook Thrift from v2024.09.09.00 until v2024.09.23.00.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-2wr3-6ffm-mq44

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wwan_hwsim: fix possible memory leak in wwan_hwsim_dev_new() Inject fault while probing module, if device_register() fails, but the refcount of kobject is not decreased to 0, the name allocated in dev_set_name() is leaked. Fix this by calling put_device(), so that name can be freed in callback function kobject_cleanup(). unreferenced object 0xffff88810152ad20 (size 8): comm "modprobe", pid 252, jiffies 4294849206 (age 22.713s) hex dump (first 8 bytes): 68 77 73 69 6d 30 00 ff hwsim0.. backtrace: [<000000009c3504ed>] __kmalloc_node_track_caller+0x44/0x1b0 [<00000000c0228a5e>] kvasprintf+0xb5/0x140 [<00000000cff8c21f>] kvasprintf_const+0x55/0x180 [<0000000055a1e073>] kobject_set_name_vargs+0x56/0x150 [<000000000a80b139>] dev_set_name+0xab/0xe0

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-2wr3-273m-9rpj

больше 3 лет назад

An insecure file access vulnerability exists in CA Client Automation 14.0, 14.1, 14.2, and 14.3 Agent for Windows that can allow a local attacker to gain escalated privileges.

EPSS: Низкий
github логотип

GHSA-2wr2-hrm6-j658

около 1 года назад

An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can write arbitrary files by manipulating POST parameters of the page "common/vam_Sql.php".

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-2wr2-8qjq-gh55

около 4 лет назад

Exposure of Resource to Wrong Sphere in org.craftercms:crafter-search

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-2wqx-h8q4-7796

больше 3 лет назад

RSA Archer, versions prior to 6.4.0.1, contain an authorization bypass vulnerability in the REST API. A remote authenticated malicious Archer user could potentially exploit this vulnerability to elevate their privileges.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-2wqx-g8cq-9c5p

почти 4 года назад

The web interface for Webmin 0.92 does not properly quote or filter script code in files that are displayed to the interface, which allows local users to execute script and possibly steal cookies by inserting the script into certain files or fields, such as a real user name entry in the passwd file.

EPSS: Низкий
github логотип

GHSA-2wqx-2fx4-v9vv

почти 4 года назад

Buffer overflow in Elm 2.5.5 and earlier allows remote attackers to execute arbitrary code via a long Message-ID header.

EPSS: Низкий
github логотип

GHSA-2wqw-hr4f-xrhh

почти 2 года назад

RSSHub Cross-site Scripting vulnerability caused by internal media proxy

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-2wqv-jwmj-rrvv

почти 4 года назад

DPEC Online Courseware allows an attacker to change another user's password without knowing the original password.

EPSS: Низкий
github логотип

GHSA-2wqr-vwcq-3xp4

больше 1 года назад

Improper input validation in firmware for some Intel(R) CSME may allow a privileged user to potentially enable denial of service via local access.

CVSS3: 4.4
EPSS: Низкий
github логотип

GHSA-2wqr-hc5g-8c36

почти 2 года назад

Visualware MyConnection Server doRTAAccessCTConfig Cross-Site Scripting Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Visualware MyConnection Server. Minimal user interaction is required to exploit this vulnerability. The specific flaw exists within the doRTAAccessCTConfig method. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-21613.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-2wqq-x37w-74h9

6 месяцев назад

A vulnerability was found in zhilink 智互联(深圳)科技有限公司 ADP Application Developer Platform 应用开发者平台 1.0.0. It has been classified as critical. This affects an unknown part of the file /adpweb/a/sys/office/treeData. The manipulation of the argument extId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-2wqp-mx6p-m496

больше 3 лет назад

OTFCC commit 617837b was discovered to contain a segmentation violation via /multiarch/memmove-vec-unaligned-erms.S.

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-2wr5-jh9c-7ffx

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2wr5-76pc-gh2p

Xpress Server in SAP POS does not require authentication for read/write/delete file access. This is SAP Security Note 2520064.

CVSS3: 9.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-2wr3-xjqg-6q48

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing an Authority Key Identifier extension that lacks the keyIdentifier field. Fort references this pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.

CVSS3: 7.5
1%
Низкий
больше 1 года назад
github логотип
GHSA-2wr3-w5rh-2qx4

A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.

CVSS3: 4.4
0%
Низкий
больше 3 лет назад
github логотип
GHSA-2wr3-hxqg-qp94

A vulnerability was found in Tenda FH1203 2.0.1.6. It has been declared as critical. Affected by this vulnerability is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258163. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 8.8
1%
Низкий
почти 2 года назад
github логотип
GHSA-2wr3-gj53-w272

Arbitrary file upload exists in the Jimtawl 2.1.6 and 2.2.5 component for Joomla! via a view=upload&task=upload&pop=true&tmpl=component request.

CVSS3: 9.8
24%
Средний
больше 3 лет назад
github логотип
GHSA-2wr3-8g8v-wc39

A null-dereference vulnerability involving parsing requests specifying invalid protocols can cause the application to crash or potentially result in other undesirable effects. This issue affects Facebook Thrift from v2024.09.09.00 until v2024.09.23.00.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-2wr3-6ffm-mq44

In the Linux kernel, the following vulnerability has been resolved: wwan_hwsim: fix possible memory leak in wwan_hwsim_dev_new() Inject fault while probing module, if device_register() fails, but the refcount of kobject is not decreased to 0, the name allocated in dev_set_name() is leaked. Fix this by calling put_device(), so that name can be freed in callback function kobject_cleanup(). unreferenced object 0xffff88810152ad20 (size 8): comm "modprobe", pid 252, jiffies 4294849206 (age 22.713s) hex dump (first 8 bytes): 68 77 73 69 6d 30 00 ff hwsim0.. backtrace: [<000000009c3504ed>] __kmalloc_node_track_caller+0x44/0x1b0 [<00000000c0228a5e>] kvasprintf+0xb5/0x140 [<00000000cff8c21f>] kvasprintf_const+0x55/0x180 [<0000000055a1e073>] kobject_set_name_vargs+0x56/0x150 [<000000000a80b139>] dev_set_name+0xab/0xe0

CVSS3: 5.5
0%
Низкий
5 месяцев назад
github логотип
GHSA-2wr3-273m-9rpj

An insecure file access vulnerability exists in CA Client Automation 14.0, 14.1, 14.2, and 14.3 Agent for Windows that can allow a local attacker to gain escalated privileges.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2wr2-hrm6-j658

An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can write arbitrary files by manipulating POST parameters of the page "common/vam_Sql.php".

CVSS3: 6.5
0%
Низкий
около 1 года назад
github логотип
GHSA-2wr2-8qjq-gh55

Exposure of Resource to Wrong Sphere in org.craftercms:crafter-search

CVSS3: 9.1
1%
Низкий
около 4 лет назад
github логотип
GHSA-2wqx-h8q4-7796

RSA Archer, versions prior to 6.4.0.1, contain an authorization bypass vulnerability in the REST API. A remote authenticated malicious Archer user could potentially exploit this vulnerability to elevate their privileges.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-2wqx-g8cq-9c5p

The web interface for Webmin 0.92 does not properly quote or filter script code in files that are displayed to the interface, which allows local users to execute script and possibly steal cookies by inserting the script into certain files or fields, such as a real user name entry in the passwd file.

0%
Низкий
почти 4 года назад
github логотип
GHSA-2wqx-2fx4-v9vv

Buffer overflow in Elm 2.5.5 and earlier allows remote attackers to execute arbitrary code via a long Message-ID header.

4%
Низкий
почти 4 года назад
github логотип
GHSA-2wqw-hr4f-xrhh

RSSHub Cross-site Scripting vulnerability caused by internal media proxy

CVSS3: 6.1
1%
Низкий
почти 2 года назад
github логотип
GHSA-2wqv-jwmj-rrvv

DPEC Online Courseware allows an attacker to change another user's password without knowing the original password.

0%
Низкий
почти 4 года назад
github логотип
GHSA-2wqr-vwcq-3xp4

Improper input validation in firmware for some Intel(R) CSME may allow a privileged user to potentially enable denial of service via local access.

CVSS3: 4.4
0%
Низкий
больше 1 года назад
github логотип
GHSA-2wqr-hc5g-8c36

Visualware MyConnection Server doRTAAccessCTConfig Cross-Site Scripting Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Visualware MyConnection Server. Minimal user interaction is required to exploit this vulnerability. The specific flaw exists within the doRTAAccessCTConfig method. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-21613.

CVSS3: 8.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-2wqq-x37w-74h9

A vulnerability was found in zhilink 智互联(深圳)科技有限公司 ADP Application Developer Platform 应用开发者平台 1.0.0. It has been classified as critical. This affects an unknown part of the file /adpweb/a/sys/office/treeData. The manipulation of the argument extId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
0%
Низкий
6 месяцев назад
github логотип
GHSA-2wqp-mx6p-m496

OTFCC commit 617837b was discovered to contain a segmentation violation via /multiarch/memmove-vec-unaligned-erms.S.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу