Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 314 212

Количество 314 212

github логотип

GHSA-2rjh-j2p6-q8p5

почти 2 года назад

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in PickPlugins Post Grid.This issue affects Post Grid: from n/a through 2.2.78.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-2rjg-8x42-r2x7

больше 3 лет назад

ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based buffer overflow.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-2rjg-7xpp-w8w6

почти 4 года назад

Multiple cross-site scripting (XSS) vulnerabilities in ac4p Mobile allow remote attackers to inject arbitrary web script or HTML via the (1) Taaa parameter to (a) up.php, or the (2) pollhtml and (3) Bloks parameters to (b) polls.php, different vectors than CVE-2006-5770.

EPSS: Низкий
github логотип

GHSA-2rjf-grmv-wrvv

больше 3 лет назад

Cross-site request forgery (CSRF) vulnerability on Cisco TelePresence IP Gateway devices with software 2.0(3.34) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu90734.

EPSS: Низкий
github логотип

GHSA-2rjf-9fvj-83c2

больше 3 лет назад

Integer underflow in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via JavaScript code containing a large RegExp expression.

EPSS: Низкий
github логотип

GHSA-2rjf-47pg-4v46

больше 3 лет назад

A directory traversal vulnerability with remote code execution in Prim'X Zed! FREE through 1.0 build 186 and Zed! Limited Edition through 6.1 build 2208 allows creation of arbitrary files on a user's workstation using crafted ZED! containers because the watermark loading function can place an executable file into a Startup folder.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-2rjc-h554-j93w

почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Avalanche 6.3.2.3490. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the Certificate Management Server service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15449.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-2rjc-3f9w-ghg6

больше 2 лет назад

A vulnerability was found in AO-OPC server versions mentioned above. As the directory information for the service entry is not enclosed in quotation marks, potential attackers could possibly call up another application than the AO-OPC server by starting the service. The service might be started with system user privileges which could cause a shift in user access privileges. It is unlikely to exploit the vulnerability in well maintained Windows installations since the attacker would need write access to system folders. An update is available that resolves the vulnerability found during an internal review in the product AO-OPC = 3.2.1 

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-2rj9-9w62-f3q6

около 3 лет назад

Memory corruption in Bluetooth HOST due to buffer overflow while parsing the command response received from remote

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-2rj9-5j2p-fq98

больше 2 лет назад

A vulnerability was found in YFCMF up to 3.0.4. It has been declared as problematic. This vulnerability affects unknown code of the file index.php. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230542 is the identifier assigned to this vulnerability.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-2rj6-jjxr-v6wr

больше 3 лет назад

NVIDIA Shield TV Experience prior to v8.0.1, NVIDIA Tegra software contains a vulnerability in the bootloader, where it does not validate the fields of the boot image, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.

EPSS: Низкий
github логотип

GHSA-2rj5-gh6q-72fp

3 месяца назад

A malicious actor with access to the management network could exploit a misconfiguration in UniFi’s door access application, UniFi Access, that exposed a management API without proper authentication. This vulnerability was introduced in Version 3.3.22 and was fixed in Version 4.0.21 and later.  Affected Products: UniFi Access Application (Version 3.3.22 through 3.4.31). Mitigation: Update your UniFi Access Application to Version 4.0.21 or later.

CVSS3: 10
EPSS: Средний
github логотип

GHSA-2rj5-2chg-7g5m

больше 3 лет назад

An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32838767. References: B-RB#107459.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-2rj4-3r7h-xp98

почти 4 года назад

Buffer overflow in the Online Registration Facility for Algorithmic Research PrivateWire VPN software up to 3.7 allows remote attackers to execute arbitrary code via a long GET request.

EPSS: Высокий
github логотип

GHSA-2rj3-rg6r-7hhr

около 2 месяцев назад

The Download Manager plugin for WordPress is vulnerable to unauthorized access of sensitive information in all versions up to, and including, 3.3.32. This is due to missing authorization and capability checks on the `wpdm_media_access` AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve passwords and access control settings for protected media attachments, which can then be used to bypass the intended media protection and download restricted files.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-2rj3-qghx-m6qc

больше 3 лет назад

Out-of-bounds read in kernel mode driver for some Intel(R) Wireless Bluetooth(R) products on Windows* 10, may allow a privileged user to potentially enable information disclosure via local access.

EPSS: Низкий
github логотип

GHSA-2rj3-6v2f-79ff

почти 4 года назад

Cross-site scripting (XSS) vulnerability in phpCOIN 1.2.0 through 1.2.1b allows remote attackers to inject arbitrary web script or HTML via (1) the new parameter to mod.php, (2) the w parameter to mod.php, (3) the e parameter to login.php, (4) the o parameter to login.php, and possibly other scripts.

EPSS: Низкий
github логотип

GHSA-2rj3-5w4f-4xjj

6 месяцев назад

ACAP applications can be executed with elevated privileges, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-2rj3-2h3h-5h64

больше 1 года назад

An improper neutralization of inputs during web page generation vulnerability [CWE-79] in FortiNAC version 9.4.0 through 9.4.4, 9.2.0 through 9.2.8, 9.1.0 through 9.1.10, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 7.2.0 through 7.2.3 may allow a remote authenticated attacker to perform stored and reflected cross site scripting (XSS) attack via crafted HTTP requests.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-2rhx-qhxp-5jpw

больше 1 года назад

Submariner Operator sets unnecessary RBAC permissions

CVSS3: 6.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-2rjh-j2p6-q8p5

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in PickPlugins Post Grid.This issue affects Post Grid: from n/a through 2.2.78.

CVSS3: 7.5
1%
Низкий
почти 2 года назад
github логотип
GHSA-2rjg-8x42-r2x7

ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based buffer overflow.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-2rjg-7xpp-w8w6

Multiple cross-site scripting (XSS) vulnerabilities in ac4p Mobile allow remote attackers to inject arbitrary web script or HTML via the (1) Taaa parameter to (a) up.php, or the (2) pollhtml and (3) Bloks parameters to (b) polls.php, different vectors than CVE-2006-5770.

1%
Низкий
почти 4 года назад
github логотип
GHSA-2rjf-grmv-wrvv

Cross-site request forgery (CSRF) vulnerability on Cisco TelePresence IP Gateway devices with software 2.0(3.34) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu90734.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2rjf-9fvj-83c2

Integer underflow in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via JavaScript code containing a large RegExp expression.

3%
Низкий
больше 3 лет назад
github логотип
GHSA-2rjf-47pg-4v46

A directory traversal vulnerability with remote code execution in Prim'X Zed! FREE through 1.0 build 186 and Zed! Limited Edition through 6.1 build 2208 allows creation of arbitrary files on a user's workstation using crafted ZED! containers because the watermark loading function can place an executable file into a Startup folder.

CVSS3: 9.8
2%
Низкий
больше 3 лет назад
github логотип
GHSA-2rjc-h554-j93w

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Avalanche 6.3.2.3490. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the Certificate Management Server service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15449.

CVSS3: 9.8
4%
Низкий
почти 3 года назад
github логотип
GHSA-2rjc-3f9w-ghg6

A vulnerability was found in AO-OPC server versions mentioned above. As the directory information for the service entry is not enclosed in quotation marks, potential attackers could possibly call up another application than the AO-OPC server by starting the service. The service might be started with system user privileges which could cause a shift in user access privileges. It is unlikely to exploit the vulnerability in well maintained Windows installations since the attacker would need write access to system folders. An update is available that resolves the vulnerability found during an internal review in the product AO-OPC = 3.2.1 

CVSS3: 7.2
0%
Низкий
больше 2 лет назад
github логотип
GHSA-2rj9-9w62-f3q6

Memory corruption in Bluetooth HOST due to buffer overflow while parsing the command response received from remote

CVSS3: 8.8
1%
Низкий
около 3 лет назад
github логотип
GHSA-2rj9-5j2p-fq98

A vulnerability was found in YFCMF up to 3.0.4. It has been declared as problematic. This vulnerability affects unknown code of the file index.php. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230542 is the identifier assigned to this vulnerability.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-2rj6-jjxr-v6wr

NVIDIA Shield TV Experience prior to v8.0.1, NVIDIA Tegra software contains a vulnerability in the bootloader, where it does not validate the fields of the boot image, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2rj5-gh6q-72fp

A malicious actor with access to the management network could exploit a misconfiguration in UniFi’s door access application, UniFi Access, that exposed a management API without proper authentication. This vulnerability was introduced in Version 3.3.22 and was fixed in Version 4.0.21 and later.  Affected Products: UniFi Access Application (Version 3.3.22 through 3.4.31). Mitigation: Update your UniFi Access Application to Version 4.0.21 or later.

CVSS3: 10
11%
Средний
3 месяца назад
github логотип
GHSA-2rj5-2chg-7g5m

An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32838767. References: B-RB#107459.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-2rj4-3r7h-xp98

Buffer overflow in the Online Registration Facility for Algorithmic Research PrivateWire VPN software up to 3.7 allows remote attackers to execute arbitrary code via a long GET request.

80%
Высокий
почти 4 года назад
github логотип
GHSA-2rj3-rg6r-7hhr

The Download Manager plugin for WordPress is vulnerable to unauthorized access of sensitive information in all versions up to, and including, 3.3.32. This is due to missing authorization and capability checks on the `wpdm_media_access` AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve passwords and access control settings for protected media attachments, which can then be used to bypass the intended media protection and download restricted files.

CVSS3: 4.3
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-2rj3-qghx-m6qc

Out-of-bounds read in kernel mode driver for some Intel(R) Wireless Bluetooth(R) products on Windows* 10, may allow a privileged user to potentially enable information disclosure via local access.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2rj3-6v2f-79ff

Cross-site scripting (XSS) vulnerability in phpCOIN 1.2.0 through 1.2.1b allows remote attackers to inject arbitrary web script or HTML via (1) the new parameter to mod.php, (2) the w parameter to mod.php, (3) the e parameter to login.php, (4) the o parameter to login.php, and possibly other scripts.

1%
Низкий
почти 4 года назад
github логотип
GHSA-2rj3-5w4f-4xjj

ACAP applications can be executed with elevated privileges, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

CVSS3: 6.7
0%
Низкий
6 месяцев назад
github логотип
GHSA-2rj3-2h3h-5h64

An improper neutralization of inputs during web page generation vulnerability [CWE-79] in FortiNAC version 9.4.0 through 9.4.4, 9.2.0 through 9.2.8, 9.1.0 through 9.1.10, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 7.2.0 through 7.2.3 may allow a remote authenticated attacker to perform stored and reflected cross site scripting (XSS) attack via crafted HTTP requests.

CVSS3: 6.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-2rhx-qhxp-5jpw

Submariner Operator sets unnecessary RBAC permissions

CVSS3: 6.6
0%
Низкий
больше 1 года назад

Уязвимостей на страницу