Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 314 529

Количество 314 529

github логотип

GHSA-2g9x-g93g-hv56

около 1 года назад

In Flagsmith before 2.134.1, the get_document endpoint is not correctly protected by permissions.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-2g9w-mw43-7j8w

почти 2 года назад

A vulnerability classified as critical was found in code-projects Online Book System 1.0. This vulnerability affects unknown code of the file /index.php. The manipulation of the argument username/password/login_username/login_password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258202 is the identifier assigned to this vulnerability.

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-2g9r-w7mh-f2h2

8 месяцев назад

A vulnerability was found in Signal App 7.41.4 on Android. It has been declared as problematic. This vulnerability affects unknown code of the component Biometric Authentication Handler. The manipulation leads to missing critical step in authentication. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 3.8
EPSS: Низкий
github логотип

GHSA-2g9r-9mj3-xx54

почти 4 года назад

Incorrect default permissions in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access.

CVSS3: 4.4
EPSS: Низкий
github логотип

GHSA-2g9r-9f99-v27g

больше 3 лет назад

yaws_config.erl in Yaws through 2.0.2 and/or 2.0.7 loads obsolete TLS ciphers, as demonstrated by ones that allow Sweet32 attacks.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-2g9r-93qh-95qh

больше 3 лет назад

HPE Insight Control server deployment allows remote attackers to obtain sensitive information via unspecified vectors.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-2g9r-8jcw-8cxp

больше 3 лет назад

The Device Work Center (DWC) component in Cisco Prime Network Control System (NCS) 2.1(0.0.85), 2.2(0.0.58), and 2.2(0.0.69) does not properly implement AAA roles, which allows remote authenticated users to bypass intended access restrictions and execute commands via a login session, aka Bug ID CSCur27371.

EPSS: Низкий
github логотип

GHSA-2g9q-g8g7-r7xw

больше 3 лет назад

Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.

EPSS: Низкий
github логотип

GHSA-2g9q-chq2-w8qw

почти 7 лет назад

Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-2g9p-g9jc-w2xw

больше 3 лет назад

Baxter ExactaMix EM 2400 & EM 1200, Versions ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versions 1.10, 1.11, and 1.13, and ExactaMix EM1200 Versions 1.1, 1.2, and 1.4 have hard-coded administrative account credentials for the ExactaMix application. Successful exploitation of this vulnerability may allow an attacker with physical access to gain unauthorized access to view/update system configuration or data. This could impact confidentiality and integrity of the system and risk exposure of sensitive information including PHI.

EPSS: Низкий
github логотип

GHSA-2g9p-5c67-wgrr

больше 3 лет назад

DedeCMS 5.7 SP2 has SQL Injection via the dede\co_do.php ids parameter.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-2g9p-2pv5-997p

больше 3 лет назад

A vulnerability, which was classified as critical, was found in Axiomatic Bento4. This affects the function AP4_MemoryByteStream::WritePartial of the file Ap4ByteStream.cpp of the component mp42aac. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212007.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-2g9m-cfmh-9r83

больше 3 лет назад

Code by Zapier before 2022-08-17 allowed intra-account privilege escalation that included execution of Python or JavaScript code. In other words, Code by Zapier was providing a customer-controlled general-purpose virtual machine that unintentionally granted full access to all users of a company's account, but was supposed to enforce role-based access control within that company's account. Before 2022-08-17, a customer could have resolved this by (in effect) using a separate virtual machine for an application that held credentials - or other secrets - that weren't supposed to be shared among all of its employees. (Multiple accounts would have been needed to operate these independent virtual machines.)

CVSS3: 9.9
EPSS: Низкий
github логотип

GHSA-2g9m-9qhc-m426

около 1 года назад

A vulnerability, which was classified as problematic, has been found in code-projects Online Book Shop 1.0. Affected by this issue is some unknown functionality of the file /subcat.php. The manipulation of the argument catnm leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 3.5
EPSS: Низкий
github логотип

GHSA-2g9j-pxq8-pw9c

больше 1 года назад

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CridioStudio ListingPro allows PHP Local File Inclusion.This issue affects ListingPro: from n/a through 2.9.3.

CVSS3: 9
EPSS: Низкий
github логотип

GHSA-2g9j-9x3c-w748

больше 3 лет назад

A reflected XSS vulnerability in index.php in MyBB 1.8.x through 1.8.19 allows remote attackers to inject JavaScript via the 'upsetting[bburl]' parameter.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-2g9j-4mvx-6c42

больше 3 лет назад

Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.

EPSS: Низкий
github логотип

GHSA-2g9h-j7jv-49v3

почти 4 года назад

Cross-site scripting (XSS) vulnerability in search.php in Particle Gallery 1.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the order parameter.

EPSS: Низкий
github логотип

GHSA-2g9h-hx22-r5p2

около 2 месяцев назад

The OTA firmware update mechanism in Netun Solutions HelpFlash IoT (firmware v18_178_221102_ASCII_PRO_1R5_50) uses hard-coded WiFi credentials identical across all devices and does not authenticate update servers or validate firmware signatures. An attacker with brief physical access can activate OTA mode (8-second button press), create a malicious WiFi AP using the known credentials, and serve malicious firmware via unauthenticated HTTP to achieve arbitrary code execution on this safety-critical emergency signaling device.

CVSS3: 6.6
EPSS: Низкий
github логотип

GHSA-2g9h-3ggp-8xg3

почти 4 года назад

twiddle.sh in JBoss AS 5.0 and EAP 5.0 and earlier accepts credentials as command-line arguments, which allows local users to read the credentials by listing the process and its arguments.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-2g9x-g93g-hv56

In Flagsmith before 2.134.1, the get_document endpoint is not correctly protected by permissions.

CVSS3: 7.5
0%
Низкий
около 1 года назад
github логотип
GHSA-2g9w-mw43-7j8w

A vulnerability classified as critical was found in code-projects Online Book System 1.0. This vulnerability affects unknown code of the file /index.php. The manipulation of the argument username/password/login_username/login_password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258202 is the identifier assigned to this vulnerability.

CVSS3: 7.3
0%
Низкий
почти 2 года назад
github логотип
GHSA-2g9r-w7mh-f2h2

A vulnerability was found in Signal App 7.41.4 on Android. It has been declared as problematic. This vulnerability affects unknown code of the component Biometric Authentication Handler. The manipulation leads to missing critical step in authentication. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 3.8
0%
Низкий
8 месяцев назад
github логотип
GHSA-2g9r-9mj3-xx54

Incorrect default permissions in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access.

CVSS3: 4.4
0%
Низкий
почти 4 года назад
github логотип
GHSA-2g9r-9f99-v27g

yaws_config.erl in Yaws through 2.0.2 and/or 2.0.7 loads obsolete TLS ciphers, as demonstrated by ones that allow Sweet32 attacks.

CVSS3: 5.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-2g9r-93qh-95qh

HPE Insight Control server deployment allows remote attackers to obtain sensitive information via unspecified vectors.

CVSS3: 7.5
2%
Низкий
больше 3 лет назад
github логотип
GHSA-2g9r-8jcw-8cxp

The Device Work Center (DWC) component in Cisco Prime Network Control System (NCS) 2.1(0.0.85), 2.2(0.0.58), and 2.2(0.0.69) does not properly implement AAA roles, which allows remote authenticated users to bypass intended access restrictions and execute commands via a login session, aka Bug ID CSCur27371.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2g9q-g8g7-r7xw

Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-2g9q-chq2-w8qw

Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service

CVSS3: 4.3
0%
Низкий
почти 7 лет назад
github логотип
GHSA-2g9p-g9jc-w2xw

Baxter ExactaMix EM 2400 & EM 1200, Versions ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versions 1.10, 1.11, and 1.13, and ExactaMix EM1200 Versions 1.1, 1.2, and 1.4 have hard-coded administrative account credentials for the ExactaMix application. Successful exploitation of this vulnerability may allow an attacker with physical access to gain unauthorized access to view/update system configuration or data. This could impact confidentiality and integrity of the system and risk exposure of sensitive information including PHI.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2g9p-5c67-wgrr

DedeCMS 5.7 SP2 has SQL Injection via the dede\co_do.php ids parameter.

CVSS3: 9.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-2g9p-2pv5-997p

A vulnerability, which was classified as critical, was found in Axiomatic Bento4. This affects the function AP4_MemoryByteStream::WritePartial of the file Ap4ByteStream.cpp of the component mp42aac. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212007.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-2g9m-cfmh-9r83

Code by Zapier before 2022-08-17 allowed intra-account privilege escalation that included execution of Python or JavaScript code. In other words, Code by Zapier was providing a customer-controlled general-purpose virtual machine that unintentionally granted full access to all users of a company's account, but was supposed to enforce role-based access control within that company's account. Before 2022-08-17, a customer could have resolved this by (in effect) using a separate virtual machine for an application that held credentials - or other secrets - that weren't supposed to be shared among all of its employees. (Multiple accounts would have been needed to operate these independent virtual machines.)

CVSS3: 9.9
1%
Низкий
больше 3 лет назад
github логотип
GHSA-2g9m-9qhc-m426

A vulnerability, which was classified as problematic, has been found in code-projects Online Book Shop 1.0. Affected by this issue is some unknown functionality of the file /subcat.php. The manipulation of the argument catnm leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 3.5
0%
Низкий
около 1 года назад
github логотип
GHSA-2g9j-pxq8-pw9c

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CridioStudio ListingPro allows PHP Local File Inclusion.This issue affects ListingPro: from n/a through 2.9.3.

CVSS3: 9
2%
Низкий
больше 1 года назад
github логотип
GHSA-2g9j-9x3c-w748

A reflected XSS vulnerability in index.php in MyBB 1.8.x through 1.8.19 allows remote attackers to inject JavaScript via the 'upsetting[bburl]' parameter.

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-2g9j-4mvx-6c42

Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-2g9h-j7jv-49v3

Cross-site scripting (XSS) vulnerability in search.php in Particle Gallery 1.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the order parameter.

6%
Низкий
почти 4 года назад
github логотип
GHSA-2g9h-hx22-r5p2

The OTA firmware update mechanism in Netun Solutions HelpFlash IoT (firmware v18_178_221102_ASCII_PRO_1R5_50) uses hard-coded WiFi credentials identical across all devices and does not authenticate update servers or validate firmware signatures. An attacker with brief physical access can activate OTA mode (8-second button press), create a malicious WiFi AP using the known credentials, and serve malicious firmware via unauthenticated HTTP to achieve arbitrary code execution on this safety-critical emergency signaling device.

CVSS3: 6.6
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-2g9h-3ggp-8xg3

twiddle.sh in JBoss AS 5.0 and EAP 5.0 and earlier accepts credentials as command-line arguments, which allows local users to read the credentials by listing the process and its arguments.

0%
Низкий
почти 4 года назад

Уязвимостей на страницу