Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 313 854

Количество 313 854

github логотип

GHSA-255r-3prx-mf99

почти 3 года назад

`rmp-serde` `Raw` and `RawRef` may crash when receiving invalid UTF-8

EPSS: Низкий
github логотип

GHSA-255q-f9p7-jxj6

больше 2 лет назад

Microsoft SharePoint Server Spoofing Vulnerability

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-255p-hfwr-9qm4

больше 3 лет назад

This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Monterey 12.4. An app with root privileges may be able to access private information.

CVSS3: 4.4
EPSS: Низкий
github логотип

GHSA-255p-hfc6-whjx

больше 3 лет назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14021.

EPSS: Низкий
github логотип

GHSA-255m-x7w5-9w65

12 месяцев назад

Use of Hard-coded Credentials vulnerability in ABB ASPECT-Enterprise, ABB NEXUS Series, ABB MATRIX Series.This issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-255m-v9ff-ggrc

больше 3 лет назад

The doPayouts() function of the smart contract implementation for MegaCryptoPolis, an Ethereum game, has a Denial of Service vulnerability. If a smart contract that has a fallback function always causing exceptions buys a land, users cannot buy lands near that contract's land, because those purchase attempts will not be completed unless the doPayouts() function successfully sends Ether to certain neighbors.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-255m-r5v7-p5hq

больше 3 лет назад

A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-255m-8v4r-mcgr

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: tls: stop recv() if initial process_rx_list gave us non-DATA If we have a non-DATA record on the rx_list and another record of the same type still on the queue, we will end up merging them: - process_rx_list copies the non-DATA record - we start the loop and process the first available record since it's of the same type - we break out of the loop since the record was not DATA Just check the record type and jump to the end in case process_rx_list did some work.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-255j-qw47-wjh5

30 дней назад

Craft CMS vulnerable to potential authenticated Remote Code Execution via malicious attached Behavior

EPSS: Низкий
github логотип

GHSA-255j-gp8h-r5hh

больше 3 лет назад

The documents application in ownCloud Server 6.x before 6.0.6 and 7.x before 7.0.3 allows remote authenticated users to obtain all valid session IDs via an unspecified API method.

EPSS: Низкий
github логотип

GHSA-255j-5m9h-c8jh

больше 3 лет назад

The OpenBook Book Data WordPress plugin through 3.5.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping as well

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-255j-56mh-hp3w

больше 3 лет назад

IBM UrbanCode Deploy (UCD) 6.1 and 6.2 could allow an authenticated user to edit objects that they should not have access to due to improper access controls. IBM X-Force ID: 128691.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-255j-2693-vhwc

больше 3 лет назад

FusionCompute 8.0.0 have local privilege escalation vulnerability. A local, authenticated attacker could perform specific operations to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege and compromise the service.

EPSS: Низкий
github логотип

GHSA-255h-xw34-5qmq

больше 1 года назад

A vulnerability, which was classified as problematic, was found in projectsend up to r1605. Affected is the function generate_random_string of the file includes/functions.php of the component Password Reset Token Handler. The manipulation leads to insufficiently random values. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version r1720 is able to address this issue. The name of the patch is aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. It is recommended to upgrade the affected component.

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-255h-29g9-9gqp

7 месяцев назад

A vulnerability was found in descreekert wx-discuz up to 12bd4745c63ec203cb32119bf77ead4a923bf277. It has been classified as problematic. This affects the function validToken of the file /wx.php. The manipulation of the argument echostr leads to cross site scripting. It is possible to initiate the attack remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.

CVSS3: 3.5
EPSS: Низкий
github логотип

GHSA-255g-8gjp-2wq6

больше 3 лет назад

An authentication brute-force protection mechanism bypass in telnetd in D-Link Router model DIR-842 firmware version 3.0.2 allows a remote attacker to circumvent the anti-brute-force cool-down delay period via a timing-based side-channel attack

EPSS: Низкий
github логотип

GHSA-255c-8m52-v92x

больше 3 лет назад

The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.

EPSS: Низкий
github логотип

GHSA-2559-vqhj-7wfx

11 месяцев назад

The Order Attachments for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.5.1 via the 'uploads' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads directory which can contain file attachments added to orders.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-2559-m273-3qpf

больше 3 лет назад

An information disclosure vulnerability in rConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote authenticated attackers to read files on the system via a crafted request sent to to the /lib/crud/configcompare.crud.php script.

EPSS: Низкий
github логотип

GHSA-2557-x9mg-76w8

почти 2 года назад

ASA-2024-002: Default `PrepareProposalHandler` may produce invalid proposals when used with default `SenderNonceMempool`

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-255r-3prx-mf99

`rmp-serde` `Raw` and `RawRef` may crash when receiving invalid UTF-8

почти 3 года назад
github логотип
GHSA-255q-f9p7-jxj6

Microsoft SharePoint Server Spoofing Vulnerability

CVSS3: 8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-255p-hfwr-9qm4

This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Monterey 12.4. An app with root privileges may be able to access private information.

CVSS3: 4.4
0%
Низкий
больше 3 лет назад
github логотип
GHSA-255p-hfc6-whjx

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14021.

3%
Низкий
больше 3 лет назад
github логотип
GHSA-255m-x7w5-9w65

Use of Hard-coded Credentials vulnerability in ABB ASPECT-Enterprise, ABB NEXUS Series, ABB MATRIX Series.This issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03.

CVSS3: 9.8
0%
Низкий
12 месяцев назад
github логотип
GHSA-255m-v9ff-ggrc

The doPayouts() function of the smart contract implementation for MegaCryptoPolis, an Ethereum game, has a Denial of Service vulnerability. If a smart contract that has a fallback function always causing exceptions buys a land, users cannot buy lands near that contract's land, because those purchase attempts will not be completed unless the doPayouts() function successfully sends Ether to certain neighbors.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-255m-r5v7-p5hq

A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-255m-8v4r-mcgr

In the Linux kernel, the following vulnerability has been resolved: tls: stop recv() if initial process_rx_list gave us non-DATA If we have a non-DATA record on the rx_list and another record of the same type still on the queue, we will end up merging them: - process_rx_list copies the non-DATA record - we start the loop and process the first available record since it's of the same type - we break out of the loop since the record was not DATA Just check the record type and jump to the end in case process_rx_list did some work.

CVSS3: 5.5
0%
Низкий
6 месяцев назад
github логотип
GHSA-255j-qw47-wjh5

Craft CMS vulnerable to potential authenticated Remote Code Execution via malicious attached Behavior

1%
Низкий
30 дней назад
github логотип
GHSA-255j-gp8h-r5hh

The documents application in ownCloud Server 6.x before 6.0.6 and 7.x before 7.0.3 allows remote authenticated users to obtain all valid session IDs via an unspecified API method.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-255j-5m9h-c8jh

The OpenBook Book Data WordPress plugin through 3.5.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping as well

CVSS3: 4.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-255j-56mh-hp3w

IBM UrbanCode Deploy (UCD) 6.1 and 6.2 could allow an authenticated user to edit objects that they should not have access to due to improper access controls. IBM X-Force ID: 128691.

CVSS3: 5.4
0%
Низкий
больше 3 лет назад
github логотип
GHSA-255j-2693-vhwc

FusionCompute 8.0.0 have local privilege escalation vulnerability. A local, authenticated attacker could perform specific operations to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege and compromise the service.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-255h-xw34-5qmq

A vulnerability, which was classified as problematic, was found in projectsend up to r1605. Affected is the function generate_random_string of the file includes/functions.php of the component Password Reset Token Handler. The manipulation leads to insufficiently random values. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version r1720 is able to address this issue. The name of the patch is aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. It is recommended to upgrade the affected component.

CVSS3: 3.7
0%
Низкий
больше 1 года назад
github логотип
GHSA-255h-29g9-9gqp

A vulnerability was found in descreekert wx-discuz up to 12bd4745c63ec203cb32119bf77ead4a923bf277. It has been classified as problematic. This affects the function validToken of the file /wx.php. The manipulation of the argument echostr leads to cross site scripting. It is possible to initiate the attack remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.

CVSS3: 3.5
0%
Низкий
7 месяцев назад
github логотип
GHSA-255g-8gjp-2wq6

An authentication brute-force protection mechanism bypass in telnetd in D-Link Router model DIR-842 firmware version 3.0.2 allows a remote attacker to circumvent the anti-brute-force cool-down delay period via a timing-based side-channel attack

7%
Низкий
больше 3 лет назад
github логотип
GHSA-255c-8m52-v92x

The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-2559-vqhj-7wfx

The Order Attachments for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.5.1 via the 'uploads' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads directory which can contain file attachments added to orders.

CVSS3: 5.9
0%
Низкий
11 месяцев назад
github логотип
GHSA-2559-m273-3qpf

An information disclosure vulnerability in rConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote authenticated attackers to read files on the system via a crafted request sent to to the /lib/crud/configcompare.crud.php script.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2557-x9mg-76w8

ASA-2024-002: Default `PrepareProposalHandler` may produce invalid proposals when used with default `SenderNonceMempool`

CVSS3: 5.3
почти 2 года назад

Уязвимостей на страницу