Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 314 928

Количество 314 928

github логотип

GHSA-2252-3h45-p3hv

больше 3 лет назад

Cross-site scripting (XSS) vulnerability in the Web Admin Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.22 and 6.3 before 6.3.0.11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

EPSS: Низкий
github логотип

GHSA-2252-2x7m-w7r8

больше 3 лет назад

Heap-based buffer overflow in the ms_escher_get_data function in plugins/excel/ms-escher.c in GNOME Office Gnumeric before 1.12.9 allows remote attackers to cause a denial of service (crash) via a crafted xls file with a crafted length value.

EPSS: Низкий
github логотип

GHSA-224x-44xc-3gcf

около 1 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
github логотип

GHSA-224v-g4hw-hwxj

почти 4 года назад

Multiple buffer overflows in Tomahawk SteelArrow before 4.5 allow remote attackers to execute arbitrary code via (1) the Steelarrow Service (Steelarrow.exe) using a long UserIdent Cookie header, (2) DLLHOST.EXE (Steelarrow.dll) via a request for a long .aro file, or (3) DLLHOST.EXE via a Chunked Transfer-Encoding request.

EPSS: Низкий
github логотип

GHSA-224v-7q6x-2x5f

больше 3 лет назад

Certain TP-Link devices allow Command Injection. This affects NC200 2.1.9 build 200225, NC210 1.0.9 build 200304, NC220 1.3.0 build 200304, NC230 1.3.0 build 200304, NC250 1.3.0 build 200304, NC260 1.5.2 build 200304, and NC450 1.5.3 build 200304.

CVSS3: 8.8
EPSS: Высокий
github логотип

GHSA-224v-6x99-6pp7

больше 3 лет назад

In Progress MOVEit Transfer 10.2 before 10.2.6 (2018.3), 11.0 before 11.0.4 (2019.0.4), and 11.1 before 11.1.3 (2019.1.3), multiple SQL Injection vulnerabilities have been found in the REST API that could allow an unauthenticated attacker to gain unauthorized access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database or may be able to alter the database.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-224p-vx89-7gp5

8 дней назад

Shenzhen Tenda AC7 firmware version V03.03.03.01_cn and prior contain an improper output encoding vulnerability in the web management interface. User-supplied input is reflected in HTTP responses without adequate escaping, allowing injection of arbitrary HTML or JavaScript in a victim’s browser context.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-224p-v68g-5g8f

6 месяцев назад

GraphQL Armor Max-Depth Plugin Bypass via fragment caching

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-224p-qx2h-m4rg

больше 3 лет назад

A SQL injection vulnerability in /oa.php?c=Staff&a=read of Find a Place LJCMS v 1.3 allows attackers to access sensitive database information via a crafted POST request.

EPSS: Низкий
github логотип

GHSA-224p-qr6q-c376

больше 3 лет назад

Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Microsoft Browser ASLR Bypass."

EPSS: Низкий
github логотип

GHSA-224p-h66f-prf2

больше 2 лет назад

Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-224p-6f6c-j2f6

4 месяца назад

Adobe Connect versions 12.9 and earlier are affected by a URL Redirection to Untrusted Site ('Open Redirect') vulnerability. An attacker could leverage this vulnerability to redirect users to malicious websites. Exploitation of this issue requires user interaction in that a victim must click on a crafted link.

CVSS3: 3.1
EPSS: Низкий
github логотип

GHSA-224m-8wrv-4v8r

больше 3 лет назад

Mozilla Firefox 3.0.19, 3.5.x, and 3.6.x allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid (1) news:// or (2) nntp:// URIs.

EPSS: Низкий
github логотип

GHSA-224m-5fj7-xcf7

больше 3 лет назад

Windows Remote Desktop Protocol Core Security Feature Bypass Vulnerability

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-224j-3632-5gqr

больше 3 лет назад

The Jetpack Scan team identified a Reflected Cross-Site Scripting via the patreon_save_attachment_patreon_level AJAX action of the Patreon WordPress plugin before 1.7.2. This AJAX hook is used to update the pledge level required by Patreon subscribers to access a given attachment. This action is accessible for user accounts with the ‘manage_options’ privilege (i.e.., only administrators). Unfortunately, one of the parameters used in this AJAX endpoint is not sanitized before being printed back to the user, so the risk it represents is the same as the previous XSS vulnerability.

EPSS: Низкий
github логотип

GHSA-224h-vf26-wvfw

около 1 года назад

The password change function at /cgi/admin.cgi does not require the current/old password, which makes the application vulnerable to account takeover. An attacker can use this to forcefully set a new password within the -rsetpass+-aaction+- parameter for a user without knowing the old password, e.g. by exploiting a CSRF issue.

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-224h-p7p5-rh85

больше 5 лет назад

Directory Traversal in wenluhong1

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-224h-mqw6-642p

почти 4 года назад

The WP Statistics WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the browser parameter found in the ~/includes/class-wp-statistics-visitor.php file which allows attackers to inject arbitrary web scripts onto several pages that execute when site administrators view a sites statistics, in versions up to and including 13.1.5.

EPSS: Низкий
github логотип

GHSA-224h-m2mg-r929

больше 1 года назад

DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-224g-q27w-pv8f

больше 3 лет назад

Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL.

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-2252-3h45-p3hv

Cross-site scripting (XSS) vulnerability in the Web Admin Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.22 and 6.3 before 6.3.0.11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2252-2x7m-w7r8

Heap-based buffer overflow in the ms_escher_get_data function in plugins/excel/ms-escher.c in GNOME Office Gnumeric before 1.12.9 allows remote attackers to cause a denial of service (crash) via a crafted xls file with a crafted length value.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-224x-44xc-3gcf

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

около 1 года назад
github логотип
GHSA-224v-g4hw-hwxj

Multiple buffer overflows in Tomahawk SteelArrow before 4.5 allow remote attackers to execute arbitrary code via (1) the Steelarrow Service (Steelarrow.exe) using a long UserIdent Cookie header, (2) DLLHOST.EXE (Steelarrow.dll) via a request for a long .aro file, or (3) DLLHOST.EXE via a Chunked Transfer-Encoding request.

6%
Низкий
почти 4 года назад
github логотип
GHSA-224v-7q6x-2x5f

Certain TP-Link devices allow Command Injection. This affects NC200 2.1.9 build 200225, NC210 1.0.9 build 200304, NC220 1.3.0 build 200304, NC230 1.3.0 build 200304, NC250 1.3.0 build 200304, NC260 1.5.2 build 200304, and NC450 1.5.3 build 200304.

CVSS3: 8.8
81%
Высокий
больше 3 лет назад
github логотип
GHSA-224v-6x99-6pp7

In Progress MOVEit Transfer 10.2 before 10.2.6 (2018.3), 11.0 before 11.0.4 (2019.0.4), and 11.1 before 11.1.3 (2019.1.3), multiple SQL Injection vulnerabilities have been found in the REST API that could allow an unauthenticated attacker to gain unauthorized access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database or may be able to alter the database.

CVSS3: 9.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-224p-vx89-7gp5

Shenzhen Tenda AC7 firmware version V03.03.03.01_cn and prior contain an improper output encoding vulnerability in the web management interface. User-supplied input is reflected in HTTP responses without adequate escaping, allowing injection of arbitrary HTML or JavaScript in a victim’s browser context.

CVSS3: 6.1
0%
Низкий
8 дней назад
github логотип
GHSA-224p-v68g-5g8f

GraphQL Armor Max-Depth Plugin Bypass via fragment caching

CVSS3: 5.3
6 месяцев назад
github логотип
GHSA-224p-qx2h-m4rg

A SQL injection vulnerability in /oa.php?c=Staff&a=read of Find a Place LJCMS v 1.3 allows attackers to access sensitive database information via a crafted POST request.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-224p-qr6q-c376

Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Microsoft Browser ASLR Bypass."

9%
Низкий
больше 3 лет назад
github логотип
GHSA-224p-h66f-prf2

Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability

CVSS3: 5.9
1%
Низкий
больше 2 лет назад
github логотип
GHSA-224p-6f6c-j2f6

Adobe Connect versions 12.9 and earlier are affected by a URL Redirection to Untrusted Site ('Open Redirect') vulnerability. An attacker could leverage this vulnerability to redirect users to malicious websites. Exploitation of this issue requires user interaction in that a victim must click on a crafted link.

CVSS3: 3.1
0%
Низкий
4 месяца назад
github логотип
GHSA-224m-8wrv-4v8r

Mozilla Firefox 3.0.19, 3.5.x, and 3.6.x allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid (1) news:// or (2) nntp:// URIs.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-224m-5fj7-xcf7

Windows Remote Desktop Protocol Core Security Feature Bypass Vulnerability

CVSS3: 8.8
3%
Низкий
больше 3 лет назад
github логотип
GHSA-224j-3632-5gqr

The Jetpack Scan team identified a Reflected Cross-Site Scripting via the patreon_save_attachment_patreon_level AJAX action of the Patreon WordPress plugin before 1.7.2. This AJAX hook is used to update the pledge level required by Patreon subscribers to access a given attachment. This action is accessible for user accounts with the ‘manage_options’ privilege (i.e.., only administrators). Unfortunately, one of the parameters used in this AJAX endpoint is not sanitized before being printed back to the user, so the risk it represents is the same as the previous XSS vulnerability.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-224h-vf26-wvfw

The password change function at /cgi/admin.cgi does not require the current/old password, which makes the application vulnerable to account takeover. An attacker can use this to forcefully set a new password within the -rsetpass+-aaction+- parameter for a user without knowing the old password, e.g. by exploiting a CSRF issue.

CVSS3: 8.4
0%
Низкий
около 1 года назад
github логотип
GHSA-224h-p7p5-rh85

Directory Traversal in wenluhong1

CVSS3: 7.5
больше 5 лет назад
github логотип
GHSA-224h-mqw6-642p

The WP Statistics WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the browser parameter found in the ~/includes/class-wp-statistics-visitor.php file which allows attackers to inject arbitrary web scripts onto several pages that execute when site administrators view a sites statistics, in versions up to and including 13.1.5.

1%
Низкий
почти 4 года назад
github логотип
GHSA-224h-m2mg-r929

DrayTek Vigor3910 devices through 4.3.2.6 allow unauthenticated DOM-based reflected XSS.

CVSS3: 6.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-224g-q27w-pv8f

Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL.

CVSS3: 6.1
7%
Низкий
больше 3 лет назад

Уязвимостей на страницу