Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 325 632

Количество 325 632

github логотип

GHSA-2cvc-p4v7-3gpx

почти 4 года назад

TinyBrowser plugin for Joomla! before 1.5.13 allows arbitrary file upload via upload.php.

EPSS: Средний
github логотип

GHSA-2cvc-mc5v-x4cj

больше 3 лет назад

In getBackgroundRestrictionExemptionReason of AppRestrictionController.java, there is a possible way to bypass device policy restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-238377411

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-2cvc-959c-65p4

почти 4 года назад

An issue was discovered in Sage DPW 2020_06_x before 2020_06_002. It allows unauthenticated users to upload JavaScript (in a file) via the expenses claiming functionality. However, to view the file, authentication is required. By exploiting this vulnerability, an attacker can persistently include arbitrary HTML or JavaScript code into the affected web page. The vulnerability can be used to change the contents of the displayed site, redirect to other sites, or steal user credentials. Additionally, users are potential victims of browser exploits and JavaScript malware.

EPSS: Низкий
github логотип

GHSA-2cvc-6m24-c689

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/msm/a7xx: Call CP_RESET_CONTEXT_STATE Calling this packet is necessary when we switch contexts because there are various pieces of state used by userspace to synchronize between BR and BV that are persistent across submits and we need to make sure that they are in a "safe" state when switching contexts. Otherwise a userspace submission in one context could cause another context to function incorrectly and hang, effectively a denial of service (although without leaking data). This was missed during initial a7xx bringup. Patchwork: https://patchwork.freedesktop.org/patch/654924/

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-2cvc-2cmj-7863

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: f2fs: check discard support for conventional zones As the helper function f2fs_bdev_support_discard() shows, f2fs checks if the target block devices support discard by calling bdev_max_discard_sectors() and bdev_is_zoned(). This check works well for most cases, but it does not work for conventional zones on zoned block devices. F2fs assumes that zoned block devices support discard, and calls __submit_discard_cmd(). When __submit_discard_cmd() is called for sequential write required zones, it works fine since __submit_discard_cmd() issues zone reset commands instead of discard commands. However, when __submit_discard_cmd() is called for conventional zones, __blkdev_issue_discard() is called even when the devices do not support discard. The inappropriate __blkdev_issue_discard() call was not a problem before the commit 30f1e7241422 ("block: move discard checks into the ioctl handler") because __blkdev_issue_discard...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-2cv8-fr2g-g66g

около 2 месяцев назад

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TeconceTheme Emerce Core emerce-core allows Blind SQL Injection.This issue affects Emerce Core: from n/a through <= 1.8.

CVSS3: 9.3
EPSS: Низкий
github логотип

GHSA-2cv8-5c3g-j948

около 4 лет назад

Adobe Media Encoder 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-2cv8-4fc6-53r9

7 месяцев назад

Deserialization of Untrusted Data vulnerability in emarket-design WP Ticket Customer Service Software & Support Ticket System allows Object Injection. This issue affects WP Ticket Customer Service Software & Support Ticket System: from n/a through 6.0.2.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-2cv8-42wc-fw72

почти 4 года назад

Multiple cross-site scripting (XSS) vulnerabilities in webadmin/admin.php in @mail 5.6.1 allow remote attackers to inject arbitrary web script or HTML via the (1) type and (2) func parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

EPSS: Низкий
github логотип

GHSA-2cv7-pmwv-rg5j

9 месяцев назад

IBM SmartCloud Analytics - Log Analysis 1.3.7.0, 1.3.7.1, 1.3.7.2, 1.3.8.0, 1.3.8.1, and 1.3.8.2 could allow a local, authenticated attacker to bypass client-side enforcement of security to manipulate data.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-2cv7-m7r7-5xxj

почти 4 года назад

rpc.pcnfsd in HP gives remote root access by changing the permissions on the main printer spool directory.

EPSS: Низкий
github логотип

GHSA-2cv7-399j-p9vv

почти 4 года назад

SQL injection vulnerability in ajax.php in SCORM Cloud For WordPress plugin before 1.0.7 for WordPress allows remote attackers to execute arbitrary SQL commands via the active parameter. NOTE: some of these details are obtained from third party information.

EPSS: Низкий
github логотип

GHSA-2cv6-6437-39p2

около 4 лет назад

Cross-site Scripting in microweber

CVSS3: 4.8
EPSS: Низкий
github логотип

GHSA-2cv6-5p72-5vx5

почти 4 года назад

The option-tree plugin before 2.7.0 for WordPress has Object Injection by leveraging a valid nonce.

EPSS: Низкий
github логотип

GHSA-2cv6-4f2r-jq2c

около 1 года назад

Apache Felix HTTP Webconsole Plugin: XSS in HTTP Webconsole Plugin

CVSS3: 5.6
EPSS: Низкий
github логотип

GHSA-2cv5-qvq3-6276

почти 3 года назад

TeamPass vulnerable to Improper Encoding or Escaping of Output

CVSS3: 7.6
EPSS: Низкий
github логотип

GHSA-2cv5-5qgg-939j

почти 4 года назад

choose_file.php in easy-CMS 0.1.2, when mod_mime is installed, does not restrict uploads of filenames with multiple extensions, which allows remote attackers to execute arbitrary PHP code by uploading a PHP file with a GIF file extension, then directly accessing that file in the Repositories directory.

EPSS: Низкий
github логотип

GHSA-2cv4-7rxg-7hp8

почти 4 года назад

Cross-site scripting (XSS) vulnerability in index.php in Siteman 2.0.x2 allows remote attackers to inject arbitrary web script or HTML via the module parameter, which leaks the path in an error message.

EPSS: Низкий
github логотип

GHSA-2cv3-9jp8-rgg3

больше 3 лет назад

Insufficient validation of untrusted input in V8 in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-2cv2-pmj7-qmcg

9 месяцев назад

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Core Technology). Supported versions that are affected are 8.60, 8.61 and 8.62. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-2cvc-p4v7-3gpx

TinyBrowser plugin for Joomla! before 1.5.13 allows arbitrary file upload via upload.php.

62%
Средний
почти 4 года назад
github логотип
GHSA-2cvc-mc5v-x4cj

In getBackgroundRestrictionExemptionReason of AppRestrictionController.java, there is a possible way to bypass device policy restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-238377411

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-2cvc-959c-65p4

An issue was discovered in Sage DPW 2020_06_x before 2020_06_002. It allows unauthenticated users to upload JavaScript (in a file) via the expenses claiming functionality. However, to view the file, authentication is required. By exploiting this vulnerability, an attacker can persistently include arbitrary HTML or JavaScript code into the affected web page. The vulnerability can be used to change the contents of the displayed site, redirect to other sites, or steal user credentials. Additionally, users are potential victims of browser exploits and JavaScript malware.

1%
Низкий
почти 4 года назад
github логотип
GHSA-2cvc-6m24-c689

In the Linux kernel, the following vulnerability has been resolved: drm/msm/a7xx: Call CP_RESET_CONTEXT_STATE Calling this packet is necessary when we switch contexts because there are various pieces of state used by userspace to synchronize between BR and BV that are persistent across submits and we need to make sure that they are in a "safe" state when switching contexts. Otherwise a userspace submission in one context could cause another context to function incorrectly and hang, effectively a denial of service (although without leaking data). This was missed during initial a7xx bringup. Patchwork: https://patchwork.freedesktop.org/patch/654924/

CVSS3: 5.5
0%
Низкий
9 месяцев назад
github логотип
GHSA-2cvc-2cmj-7863

In the Linux kernel, the following vulnerability has been resolved: f2fs: check discard support for conventional zones As the helper function f2fs_bdev_support_discard() shows, f2fs checks if the target block devices support discard by calling bdev_max_discard_sectors() and bdev_is_zoned(). This check works well for most cases, but it does not work for conventional zones on zoned block devices. F2fs assumes that zoned block devices support discard, and calls __submit_discard_cmd(). When __submit_discard_cmd() is called for sequential write required zones, it works fine since __submit_discard_cmd() issues zone reset commands instead of discard commands. However, when __submit_discard_cmd() is called for conventional zones, __blkdev_issue_discard() is called even when the devices do not support discard. The inappropriate __blkdev_issue_discard() call was not a problem before the commit 30f1e7241422 ("block: move discard checks into the ioctl handler") because __blkdev_issue_discard...

CVSS3: 5.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-2cv8-fr2g-g66g

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TeconceTheme Emerce Core emerce-core allows Blind SQL Injection.This issue affects Emerce Core: from n/a through <= 1.8.

CVSS3: 9.3
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-2cv8-5c3g-j948

Adobe Media Encoder 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS3: 5.5
1%
Низкий
около 4 лет назад
github логотип
GHSA-2cv8-4fc6-53r9

Deserialization of Untrusted Data vulnerability in emarket-design WP Ticket Customer Service Software & Support Ticket System allows Object Injection. This issue affects WP Ticket Customer Service Software & Support Ticket System: from n/a through 6.0.2.

CVSS3: 8.1
0%
Низкий
7 месяцев назад
github логотип
GHSA-2cv8-42wc-fw72

Multiple cross-site scripting (XSS) vulnerabilities in webadmin/admin.php in @mail 5.6.1 allow remote attackers to inject arbitrary web script or HTML via the (1) type and (2) func parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

0%
Низкий
почти 4 года назад
github логотип
GHSA-2cv7-pmwv-rg5j

IBM SmartCloud Analytics - Log Analysis 1.3.7.0, 1.3.7.1, 1.3.7.2, 1.3.8.0, 1.3.8.1, and 1.3.8.2 could allow a local, authenticated attacker to bypass client-side enforcement of security to manipulate data.

CVSS3: 5.5
0%
Низкий
9 месяцев назад
github логотип
GHSA-2cv7-m7r7-5xxj

rpc.pcnfsd in HP gives remote root access by changing the permissions on the main printer spool directory.

0%
Низкий
почти 4 года назад
github логотип
GHSA-2cv7-399j-p9vv

SQL injection vulnerability in ajax.php in SCORM Cloud For WordPress plugin before 1.0.7 for WordPress allows remote attackers to execute arbitrary SQL commands via the active parameter. NOTE: some of these details are obtained from third party information.

0%
Низкий
почти 4 года назад
github логотип
GHSA-2cv6-6437-39p2

Cross-site Scripting in microweber

CVSS3: 4.8
0%
Низкий
около 4 лет назад
github логотип
GHSA-2cv6-5p72-5vx5

The option-tree plugin before 2.7.0 for WordPress has Object Injection by leveraging a valid nonce.

1%
Низкий
почти 4 года назад
github логотип
GHSA-2cv6-4f2r-jq2c

Apache Felix HTTP Webconsole Plugin: XSS in HTTP Webconsole Plugin

CVSS3: 5.6
0%
Низкий
около 1 года назад
github логотип
GHSA-2cv5-qvq3-6276

TeamPass vulnerable to Improper Encoding or Escaping of Output

CVSS3: 7.6
0%
Низкий
почти 3 года назад
github логотип
GHSA-2cv5-5qgg-939j

choose_file.php in easy-CMS 0.1.2, when mod_mime is installed, does not restrict uploads of filenames with multiple extensions, which allows remote attackers to execute arbitrary PHP code by uploading a PHP file with a GIF file extension, then directly accessing that file in the Repositories directory.

1%
Низкий
почти 4 года назад
github логотип
GHSA-2cv4-7rxg-7hp8

Cross-site scripting (XSS) vulnerability in index.php in Siteman 2.0.x2 allows remote attackers to inject arbitrary web script or HTML via the module parameter, which leaks the path in an error message.

3%
Низкий
почти 4 года назад
github логотип
GHSA-2cv3-9jp8-rgg3

Insufficient validation of untrusted input in V8 in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-2cv2-pmj7-qmcg

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Core Technology). Supported versions that are affected are 8.60, 8.61 and 8.62. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).

CVSS3: 4.3
0%
Низкий
9 месяцев назад

Уязвимостей на страницу