Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 323 805

Количество 323 805

github логотип

GHSA-2722-p93p-vrgm

около 1 года назад

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability allows OS Command Injection as root This issue affects Iocharger firmware for AC model chargers before version 24120701. Likelihood: High. However, the attacker will need a (low privilege) account to gain access to the action.exe CGI binary and upload the crafted firmware file, or convince a user with such access to upload it. Impact: Critical – The attacker has full control over the charging station as the root user, and can arbitrarily add, modify and deletefiles and services. CVSS clarification: Any network interface serving the web ui is vulnerable (AV:N) and there are not additional security measures to circumvent (AC:L), nor does the attack require and existing preconditions (AT:N). The attack is authenticated, but the level of authentication does not matter (PR:L), nor is any user interaction required (UI:N). The attack leads to a full compromised (VC:H/VI:H/VA:H), and comp...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-26xx-m4q2-xhq8

больше 4 лет назад

Spree Auth Devise vulnerability allows for authentication bypass through CSRF weakness

CVSS3: 9.3
EPSS: Низкий
github логотип

GHSA-26xx-jvvm-7pfr

почти 4 года назад

SQL injection vulnerability in the Store Locator extension before 1.2.8 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

EPSS: Низкий
github логотип

GHSA-26xx-j6q3-j3rf

почти 4 года назад

The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."

EPSS: Низкий
github логотип

GHSA-26xv-gjx4-vj92

5 месяцев назад

The WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 7.8.2, due to improper CORS handling on the Store API's REST endpoints allowing direct external access from any origin. This can allow unauthenticated attackers to extract sensitive user information including PII(Personal Identifiable Information).

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-26xv-73mx-mq4r

8 месяцев назад

YugabyteDB has been collecting diagnostics information from YugabyteDB servers, which may include sensitive gflag configurations. To mitigate this, we recommend upgrading the database to a version where this information is properly redacted.

EPSS: Низкий
github логотип

GHSA-26xv-5c8j-w237

почти 4 года назад

An issue was discovered in xrdp before 0.9.1. When successfully logging in using RDP into an xrdp session, the file ~/.vnc/sesman_${username}_passwd is created. Its content is the equivalent of the user's cleartext password, DES encrypted with a known key.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-26xv-4xf9-c953

почти 4 года назад

In the media-library-assistant plugin before 2.82 for WordPress, Remote Code Execution can occur via the tax_query, meta_query, or date_query parameter in mla_gallery via an admin.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-26xr-j83g-4fmm

26 дней назад

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests.

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-26xq-m8xw-6373

около 1 года назад

Froxlor has an HTML Injection Vulnerability

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-26xq-4h5f-fhh8

почти 4 года назад

Certain older Lexmark devices (C, M, X, and 6500e before 2018-12-18) contain a directory traversal vulnerability in the embedded web server.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-26xp-wjvm-542h

почти 4 года назад

Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view whitelist rules via a Broken Access Control vulnerability in the /rest/whitelist/<version>/check endpoint. The affected versions are before version 8.13.3, and from version 8.14.0 before 8.14.1.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-26xp-w34p-3h6q

почти 4 года назад

In Edifecs Transaction Management through 2021-07-12, an unauthenticated user can inject arbitrary text into a user's browser via logon.jsp?logon_error= on the login screen of the Web application.

EPSS: Низкий
github логотип

GHSA-26xp-84m3-w6wh

почти 4 года назад

The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired.

EPSS: Низкий
github логотип

GHSA-26xm-phwj-2pmp

почти 4 года назад

Stack-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0610.

EPSS: Низкий
github логотип

GHSA-26xj-xw26-4hf7

почти 4 года назад

Cross-site scripting (XSS) vulnerability in the Views module 6.x before 6.x-2.12 for Drupal allows remote attackers to inject arbitrary web script or HTML via a page path.

EPSS: Низкий
github логотип

GHSA-26xj-r8r2-vvgx

10 месяцев назад

For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-26xj-hxvp-rc79

больше 2 лет назад

Deyue Remote Vehicle Management System v1.1 was discovered to contain a deserialization vulnerability.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-26xh-wmc4-35qp

почти 4 года назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of TeamViewer 15.16.8.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TVS files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13697.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-26xh-4mrc-q8jf

почти 4 года назад

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).

CVSS3: 7.2
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-2722-p93p-vrgm

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability allows OS Command Injection as root This issue affects Iocharger firmware for AC model chargers before version 24120701. Likelihood: High. However, the attacker will need a (low privilege) account to gain access to the action.exe CGI binary and upload the crafted firmware file, or convince a user with such access to upload it. Impact: Critical – The attacker has full control over the charging station as the root user, and can arbitrarily add, modify and deletefiles and services. CVSS clarification: Any network interface serving the web ui is vulnerable (AV:N) and there are not additional security measures to circumvent (AC:L), nor does the attack require and existing preconditions (AT:N). The attack is authenticated, but the level of authentication does not matter (PR:L), nor is any user interaction required (UI:N). The attack leads to a full compromised (VC:H/VI:H/VA:H), and comp...

CVSS3: 8.8
1%
Низкий
около 1 года назад
github логотип
GHSA-26xx-m4q2-xhq8

Spree Auth Devise vulnerability allows for authentication bypass through CSRF weakness

CVSS3: 9.3
0%
Низкий
больше 4 лет назад
github логотип
GHSA-26xx-jvvm-7pfr

SQL injection vulnerability in the Store Locator extension before 1.2.8 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

0%
Низкий
почти 4 года назад
github логотип
GHSA-26xx-j6q3-j3rf

The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."

3%
Низкий
почти 4 года назад
github логотип
GHSA-26xv-gjx4-vj92

The WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 7.8.2, due to improper CORS handling on the Store API's REST endpoints allowing direct external access from any origin. This can allow unauthenticated attackers to extract sensitive user information including PII(Personal Identifiable Information).

CVSS3: 5.3
0%
Низкий
5 месяцев назад
github логотип
GHSA-26xv-73mx-mq4r

YugabyteDB has been collecting diagnostics information from YugabyteDB servers, which may include sensitive gflag configurations. To mitigate this, we recommend upgrading the database to a version where this information is properly redacted.

0%
Низкий
8 месяцев назад
github логотип
GHSA-26xv-5c8j-w237

An issue was discovered in xrdp before 0.9.1. When successfully logging in using RDP into an xrdp session, the file ~/.vnc/sesman_${username}_passwd is created. Its content is the equivalent of the user's cleartext password, DES encrypted with a known key.

CVSS3: 9.8
0%
Низкий
почти 4 года назад
github логотип
GHSA-26xv-4xf9-c953

In the media-library-assistant plugin before 2.82 for WordPress, Remote Code Execution can occur via the tax_query, meta_query, or date_query parameter in mla_gallery via an admin.

CVSS3: 9.8
8%
Низкий
почти 4 года назад
github логотип
GHSA-26xr-j83g-4fmm

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests.

CVSS3: 7.3
0%
Низкий
26 дней назад
github логотип
GHSA-26xq-m8xw-6373

Froxlor has an HTML Injection Vulnerability

CVSS3: 5.5
0%
Низкий
около 1 года назад
github логотип
GHSA-26xq-4h5f-fhh8

Certain older Lexmark devices (C, M, X, and 6500e before 2018-12-18) contain a directory traversal vulnerability in the embedded web server.

CVSS3: 7.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-26xp-wjvm-542h

Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view whitelist rules via a Broken Access Control vulnerability in the /rest/whitelist/<version>/check endpoint. The affected versions are before version 8.13.3, and from version 8.14.0 before 8.14.1.

CVSS3: 5.3
2%
Низкий
почти 4 года назад
github логотип
GHSA-26xp-w34p-3h6q

In Edifecs Transaction Management through 2021-07-12, an unauthenticated user can inject arbitrary text into a user's browser via logon.jsp?logon_error= on the login screen of the Web application.

1%
Низкий
почти 4 года назад
github логотип
GHSA-26xp-84m3-w6wh

The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired.

0%
Низкий
почти 4 года назад
github логотип
GHSA-26xm-phwj-2pmp

Stack-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0610.

7%
Низкий
почти 4 года назад
github логотип
GHSA-26xj-xw26-4hf7

Cross-site scripting (XSS) vulnerability in the Views module 6.x before 6.x-2.12 for Drupal allows remote attackers to inject arbitrary web script or HTML via a page path.

0%
Низкий
почти 4 года назад
github логотип
GHSA-26xj-r8r2-vvgx

For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one.

CVSS3: 5.3
0%
Низкий
10 месяцев назад
github логотип
GHSA-26xj-hxvp-rc79

Deyue Remote Vehicle Management System v1.1 was discovered to contain a deserialization vulnerability.

CVSS3: 8.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-26xh-wmc4-35qp

This vulnerability allows remote attackers to execute arbitrary code on affected installations of TeamViewer 15.16.8.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TVS files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13697.

CVSS3: 8.8
1%
Низкий
почти 4 года назад
github логотип
GHSA-26xh-4mrc-q8jf

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).

CVSS3: 7.2
94%
Критический
почти 4 года назад

Уязвимостей на страницу