Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 324 922

Количество 324 922

github логотип

GHSA-xqr3-6f53-5v7g

почти 4 года назад

Cross-site request forgery (CSRF) vulnerability in the WhyDoWork AdSense plugin 1.2 for WordPress allows remote attackers to hijack the authentication of administrators for requests that have unspecified impact via a request to the whydowork_adsense page in wp-admin/options-general.php.

EPSS: Низкий
github логотип

GHSA-xqr2-f99c-rcpq

больше 2 лет назад

Incorrect access control in writercms v1.1.0 allows attackers to directly obtain backend account passwords via unspecified vectors.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xqr2-7pjv-2gjp

почти 4 года назад

Directory traversal vulnerability in productionnu2/fileuploader.php in nuBuilder 10.04.20, and possibly other versions before 10.07.12, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the dir parameter.

EPSS: Низкий
github логотип

GHSA-xqr2-65hp-h5j3

почти 2 года назад

The Startklar Elementor Addons plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.7.15 via the 'dropzone_hash' parameter. This makes it possible for unauthenticated attackers to copy the contents of arbitrary files on the server, which can contain sensitive information, and to delete arbitrary directories, including the root WordPress directory.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-xqr2-347w-52hc

11 месяцев назад

Text editor embedded into MegaBIP software does not neutralize user input allowing Stored XSS attacks on other users. In order to use the editor high privileges are required.   Version 5.20 of MegaBIP fixes this issue.

EPSS: Низкий
github логотип

GHSA-xqqx-3g3g-99gr

около 2 лет назад

A vulnerability was found in kishor-23 Food Waste Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/admin.php. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257056. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-xqqw-rvff-22fp

около 3 лет назад

Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a path traversal vulnerability, which could allow an attacker to read local files, disclose plaintext credentials, and escalate privileges.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xqqw-cqjp-52xm

почти 4 года назад

Jenkins Log Parser Plugin vulnerable to Cross-site Scripting

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-xqqw-c6r3-8gjc

почти 4 года назад

The Leaflet Map WordPress plugin before 3.0.0 does not verify the CSRF nonce when saving its settings, which allows attackers to make a logged in admin update the settings via a Cross-Site Request Forgery attack. This could lead to Cross-Site Scripting issues by either changing the URL of the JavaScript library being used, or using malicious attributions which will be executed in all page with an embed map from the plugin

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-xqqr-p362-6rmc

больше 7 лет назад

Directory Traversal in hostr

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xqqr-mq8x-22qx

почти 4 года назад

Jenkins JX Resources Plugin missing permission check

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-xqqr-m249-5wxh

больше 3 лет назад

A vulnerability has been found in CESNET theme-cesnet up to 1.x and classified as problematic. Affected by this vulnerability is an unknown functionality of the file cesnet/core/lostpassword/templates/resetpassword.php. The manipulation leads to insufficiently protected credentials. Attacking locally is a requirement. Upgrading to version 2.0.0 is able to address this issue. The name of the patch is 2b857f2233ce5083b4d5bc9bfc4152f933c3e4a6. It is recommended to upgrade the affected component. The identifier VDB-217633 was assigned to this vulnerability.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-xqqr-6rp7-gjf6

почти 4 года назад

Multiple SQL injection vulnerabilities in eintragen.php in GaesteChaos 0.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) gastname, (2) gastwohnort, or (3) gasteintrag parameters.

EPSS: Низкий
github логотип

GHSA-xqqr-5rg9-gj2h

почти 4 года назад

Vulnerability in Compaq Tru64 UNIX edauth command.

EPSS: Низкий
github логотип

GHSA-xqqq-qrvp-j2jg

почти 4 года назад

phpMyAdmin before 2.11.8 does not sufficiently prevent its pages from using frames that point to pages in other domains, which makes it easier for remote attackers to conduct spoofing or phishing activities via a cross-site framing attack.

EPSS: Низкий
github логотип

GHSA-xqqq-h53w-5pj3

больше 3 лет назад

Operation restriction bypass vulnerability in Scheduler of Cybozu Office 10.0.0 to 10.8.5 allows a remote authenticated attacker to alter the data of Scheduler via unspecified vectors.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-xqqp-wpjp-4w5q

почти 4 года назад

Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to cause a denial of service (DoS) condition via unspecified vectors.

EPSS: Низкий
github логотип

GHSA-xqqm-w483-3fhq

почти 4 года назад

An issue was discovered in MDaemon before 20.0.4. There is an IFRAME injection vulnerability in Webmail (aka WorldClient). It can be exploited via an email message. It allows an attacker to perform any action with the privileges of the attacked user.

EPSS: Низкий
github логотип

GHSA-xqqm-hh5r-8934

почти 4 года назад

Moxa ioLogik E2200 devices before 3.12 and ioAdmin Configuration Utility before 3.18 do not properly encrypt credentials, which makes it easier for remote attackers to obtain the associated cleartext via unspecified vectors.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-xqqm-4xjp-r9cv

почти 3 года назад

A vulnerability was found in SourceCodester Vehicle Service Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/maintenance/manage_category.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226103.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-xqr3-6f53-5v7g

Cross-site request forgery (CSRF) vulnerability in the WhyDoWork AdSense plugin 1.2 for WordPress allows remote attackers to hijack the authentication of administrators for requests that have unspecified impact via a request to the whydowork_adsense page in wp-admin/options-general.php.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xqr2-f99c-rcpq

Incorrect access control in writercms v1.1.0 allows attackers to directly obtain backend account passwords via unspecified vectors.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-xqr2-7pjv-2gjp

Directory traversal vulnerability in productionnu2/fileuploader.php in nuBuilder 10.04.20, and possibly other versions before 10.07.12, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the dir parameter.

8%
Низкий
почти 4 года назад
github логотип
GHSA-xqr2-65hp-h5j3

The Startklar Elementor Addons plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.7.15 via the 'dropzone_hash' parameter. This makes it possible for unauthenticated attackers to copy the contents of arbitrary files on the server, which can contain sensitive information, and to delete arbitrary directories, including the root WordPress directory.

CVSS3: 9.1
5%
Низкий
почти 2 года назад
github логотип
GHSA-xqr2-347w-52hc

Text editor embedded into MegaBIP software does not neutralize user input allowing Stored XSS attacks on other users. In order to use the editor high privileges are required.   Version 5.20 of MegaBIP fixes this issue.

0%
Низкий
11 месяцев назад
github логотип
GHSA-xqqx-3g3g-99gr

A vulnerability was found in kishor-23 Food Waste Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/admin.php. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257056. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 5.3
1%
Низкий
около 2 лет назад
github логотип
GHSA-xqqw-rvff-22fp

Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a path traversal vulnerability, which could allow an attacker to read local files, disclose plaintext credentials, and escalate privileges.

CVSS3: 8.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-xqqw-cqjp-52xm

Jenkins Log Parser Plugin vulnerable to Cross-site Scripting

CVSS3: 5.4
0%
Низкий
почти 4 года назад
github логотип
GHSA-xqqw-c6r3-8gjc

The Leaflet Map WordPress plugin before 3.0.0 does not verify the CSRF nonce when saving its settings, which allows attackers to make a logged in admin update the settings via a Cross-Site Request Forgery attack. This could lead to Cross-Site Scripting issues by either changing the URL of the JavaScript library being used, or using malicious attributions which will be executed in all page with an embed map from the plugin

CVSS3: 6.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-xqqr-p362-6rmc

Directory Traversal in hostr

CVSS3: 7.5
1%
Низкий
больше 7 лет назад
github логотип
GHSA-xqqr-mq8x-22qx

Jenkins JX Resources Plugin missing permission check

CVSS3: 5.4
0%
Низкий
почти 4 года назад
github логотип
GHSA-xqqr-m249-5wxh

A vulnerability has been found in CESNET theme-cesnet up to 1.x and classified as problematic. Affected by this vulnerability is an unknown functionality of the file cesnet/core/lostpassword/templates/resetpassword.php. The manipulation leads to insufficiently protected credentials. Attacking locally is a requirement. Upgrading to version 2.0.0 is able to address this issue. The name of the patch is 2b857f2233ce5083b4d5bc9bfc4152f933c3e4a6. It is recommended to upgrade the affected component. The identifier VDB-217633 was assigned to this vulnerability.

CVSS3: 5.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xqqr-6rp7-gjf6

Multiple SQL injection vulnerabilities in eintragen.php in GaesteChaos 0.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) gastname, (2) gastwohnort, or (3) gasteintrag parameters.

1%
Низкий
почти 4 года назад
github логотип
GHSA-xqqr-5rg9-gj2h

Vulnerability in Compaq Tru64 UNIX edauth command.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xqqq-qrvp-j2jg

phpMyAdmin before 2.11.8 does not sufficiently prevent its pages from using frames that point to pages in other domains, which makes it easier for remote attackers to conduct spoofing or phishing activities via a cross-site framing attack.

2%
Низкий
почти 4 года назад
github логотип
GHSA-xqqq-h53w-5pj3

Operation restriction bypass vulnerability in Scheduler of Cybozu Office 10.0.0 to 10.8.5 allows a remote authenticated attacker to alter the data of Scheduler via unspecified vectors.

CVSS3: 4.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xqqp-wpjp-4w5q

Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to cause a denial of service (DoS) condition via unspecified vectors.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xqqm-w483-3fhq

An issue was discovered in MDaemon before 20.0.4. There is an IFRAME injection vulnerability in Webmail (aka WorldClient). It can be exploited via an email message. It allows an attacker to perform any action with the privileges of the attacked user.

1%
Низкий
почти 4 года назад
github логотип
GHSA-xqqm-hh5r-8934

Moxa ioLogik E2200 devices before 3.12 and ioAdmin Configuration Utility before 3.18 do not properly encrypt credentials, which makes it easier for remote attackers to obtain the associated cleartext via unspecified vectors.

CVSS3: 5.3
0%
Низкий
почти 4 года назад
github логотип
GHSA-xqqm-4xjp-r9cv

A vulnerability was found in SourceCodester Vehicle Service Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/maintenance/manage_category.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226103.

CVSS3: 9.8
0%
Низкий
почти 3 года назад

Уязвимостей на страницу