Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 325 176

Количество 325 176

github логотип

GHSA-xq88-f43j-jg6v

почти 4 года назад

Multiple SQL injection vulnerabilities in FancyFon FAMOC before 3.17.4 allow (1) remote attackers to execute arbitrary SQL commands via the device ID REST parameter (PATH_INFO) to /ajax.php or (2) remote authenticated users to execute arbitrary SQL commands via the order parameter to index.php.

EPSS: Низкий
github логотип

GHSA-xq88-9pxv-6rjv

почти 4 года назад

Rumpus 5.1 and earlier has weak permissions for certain files and directories under /usr/local/Rumpus, including the configuration file, which allows local users to have an unknown impact by creating, modifying, or deleting files.

EPSS: Низкий
github логотип

GHSA-xq88-7x7g-c8p2

почти 4 года назад

The Vivo V7 device with a build fingerprint of vivo/1718/1718:7.1.2/N2G47H/compil11021857:user/release-keys allows any app co-located on the device to set system properties as the com.android.phone user. The com.qualcomm.qti.modemtestmode app (versionCode=25, versionName=7.1.2) that contains an exported service named com.qualcomm.qti.modemtestmode.MbnTestService that allows any app co-located on the device to provide key-value pairs to set certain system properties. Notably, system properties with the persist.* prefix can be set which will survive a reboot. On the Vivo V7 device, when the persist.sys.input.log property is set to have a value of yes, the user's screen touches be written to the logcat log by the InputDispatcher for all apps. The system-wide logcat log can be obtained from external storage via a different known vulnerability on the device. The READ_EXTERNAL_STORAGE permission is necessary to access the log files containing the user's touch coordinates. With some effort...

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-xq88-268m-j4fh

почти 4 года назад

IBM Campaign is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-xq87-697j-q43p

почти 4 года назад

Multiple cross-site scripting (XSS) vulnerabilities in LabWiki 1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) from parameter to index.php or the (2) page_no parameter to recentchanges.php.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-xq86-4h9v-gqp7

почти 3 года назад

Buffer copy without checking size of input in Zoom Meeting SDK before 5.13.0 may allow an authenticated user to potentially enable a denial of service via local access. This issue may result in the Zoom Meeting SDK to crash and need to be restarted.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-xq84-h5w5-8fgh

почти 4 года назад

SQL injection vulnerability in play.php in EntertainmentScript 1.4.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.

EPSS: Низкий
github логотип

GHSA-xq84-67jm-4565

почти 4 года назад

The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-xq83-m7pg-gg42

11 месяцев назад

A vulnerability in multiple Cisco Unified Communications and Contact Center Solutions products could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability is due to excessive permissions that have been assigned to system commands. An attacker could exploit this vulnerability by executing crafted commands on the underlying operating system. A successful exploit could allow the attacker to escape the restricted shell and gain root privileges on the underlying operating system of an affected device. To successfully exploit this vulnerability, an attacker would need administrative access to the ESXi hypervisor.

CVSS3: 5.1
EPSS: Низкий
github логотип

GHSA-xq7x-mvh7-x544

почти 4 года назад

Visual Studio Tampering Vulnerability

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-xq7x-c5pr-rfg4

около 4 лет назад

Proofpoint Insider Threat Management Agent for Windows relies on an inherently dangerous function that could enable an unprivileged local Windows user to run arbitrary code with SYSTEM privileges. All versions prior to 7.12.1 are affected. Agents for MacOS and Linux and Cloud are unaffected. Proofpoint has released fixed software version 7.12.1. The fixed software versions are available through the customer support portal.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-xq7w-93g7-r77h

почти 4 года назад

Multiple integer overflows in the kernel in Apple Mac OS X before 10.5.6 on Intel platforms allow local users to gain privileges via a crafted call to (1) i386_set_ldt or (2) i386_get_ldt.

EPSS: Низкий
github логотип

GHSA-xq7w-6f6f-mh93

около 2 месяцев назад

A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.

CVSS3: 9.9
EPSS: Низкий
github логотип

GHSA-xq7r-x85c-27jm

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, otherwise LSB of the expectation object address is leaked to userspace.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-xq7r-8p25-r3gh

около 2 лет назад

An issue discovered in Axigen Mail Server 10.3.x before 10.3.1.27 and 10.3.2.x before 10.3.3.1 allows unauthenticated attackers to submit a setAdminPassword operation request, subsequently setting a new arbitrary password for the admin account.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-xq7r-2vx2-8jgj

больше 2 лет назад

Cacheservice did not correctly check if relative cache object were pointing to the defined absolute location when accessing resources. An attacker with access to the database and a local or restricted network would be able to read arbitrary local file system resources that are accessible by the services system user account. We have improved path validation and make sure that any access is contained to the defined root directory. No publicly available exploits are known.

CVSS3: 5.7
EPSS: Низкий
github логотип

GHSA-xq7q-w5x9-hwm7

почти 2 года назад

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeroen Peters Navigation menu as Dropdown Widget allows Stored XSS.This issue affects Navigation menu as Dropdown Widget: from n/a through 1.3.4.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-xq7p-w257-hcj2

почти 4 года назад

BisonFTP Server 4 release 2 allows remote attackers to cause a denial of service (CPU consumption) via a long (1) ls or (2) cwd command.

EPSS: Низкий
github логотип

GHSA-xq7p-g2vc-g82p

11 месяцев назад

Homograph attack allows Unicode lookalike characters to bypass validation.

EPSS: Низкий
github логотип

GHSA-xq7p-cgf2-m4vv

5 месяцев назад

SOPlanning is vulnerable to Broken Access Control in /status endpoint. Due to lack of permission checks in Project Status functionality an authenticated attacker is able to add, edit and delete any status. This issue was fixed in version 1.55.

CVSS3: 5.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-xq88-f43j-jg6v

Multiple SQL injection vulnerabilities in FancyFon FAMOC before 3.17.4 allow (1) remote attackers to execute arbitrary SQL commands via the device ID REST parameter (PATH_INFO) to /ajax.php or (2) remote authenticated users to execute arbitrary SQL commands via the order parameter to index.php.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xq88-9pxv-6rjv

Rumpus 5.1 and earlier has weak permissions for certain files and directories under /usr/local/Rumpus, including the configuration file, which allows local users to have an unknown impact by creating, modifying, or deleting files.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xq88-7x7g-c8p2

The Vivo V7 device with a build fingerprint of vivo/1718/1718:7.1.2/N2G47H/compil11021857:user/release-keys allows any app co-located on the device to set system properties as the com.android.phone user. The com.qualcomm.qti.modemtestmode app (versionCode=25, versionName=7.1.2) that contains an exported service named com.qualcomm.qti.modemtestmode.MbnTestService that allows any app co-located on the device to provide key-value pairs to set certain system properties. Notably, system properties with the persist.* prefix can be set which will survive a reboot. On the Vivo V7 device, when the persist.sys.input.log property is set to have a value of yes, the user's screen touches be written to the logcat log by the InputDispatcher for all apps. The system-wide logcat log can be obtained from external storage via a different known vulnerability on the device. The READ_EXTERNAL_STORAGE permission is necessary to access the log files containing the user's touch coordinates. With some effort...

CVSS3: 4.7
0%
Низкий
почти 4 года назад
github логотип
GHSA-xq88-268m-j4fh

IBM Campaign is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

CVSS3: 5.4
0%
Низкий
почти 4 года назад
github логотип
GHSA-xq87-697j-q43p

Multiple cross-site scripting (XSS) vulnerabilities in LabWiki 1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) from parameter to index.php or the (2) page_no parameter to recentchanges.php.

CVSS3: 6.1
0%
Низкий
почти 4 года назад
github логотип
GHSA-xq86-4h9v-gqp7

Buffer copy without checking size of input in Zoom Meeting SDK before 5.13.0 may allow an authenticated user to potentially enable a denial of service via local access. This issue may result in the Zoom Meeting SDK to crash and need to be restarted.

CVSS3: 4.3
0%
Низкий
почти 3 года назад
github логотип
GHSA-xq84-h5w5-8fgh

SQL injection vulnerability in play.php in EntertainmentScript 1.4.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xq84-67jm-4565

The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c.

CVSS3: 9.8
2%
Низкий
почти 4 года назад
github логотип
GHSA-xq83-m7pg-gg42

A vulnerability in multiple Cisco Unified Communications and Contact Center Solutions products could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability is due to excessive permissions that have been assigned to system commands. An attacker could exploit this vulnerability by executing crafted commands on the underlying operating system. A successful exploit could allow the attacker to escape the restricted shell and gain root privileges on the underlying operating system of an affected device. To successfully exploit this vulnerability, an attacker would need administrative access to the ESXi hypervisor.

CVSS3: 5.1
0%
Низкий
11 месяцев назад
github логотип
GHSA-xq7x-mvh7-x544

Visual Studio Tampering Vulnerability

CVSS3: 5.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-xq7x-c5pr-rfg4

Proofpoint Insider Threat Management Agent for Windows relies on an inherently dangerous function that could enable an unprivileged local Windows user to run arbitrary code with SYSTEM privileges. All versions prior to 7.12.1 are affected. Agents for MacOS and Linux and Cloud are unaffected. Proofpoint has released fixed software version 7.12.1. The fixed software versions are available through the customer support portal.

CVSS3: 7.8
0%
Низкий
около 4 лет назад
github логотип
GHSA-xq7w-93g7-r77h

Multiple integer overflows in the kernel in Apple Mac OS X before 10.5.6 on Intel platforms allow local users to gain privileges via a crafted call to (1) i386_set_ldt or (2) i386_get_ldt.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xq7w-6f6f-mh93

A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.

CVSS3: 9.9
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-xq7r-x85c-27jm

In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, otherwise LSB of the expectation object address is leaked to userspace.

CVSS3: 5.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-xq7r-8p25-r3gh

An issue discovered in Axigen Mail Server 10.3.x before 10.3.1.27 and 10.3.2.x before 10.3.3.1 allows unauthenticated attackers to submit a setAdminPassword operation request, subsequently setting a new arbitrary password for the admin account.

CVSS3: 9.1
0%
Низкий
около 2 лет назад
github логотип
GHSA-xq7r-2vx2-8jgj

Cacheservice did not correctly check if relative cache object were pointing to the defined absolute location when accessing resources. An attacker with access to the database and a local or restricted network would be able to read arbitrary local file system resources that are accessible by the services system user account. We have improved path validation and make sure that any access is contained to the defined root directory. No publicly available exploits are known.

CVSS3: 5.7
0%
Низкий
больше 2 лет назад
github логотип
GHSA-xq7q-w5x9-hwm7

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeroen Peters Navigation menu as Dropdown Widget allows Stored XSS.This issue affects Navigation menu as Dropdown Widget: from n/a through 1.3.4.

CVSS3: 5.9
0%
Низкий
почти 2 года назад
github логотип
GHSA-xq7p-w257-hcj2

BisonFTP Server 4 release 2 allows remote attackers to cause a denial of service (CPU consumption) via a long (1) ls or (2) cwd command.

1%
Низкий
почти 4 года назад
github логотип
GHSA-xq7p-g2vc-g82p

Homograph attack allows Unicode lookalike characters to bypass validation.

0%
Низкий
11 месяцев назад
github логотип
GHSA-xq7p-cgf2-m4vv

SOPlanning is vulnerable to Broken Access Control in /status endpoint. Due to lack of permission checks in Project Status functionality an authenticated attacker is able to add, edit and delete any status. This issue was fixed in version 1.55.

CVSS3: 5.4
0%
Низкий
5 месяцев назад

Уязвимостей на страницу