Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 326 185

Количество 326 185

github логотип

GHSA-xmqw-mh3q-89r9

почти 4 года назад

The response function in the JSONP endpoint in WebService/Server/JSONRPC.pm in jsonrpc.cgi in Bugzilla 3.x and 4.x before 4.0.14, 4.1.x and 4.2.x before 4.2.10, 4.3.x and 4.4.x before 4.4.5, and 4.5.x before 4.5.5 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with the _bz_callback character set.

EPSS: Низкий
github логотип

GHSA-xmqw-gc65-wj6q

почти 4 года назад

An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of adding new routes to the device. It seems that the POST parameters passed in this request to set up routes on the device can be set in such a way that would result in passing commands to a "popen" API in the function and thus result in command injection on the device. If the firmware version AL-R096 is dissected using binwalk tool, we obtain a cpio-root archive which contains the filesystem set up on the device that contains all the binaries. The binary "goahead" is the one that has the vulnerable function that receives the values sent by the POST request. If we open this binary in IDA-pro we will notice that this follows a MIPS little endian format. The function sub_00420F38 in IDA pro is identified to be receiving the values sent in the POST request and the value set in POST parameter "dest" is extracted at address 0x00420FC4. The PO...

CVSS3: 8.8
EPSS: Средний
github логотип

GHSA-xmqw-f73x-r3cq

больше 1 года назад

A vulnerability, which was classified as critical, was found in D-Link DIR-619L B1 2.06. Affected is the function formSetMACFilter of the file /goform/formSetMACFilter. The manipulation of the argument curTime leads to buffer overflow. The exploit has been disclosed to the public and may be used.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-xmqw-3rv2-c2hm

почти 4 года назад

IBM Security Access Manager Appliance 9.0.3 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system. IBM X-Force ID: 128372.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xmqv-pfw7-qmj7

почти 4 года назад

Jenkins ElectricFlow Plugin globally and unconditionally disabled SSL/TLS certificate validation

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-xmqv-9j73-gq5h

почти 4 года назад

NVIDIA Linux GPU Display Driver, all versions, contains a vulnerability in the UVM driver, in which a race condition may lead to a denial of service.

EPSS: Низкий
github логотип

GHSA-xmqr-m3g6-f3h7

около 4 лет назад

Tenda AX12 v22.03.01.21 was discovered to contain a stack overflow in the function sub_42E328. This vulnerability allows attackers to cause a Denial of Service (DoS) via the list parameter.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xmqq-mrv9-8jqp

почти 4 года назад

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance version 6.5 SP2 could allow an non-authorized user to disclose administrative credentials. An attacker must be an authenticated user in order to exploit the vulnerability.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xmqp-wmrm-vqv8

больше 2 лет назад

The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /cgi-bin/login.cgi endpoint. This is due to mishandling of shell meta-characters in the PHPSESSID cookie.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-xmqp-rgcq-rmm2

около 1 месяца назад

An attacker may access restricted filesystem areas on the device via the CROWN REST interface due to incomplete whitelist enforcement. Certain directories intended for internal testing were not covered by the whitelist and are accessible without authentication. An unauthenticated attacker could place a manipulated parameter file that becomes active after a reboot, allowing modification of critical device settings, including network configuration and application parameters.

CVSS3: 9.4
EPSS: Низкий
github логотип

GHSA-xmqp-rfcw-jxfj

почти 4 года назад

Directory traversal vulnerability in entry.php in phpInv 0.8.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter.

EPSS: Низкий
github логотип

GHSA-xmqp-6cj2-2hh3

6 месяцев назад

Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-xmqp-3vcg-c2f5

почти 4 года назад

Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Difficult to exploit vulnerability allows high privileged attacker having Local Logon privilege with logon to the infrastructure where Core RDBMS executes to compromise Core RDBMS. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Core RDBMS accessible data. CVSS 3.0 Base Score 4.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N).

EPSS: Низкий
github логотип

GHSA-xmqm-497m-6h9h

почти 4 года назад

crontab in Vixie cron 4.1, when running with the -e option, allows local users to read the cron files of other users by changing the file being edited to a symlink. NOTE: there is insufficient information to know whether this is a duplicate of CVE-2001-0235.

EPSS: Низкий
github логотип

GHSA-xmqj-x2pc-4qww

12 месяцев назад

A remote unauthenticated attacker may be able to change the IP adress of the device, and therefore affecting the availability of the device.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xmqj-jx87-gx3g

почти 4 года назад

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 does not enforce an efficient password policy. This may allow an attacker with obtained user credentials to enumerate passwords and impersonate other application users and perform operations on their behalf.

EPSS: Низкий
github логотип

GHSA-xmqh-xx76-mgpj

почти 4 года назад

Some Huawei smartphones with software of BGO-L03C158B003CUSTC158D001 and BGO-L03C331B009CUSTC331D001 have a DoS vulnerability due to insufficient input validation. An attacker could exploit this vulnerability by sending specially crafted NFC messages to the target device. Successful exploit could make a service crash.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-xmqf-xv9p-v7qg

3 месяца назад

Rejected reason: Not used

EPSS: Низкий
github логотип

GHSA-xmqf-p7f5-83hr

почти 4 года назад

An issue was discovered in certain Apple products. iOS before 11.3 is affected. The issue involves the "Telephony" component. It allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a Class 0 SMS message.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xmqf-f454-4vvm

больше 3 лет назад

Simple Cold Storage Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=bookings/view_details.

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-xmqw-mh3q-89r9

The response function in the JSONP endpoint in WebService/Server/JSONRPC.pm in jsonrpc.cgi in Bugzilla 3.x and 4.x before 4.0.14, 4.1.x and 4.2.x before 4.2.10, 4.3.x and 4.4.x before 4.4.5, and 4.5.x before 4.5.5 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with the _bz_callback character set.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xmqw-gc65-wj6q

An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of adding new routes to the device. It seems that the POST parameters passed in this request to set up routes on the device can be set in such a way that would result in passing commands to a "popen" API in the function and thus result in command injection on the device. If the firmware version AL-R096 is dissected using binwalk tool, we obtain a cpio-root archive which contains the filesystem set up on the device that contains all the binaries. The binary "goahead" is the one that has the vulnerable function that receives the values sent by the POST request. If we open this binary in IDA-pro we will notice that this follows a MIPS little endian format. The function sub_00420F38 in IDA pro is identified to be receiving the values sent in the POST request and the value set in POST parameter "dest" is extracted at address 0x00420FC4. The PO...

CVSS3: 8.8
15%
Средний
почти 4 года назад
github логотип
GHSA-xmqw-f73x-r3cq

A vulnerability, which was classified as critical, was found in D-Link DIR-619L B1 2.06. Affected is the function formSetMACFilter of the file /goform/formSetMACFilter. The manipulation of the argument curTime leads to buffer overflow. The exploit has been disclosed to the public and may be used.

CVSS3: 5.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-xmqw-3rv2-c2hm

IBM Security Access Manager Appliance 9.0.3 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system. IBM X-Force ID: 128372.

CVSS3: 8.8
5%
Низкий
почти 4 года назад
github логотип
GHSA-xmqv-pfw7-qmj7

Jenkins ElectricFlow Plugin globally and unconditionally disabled SSL/TLS certificate validation

CVSS3: 6.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-xmqv-9j73-gq5h

NVIDIA Linux GPU Display Driver, all versions, contains a vulnerability in the UVM driver, in which a race condition may lead to a denial of service.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xmqr-m3g6-f3h7

Tenda AX12 v22.03.01.21 was discovered to contain a stack overflow in the function sub_42E328. This vulnerability allows attackers to cause a Denial of Service (DoS) via the list parameter.

CVSS3: 7.5
0%
Низкий
около 4 лет назад
github логотип
GHSA-xmqq-mrv9-8jqp

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance version 6.5 SP2 could allow an non-authorized user to disclose administrative credentials. An attacker must be an authenticated user in order to exploit the vulnerability.

CVSS3: 8.8
1%
Низкий
почти 4 года назад
github логотип
GHSA-xmqp-wmrm-vqv8

The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /cgi-bin/login.cgi endpoint. This is due to mishandling of shell meta-characters in the PHPSESSID cookie.

CVSS3: 9.8
17%
Средний
больше 2 лет назад
github логотип
GHSA-xmqp-rgcq-rmm2

An attacker may access restricted filesystem areas on the device via the CROWN REST interface due to incomplete whitelist enforcement. Certain directories intended for internal testing were not covered by the whitelist and are accessible without authentication. An unauthenticated attacker could place a manipulated parameter file that becomes active after a reboot, allowing modification of critical device settings, including network configuration and application parameters.

CVSS3: 9.4
0%
Низкий
около 1 месяца назад
github логотип
GHSA-xmqp-rfcw-jxfj

Directory traversal vulnerability in entry.php in phpInv 0.8.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter.

3%
Низкий
почти 4 года назад
github логотип
GHSA-xmqp-6cj2-2hh3

Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

CVSS3: 8.6
0%
Низкий
6 месяцев назад
github логотип
GHSA-xmqp-3vcg-c2f5

Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Difficult to exploit vulnerability allows high privileged attacker having Local Logon privilege with logon to the infrastructure where Core RDBMS executes to compromise Core RDBMS. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Core RDBMS accessible data. CVSS 3.0 Base Score 4.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N).

0%
Низкий
почти 4 года назад
github логотип
GHSA-xmqm-497m-6h9h

crontab in Vixie cron 4.1, when running with the -e option, allows local users to read the cron files of other users by changing the file being edited to a symlink. NOTE: there is insufficient information to know whether this is a duplicate of CVE-2001-0235.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xmqj-x2pc-4qww

A remote unauthenticated attacker may be able to change the IP adress of the device, and therefore affecting the availability of the device.

CVSS3: 7.5
1%
Низкий
12 месяцев назад
github логотип
GHSA-xmqj-jx87-gx3g

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 does not enforce an efficient password policy. This may allow an attacker with obtained user credentials to enumerate passwords and impersonate other application users and perform operations on their behalf.

0%
Низкий
почти 4 года назад
github логотип
GHSA-xmqh-xx76-mgpj

Some Huawei smartphones with software of BGO-L03C158B003CUSTC158D001 and BGO-L03C331B009CUSTC331D001 have a DoS vulnerability due to insufficient input validation. An attacker could exploit this vulnerability by sending specially crafted NFC messages to the target device. Successful exploit could make a service crash.

CVSS3: 6.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-xmqf-xv9p-v7qg

Rejected reason: Not used

3 месяца назад
github логотип
GHSA-xmqf-p7f5-83hr

An issue was discovered in certain Apple products. iOS before 11.3 is affected. The issue involves the "Telephony" component. It allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a Class 0 SMS message.

CVSS3: 7.5
1%
Низкий
почти 4 года назад
github логотип
GHSA-xmqf-f454-4vvm

Simple Cold Storage Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=bookings/view_details.

CVSS3: 7.2
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу