Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 300 077

Количество 300 077

github логотип

GHSA-xxvm-gxxx-r9pg

4 месяца назад

A vulnerability, which was classified as problematic, has been found in Open5GS up to 2.7.5. This issue affects the function amf_state_operational of the file src/amf/amf-sm.c of the component AMF Service. The manipulation leads to reachable assertion. It is possible to launch the attack on the local host. The identifier of the patch is 53e9e059ed96b940f7ddcd9a2b68cb512524d5db. It is recommended to apply a patch to fix this issue.

CVSS3: 3.3
EPSS: Низкий
github логотип

GHSA-xxvj-8g5m-4qgw

больше 3 лет назад

SaltStack Salt Directory traversal vulnerability in minion id validation

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-xxvh-jcpq-95qv

больше 1 года назад

File Upload vulnerability in Petrol Pump Mangement Software v.1.0 allows an attacker to execute arbitrary code via a crafted payload to the email Image parameter in the profile.php component.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-xxvh-8h9p-mpwj

11 месяцев назад

Zulip 8.3 is vulnerable to Cross Site Scripting (XSS) via the replace_emoji_with_text function in ui_util.ts.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-xxvg-9x33-93vm

больше 1 года назад

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in I Thirteen Web Solution WP Responsive Tabs horizontal vertical and accordion Tabs allows Stored XSS.This issue affects WP Responsive Tabs horizontal vertical and accordion Tabs: from n/a through 1.1.17.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-xxvf-6jpw-pp5x

11 месяцев назад

A vulnerability was found in InvoicePlane up to 1.6.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /invoices/view. The manipulation leads to session expiration. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.2-beta-1 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-xxvc-c328-56m6

9 месяцев назад

A Credential Exposure Vulnerability exists in the above-mentioned product and version. The vulnerability is due to using HTTP resulting in credentials being sent in clear text.

EPSS: Низкий
github логотип

GHSA-xxvc-6xwm-7prp

5 месяцев назад

A local privilege escalation in the razer_elevation_service.exe in Razer Synapse 4 through 4.0.86.2502180127 allows a local attacker to escalate their privileges via a vulnerable COM interface in the target service.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-xxvc-26j5-3mg9

больше 3 лет назад

Cross Site Request Forgery vulnerability in Micro Focus Application Performance Management product, affecting versions 9.40, 9.50 and 9.51. The vulnerability could be exploited by attacker to trick the users into executing actions of the attacker's choosing.

EPSS: Низкий
github логотип

GHSA-xxv9-w5hm-328j

больше 1 года назад

Jenkins AppSpider Plugin missing permission checks

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-xxv9-fp7w-qg3h

больше 3 лет назад

Flash Messaging clients can ignore disconnecting commands such as "shutdown" from the Flash Messaging Server 5.2.0g (rev 1.1.2), which could allow remote attackers to stay connected.

EPSS: Низкий
github логотип

GHSA-xxv9-6fj9-h72p

больше 3 лет назад

An issue was discovered in ClipBucket before 4.0.0 Release 4902. Any OS commands can be injected via shell metacharacters in the file_name parameter to /api/file_uploader.php or /actions/file_downloader.php.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-xxv8-wfjw-6w8f

почти 2 года назад

Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-xxv8-pv43-57x5

больше 3 лет назад

PEAR core file overwrite vulnerability

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xxv8-mwpq-qmc2

больше 3 лет назад

Buffer overflow in BS.player 2.27 build 959 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a .SRT file.

EPSS: Низкий
github логотип

GHSA-xxv7-22hc-322m

больше 3 лет назад

A flaw was found in OpenEXR's B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-xxv6-qqx2-xg5m

около 1 года назад

A vulnerability has been found in SourceCodester Insurance Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-xxv6-ggg8-68mq

больше 3 лет назад

An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-xxv6-g27x-483v

9 дней назад

Rejected reason: Not used

EPSS: Низкий
github логотип

GHSA-xxv5-m8w5-gxh4

больше 2 лет назад

Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wrlEn_5g parameter at /goform/WifiBasicSet.

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-xxvm-gxxx-r9pg

A vulnerability, which was classified as problematic, has been found in Open5GS up to 2.7.5. This issue affects the function amf_state_operational of the file src/amf/amf-sm.c of the component AMF Service. The manipulation leads to reachable assertion. It is possible to launch the attack on the local host. The identifier of the patch is 53e9e059ed96b940f7ddcd9a2b68cb512524d5db. It is recommended to apply a patch to fix this issue.

CVSS3: 3.3
0%
Низкий
4 месяца назад
github логотип
GHSA-xxvj-8g5m-4qgw

SaltStack Salt Directory traversal vulnerability in minion id validation

CVSS3: 9.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-xxvh-jcpq-95qv

File Upload vulnerability in Petrol Pump Mangement Software v.1.0 allows an attacker to execute arbitrary code via a crafted payload to the email Image parameter in the profile.php component.

CVSS3: 9.8
15%
Средний
больше 1 года назад
github логотип
GHSA-xxvh-8h9p-mpwj

Zulip 8.3 is vulnerable to Cross Site Scripting (XSS) via the replace_emoji_with_text function in ui_util.ts.

CVSS3: 5.4
0%
Низкий
11 месяцев назад
github логотип
GHSA-xxvg-9x33-93vm

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in I Thirteen Web Solution WP Responsive Tabs horizontal vertical and accordion Tabs allows Stored XSS.This issue affects WP Responsive Tabs horizontal vertical and accordion Tabs: from n/a through 1.1.17.

CVSS3: 6.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-xxvf-6jpw-pp5x

A vulnerability was found in InvoicePlane up to 1.6.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /invoices/view. The manipulation leads to session expiration. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.2-beta-1 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

CVSS3: 3.7
0%
Низкий
11 месяцев назад
github логотип
GHSA-xxvc-c328-56m6

A Credential Exposure Vulnerability exists in the above-mentioned product and version. The vulnerability is due to using HTTP resulting in credentials being sent in clear text.

0%
Низкий
9 месяцев назад
github логотип
GHSA-xxvc-6xwm-7prp

A local privilege escalation in the razer_elevation_service.exe in Razer Synapse 4 through 4.0.86.2502180127 allows a local attacker to escalate their privileges via a vulnerable COM interface in the target service.

CVSS3: 7.8
0%
Низкий
5 месяцев назад
github логотип
GHSA-xxvc-26j5-3mg9

Cross Site Request Forgery vulnerability in Micro Focus Application Performance Management product, affecting versions 9.40, 9.50 and 9.51. The vulnerability could be exploited by attacker to trick the users into executing actions of the attacker's choosing.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-xxv9-w5hm-328j

Jenkins AppSpider Plugin missing permission checks

CVSS3: 4.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-xxv9-fp7w-qg3h

Flash Messaging clients can ignore disconnecting commands such as "shutdown" from the Flash Messaging Server 5.2.0g (rev 1.1.2), which could allow remote attackers to stay connected.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-xxv9-6fj9-h72p

An issue was discovered in ClipBucket before 4.0.0 Release 4902. Any OS commands can be injected via shell metacharacters in the file_name parameter to /api/file_uploader.php or /actions/file_downloader.php.

CVSS3: 9.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-xxv8-wfjw-6w8f

Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

CVSS3: 5.4
0%
Низкий
почти 2 года назад
github логотип
GHSA-xxv8-pv43-57x5

PEAR core file overwrite vulnerability

CVSS3: 7.5
6%
Низкий
больше 3 лет назад
github логотип
GHSA-xxv8-mwpq-qmc2

Buffer overflow in BS.player 2.27 build 959 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a .SRT file.

6%
Низкий
больше 3 лет назад
github логотип
GHSA-xxv7-22hc-322m

A flaw was found in OpenEXR's B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xxv6-qqx2-xg5m

A vulnerability has been found in SourceCodester Insurance Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 4.3
0%
Низкий
около 1 года назад
github логотип
GHSA-xxv6-ggg8-68mq

An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents.

CVSS3: 5.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xxv6-g27x-483v

Rejected reason: Not used

9 дней назад
github логотип
GHSA-xxv5-m8w5-gxh4

Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wrlEn_5g parameter at /goform/WifiBasicSet.

CVSS3: 6.5
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу