Логотип exploitDog
source:"github"
Консоль
Логотип exploitDog

exploitDog

source:"github"

Количество 289 803

Количество 289 803

github логотип

GHSA-xwrh-gfhf-9mw4

больше 2 лет назад

Rapid7 InsightVM suffers from insufficient session expiration when an administrator performs a security relevant edit on an existing, logged on user. For example, if a user's password is changed by an administrator due to an otherwise unrelated credential leak, that user account's current session is still valid after the password change, potentially allowing the attacker who originally compromised the credential to remain logged in and able to cause further damage. This vulnerability is mitigated by the use of the Platform Login feature. This issue is related to CVE-2019-5638.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-xwrf-mmfx-x4vx

около 3 лет назад

On BIG-IP versions 15.1.0.4 through 15.1.3, when the Data Plane Development Kit (DPDK)/Elastic Network Adapter (ENA) driver is used with BIG-IP on Amazon Web Services (AWS) systems, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. This is due to an incomplete fix for CVE-2020-5862. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

EPSS: Низкий
github логотип

GHSA-xwrf-hhx9-vmhv

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests The FSM can run in a circle allowing rdma_resolve_ip() to be called twice on the same id_priv. While this cannot happen without going through the work, it violates the invariant that the same address resolution background request cannot be active twice. CPU 1 CPU 2 rdma_resolve_addr(): RDMA_CM_IDLE -> RDMA_CM_ADDR_QUERY rdma_resolve_ip(addr_handler) #1 process_one_req(): for #1 addr_handler(): RDMA_CM_ADDR_QUERY -> RDMA_CM_ADDR_BOUND mutex_unlock(&id_priv->handler_mutex); [.. handler still running ..] rdma_resolve_addr(): RDMA_CM_ADDR_BOUND -> RDMA_CM_ADDR_QUERY rdma_resolve_ip(addr_handler) !! two requests are now on the req_list rdma_destroy_id(): destroy_id_handler_unlo...

EPSS: Низкий
github логотип

GHSA-xwr9-qph4-cpwg

6 дней назад

A security issue exists within the 5032 16pt Digital Configurable module’s web server. The web server’s session number increments at an interval that correlates to the last two consecutive sign in session interval, making it predictable.

EPSS: Низкий
github логотип

GHSA-xwr9-qp3g-c7vh

9 месяцев назад

Incorrect access control in the component l_0_0.xml of TP-Link ARCHER-C7 v5 allows attackers to access sensitive information.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xwr9-j862-6mj9

почти 2 года назад

A memory leakage vulnerability was reported in the 534D0140 DXE driver that may allow a local attacker with elevated privileges to write to NVRAM variables.

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-xwr7-j9pf-gg7p

больше 3 лет назад

Cross-site scripting (XSS) vulnerability in nqt.php in Network Query Tool (NQT) 1.6 allows remote attackers to inject arbitrary web script or HTML via the portNum parameter.

EPSS: Низкий
github логотип

GHSA-xwr5-mcxm-cm87

около 3 лет назад

This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution.

CVSS3: 6.1
EPSS: Высокий
github логотип

GHSA-xwr3-fmgj-mmfr

почти 8 лет назад

Exposure of Sensitive Information in bio-basespace-sdk

EPSS: Низкий
github логотип

GHSA-xwr3-f5gh-9v6w

9 месяцев назад

Wi-Fi Alliance wfa_dut (in Wi-Fi Test Suite) through 9.0.0 allows OS command injection via 802.11x frames because the system() library function is used. For example, on Arcadyan FMIMG51AX000J devices, this leads to wfaTGSendPing remote code execution as root via traffic to TCP port 8000 or 8080 on a LAN interface. On other devices, this may be exploitable over a WAN interface.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xwr3-6hhp-5cch

почти 2 года назад

QSige statistics are affected by a remote SQLi vulnerability. It has been identified that the web application does not correctly filter input parameters, allowing SQL injections, DoS or information disclosure. As a prerequisite, it is necessary to log into the application.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xwr3-5rff-6h5p

больше 3 лет назад

In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160830.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-xwr2-9ffc-64f7

больше 1 года назад

The unlockKey character in a lock using Sciener firmware can be brute forced through repeated challenge requests, compromising the locks integrity.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-xwqx-x38c-cw95

около 3 лет назад

Snipe-IT 6.0.2 vulnerable to Cross-site Scripting

CVSS3: 4.8
EPSS: Низкий
github логотип

GHSA-xwqx-rpjh-4w5r

больше 3 лет назад

delqueueask in rccp 0.9 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/cccp_tmp.txt temporary file.

EPSS: Низкий
github логотип

GHSA-xwqx-m66h-v4hc

больше 3 лет назад

Heap-based buffer overflow in the kernel in NetBSD 3.0, certain versions of FreeBSD and OpenBSD, and possibly other BSD derived operating systems allows local users to have an unknown impact. NOTE: this information is based upon a vague pre-advisory with no actionable information. Details will be updated after 20070329.

EPSS: Низкий
github логотип

GHSA-xwqx-h938-xp3h

больше 3 лет назад

The TNS Listener, as used in Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, and 10g 10.2.0.3, 10.2.0.4, and 10.2.0.5, as used in Oracle Fusion Middleware, Enterprise Manager, E-Business Suite, and possibly other products, allows remote attackers to execute arbitrary database commands by performing a remote registration of a database (1) instance or (2) service name that already exists, then conducting a man-in-the-middle (MITM) attack to hijack database connections, aka "TNS Poison."

EPSS: Критический
github логотип

GHSA-xwqw-rf2q-xmhf

почти 5 лет назад

Cross-Site Scripting in buefy

EPSS: Низкий
github логотип

GHSA-xwqw-68pp-fwpc

13 дней назад

Student Attendance Management System v1 was discovered to contain multiple SQL injection vulnerabilities in createStudents.php via the Id, firstname, and admissionNumber parameters.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xwqv-pr7g-x8xf

больше 3 лет назад

SQL injection vulnerability in the Book Reviews (sk_bookreview) extension 0.0.12 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-xwrh-gfhf-9mw4

Rapid7 InsightVM suffers from insufficient session expiration when an administrator performs a security relevant edit on an existing, logged on user. For example, if a user's password is changed by an administrator due to an otherwise unrelated credential leak, that user account's current session is still valid after the password change, potentially allowing the attacker who originally compromised the credential to remain logged in and able to cause further damage. This vulnerability is mitigated by the use of the Platform Login feature. This issue is related to CVE-2019-5638.

CVSS3: 5.4
0%
Низкий
больше 2 лет назад
github логотип
GHSA-xwrf-mmfx-x4vx

On BIG-IP versions 15.1.0.4 through 15.1.3, when the Data Plane Development Kit (DPDK)/Elastic Network Adapter (ENA) driver is used with BIG-IP on Amazon Web Services (AWS) systems, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. This is due to an incomplete fix for CVE-2020-5862. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

1%
Низкий
около 3 лет назад
github логотип
GHSA-xwrf-hhx9-vmhv

In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests The FSM can run in a circle allowing rdma_resolve_ip() to be called twice on the same id_priv. While this cannot happen without going through the work, it violates the invariant that the same address resolution background request cannot be active twice. CPU 1 CPU 2 rdma_resolve_addr(): RDMA_CM_IDLE -> RDMA_CM_ADDR_QUERY rdma_resolve_ip(addr_handler) #1 process_one_req(): for #1 addr_handler(): RDMA_CM_ADDR_QUERY -> RDMA_CM_ADDR_BOUND mutex_unlock(&id_priv->handler_mutex); [.. handler still running ..] rdma_resolve_addr(): RDMA_CM_ADDR_BOUND -> RDMA_CM_ADDR_QUERY rdma_resolve_ip(addr_handler) !! two requests are now on the req_list rdma_destroy_id(): destroy_id_handler_unlo...

0%
Низкий
около 1 года назад
github логотип
GHSA-xwr9-qph4-cpwg

A security issue exists within the 5032 16pt Digital Configurable module’s web server. The web server’s session number increments at an interval that correlates to the last two consecutive sign in session interval, making it predictable.

0%
Низкий
6 дней назад
github логотип
GHSA-xwr9-qp3g-c7vh

Incorrect access control in the component l_0_0.xml of TP-Link ARCHER-C7 v5 allows attackers to access sensitive information.

CVSS3: 7.5
0%
Низкий
9 месяцев назад
github логотип
GHSA-xwr9-j862-6mj9

A memory leakage vulnerability was reported in the 534D0140 DXE driver that may allow a local attacker with elevated privileges to write to NVRAM variables.

CVSS3: 6.7
0%
Низкий
почти 2 года назад
github логотип
GHSA-xwr7-j9pf-gg7p

Cross-site scripting (XSS) vulnerability in nqt.php in Network Query Tool (NQT) 1.6 allows remote attackers to inject arbitrary web script or HTML via the portNum parameter.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-xwr5-mcxm-cm87

This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution.

CVSS3: 6.1
79%
Высокий
около 3 лет назад
github логотип
GHSA-xwr3-fmgj-mmfr

Exposure of Sensitive Information in bio-basespace-sdk

0%
Низкий
почти 8 лет назад
github логотип
GHSA-xwr3-f5gh-9v6w

Wi-Fi Alliance wfa_dut (in Wi-Fi Test Suite) through 9.0.0 allows OS command injection via 802.11x frames because the system() library function is used. For example, on Arcadyan FMIMG51AX000J devices, this leads to wfaTGSendPing remote code execution as root via traffic to TCP port 8000 or 8080 on a LAN interface. On other devices, this may be exploitable over a WAN interface.

CVSS3: 8.8
9%
Низкий
9 месяцев назад
github логотип
GHSA-xwr3-6hhp-5cch

QSige statistics are affected by a remote SQLi vulnerability. It has been identified that the web application does not correctly filter input parameters, allowing SQL injections, DoS or information disclosure. As a prerequisite, it is necessary to log into the application.

CVSS3: 8.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-xwr3-5rff-6h5p

In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160830.

CVSS3: 6.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xwr2-9ffc-64f7

The unlockKey character in a lock using Sciener firmware can be brute forced through repeated challenge requests, compromising the locks integrity.

CVSS3: 9.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-xwqx-x38c-cw95

Snipe-IT 6.0.2 vulnerable to Cross-site Scripting

CVSS3: 4.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-xwqx-rpjh-4w5r

delqueueask in rccp 0.9 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/cccp_tmp.txt temporary file.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-xwqx-m66h-v4hc

Heap-based buffer overflow in the kernel in NetBSD 3.0, certain versions of FreeBSD and OpenBSD, and possibly other BSD derived operating systems allows local users to have an unknown impact. NOTE: this information is based upon a vague pre-advisory with no actionable information. Details will be updated after 20070329.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-xwqx-h938-xp3h

The TNS Listener, as used in Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, and 10g 10.2.0.3, 10.2.0.4, and 10.2.0.5, as used in Oracle Fusion Middleware, Enterprise Manager, E-Business Suite, and possibly other products, allows remote attackers to execute arbitrary database commands by performing a remote registration of a database (1) instance or (2) service name that already exists, then conducting a man-in-the-middle (MITM) attack to hijack database connections, aka "TNS Poison."

92%
Критический
больше 3 лет назад
github логотип
GHSA-xwqw-rf2q-xmhf

Cross-Site Scripting in buefy

почти 5 лет назад
github логотип
GHSA-xwqw-68pp-fwpc

Student Attendance Management System v1 was discovered to contain multiple SQL injection vulnerabilities in createStudents.php via the Id, firstname, and admissionNumber parameters.

CVSS3: 8.8
0%
Низкий
13 дней назад
github логотип
GHSA-xwqv-pr7g-x8xf

SQL injection vulnerability in the Book Reviews (sk_bookreview) extension 0.0.12 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу