3 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

super-xray is a web vulnerability scanning tool. Versions prior to 0.7 assumed trusted input for the program config which is stored in a yaml file. An attacker with local access to the file could exploit this and compromise the program. This issue has been addressed in commit `4d0d5966` and will be included in future releases. Users are advised to upgrade. • https://github.com/4ra1n/super-xray/commit/4d0d59663596db03f39d7edd2be251d48b52dcfc https://github.com/4ra1n/super-xray/security/advisories/GHSA-39pv-4vmj-c4fr • CWE-502: Deserialization of Untrusted Data •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

super-xray is the GUI alternative for vulnerability scanning tool xray. In 0.2-beta, a privilege escalation vulnerability was discovered. This caused inaccurate default xray permissions. Note: this vulnerability only affects Linux and Mac OS systems. Users should upgrade to super-xray 0.3-beta. super-xray es la alternativa GUI para la herramienta de escaneo de vulnerabilidades xray. • https://github.com/4ra1n/super-xray/releases/tag/0.3-beta https://github.com/4ra1n/super-xray/security/advisories/GHSA-2g28-xrw6-fq5f • CWE-250: Execution with Unnecessary Privileges •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

super-xray is a vulnerability scanner (xray) GUI launcher. In version 0.1-beta, the URL is not filtered and directly spliced ​​into the command, resulting in a possible RCE vulnerability. Users should upgrade to super-xray 0.2-beta. super-xray es un launcher de GUI de escáner de vulnerabilidades (rayos x). En la versión 0.1-beta, la URL no se filtra y se une directamente al comando, lo que genera una posible vulnerabilidad RCE. Los usuarios deben actualizar a super-xray 0.2-beta. • https://github.com/4ra1n/super-xray/releases/tag/0.2-beta https://github.com/4ra1n/super-xray/security/advisories/GHSA-732j-763p-cvqg • CWE-94: Improper Control of Generation of Code ('Code Injection') •