
CVE-2025-23040 – Maliciously crafted remote URLs could lead to credential leak in GitHub Desktop
https://notcve.org/view.php?id=CVE-2025-23040
15 Jan 2025 — GitHub Desktop is an open-source Electron-based GitHub app designed for git development. An attacker convincing a user to clone a repository directly or through a submodule can allow the attacker access to the user's credentials through the use of maliciously crafted remote URL. GitHub Desktop relies on Git to perform all network related operations (such as cloning, fetching, and pushing). When a user attempts to clone a repository GitHub Desktop will invoke `git clone` and when Git encounters a remote whic... • https://github.com/GabrieleDattile/CVE-2025-23040 • CWE-522: Insufficiently Protected Credentials •

CVE-2024-54386 – WordPress Push Monkey Pro plugin <= 3.9 - CSRF to Stored XSS vulnerability
https://notcve.org/view.php?id=CVE-2024-54386
12 Dec 2024 — Cross-Site Request Forgery (CSRF) vulnerability in Get Push Monkey LLC Push Monkey Pro – Web Push Notifications and WooCommerce Abandoned Cart allows Cross Site Request Forgery.This issue affects Push Monkey Pro – Web Push Notifications and WooCommerce Abandoned Cart: from n/a through 3.9. The Push Monkey Pro – Web Push Notifications and WooCommerce Abandoned Cart plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.9. This is due to missing or incorrect n... • https://patchstack.com/database/wordpress/plugin/push-monkey-desktop-push-notifications/vulnerability/wordpress-push-monkey-pro-plugin-3-9-csrf-to-stored-xss-vulnerability?_s_id=cve • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2022-43752
https://notcve.org/view.php?id=CVE-2022-43752
31 Oct 2022 — Oracle Solaris version 10 1/13, when using the Common Desktop Environment (CDE), is vulnerable to a privilege escalation vulnerability. A low privileged user can escalate to root by crafting a malicious printer and double clicking on the the crafted printer's icon. Oracle Solaris versión 10 1/13, cuando se utiliza Common Desktop Environment (CDE), es vulnerable a una vulnerabilidad de escalada de privilegios. Un usuario con pocos privilegios puede escalar a root creando una impresora maliciosa y haciendo do... • http://phrack.org/issues/70/13.html#article • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2016-10351
https://notcve.org/view.php?id=CVE-2016-10351
01 May 2017 — Telegram Desktop 0.10.19 uses 0755 permissions for $HOME/.TelegramDesktop, which allows local users to obtain sensitive authentication information via standard filesystem operations. Telegram Desktop 0.10.19 utiliza permisos 0755 para $HOME/.TelegramDesktop, lo que permite a usuarios locales obtener información de autenticación sensible a través de operaciones estándar del sistema de ficheros. • https://github.com/telegramdesktop/tdesktop/issues/2666 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2009-0448 – Syntax Desktop 2.7 - 'synTarget' Local File Inclusion
https://notcve.org/view.php?id=CVE-2009-0448
05 Feb 2009 — Directory traversal vulnerability in admin/modules/aa/preview.php in Syntax Desktop 2.7 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the synTarget parameter. Vulnerabilidad de salto de directorio en admin/modules/aa/preview.php de Syntax Desktop v2.7, permite a atacantes remotos incluir y ejecutar ficheros locales de su elección a través de un .. (punto punto) en el parámetro synTarget. • https://www.exploit-db.com/exploits/7977 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2003-0766 – FTP Desktop 3.5 - Banner Parsing Buffer Overflow
https://notcve.org/view.php?id=CVE-2003-0766
12 Sep 2003 — Multiple heap-based buffer overflows in FTP Desktop client 3.5, and possibly earlier versions, allow remote malicious servers to execute arbitrary code via (1) a long FTP banner, (2) a long response to a USER command, or (3) a long response to a PASS command. Múltiples desbordamientos de búfer basados en la pila en FTP Desktop client 3.5, y posiblemente versiones anteriores, permite a usuarios remotos maliciosos ejecutar código arbitrario mediante un mensaje de bienbenida FTP largo, una respuesta larga a un... • https://www.exploit-db.com/exploits/23117 •