id
stringlengths
13
16
published
stringlengths
19
19
modified
timestamp[ns]
details
stringlengths
30
3.87k
severity
listlengths
1
1
repo_url
stringlengths
23
68
cwes
sequencelengths
0
1
commits
sequencelengths
1
4
CVE-2023-5950
2023-11-06T15:15:14
2025-01-14T12:08:43.954044
Rapid7 Velociraptor versions prior to 0.7.0-4 suffer from a reflected cross site scripting vulnerability. This vulnerability allows attackers to inject JS into the error path, potentially leading to unauthorized execution of scripts within a user's web browser. This vulnerability is fixed in version 0.7.0-04 and a patch is available to download. Patches are also available for version 0.6.9 (0.6.9-1).
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/velocidex/velociraptor
[]
[ "00a58d673852aad141a354fe18bd58f721ceaccd" ]
CVE-2021-3619
2021-07-22T19:15:09
2025-01-14T09:21:11.098147
Rapid7 Velociraptor 0.5.9 and prior is vulnerable to a post-authentication persistent cross-site scripting (XSS) issue, where an authenticated user could abuse MIME filetype sniffing to embed executable code on a malicious upload. This issue was fixed in version 0.6.0. Note that login rights to Velociraptor is nearly always reserved for trusted and verified users with IT security backgrounds.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/velocidex/velociraptor
[]
[ "00a58d673852aad141a354fe18bd58f721ceaccd" ]
CVE-2023-36088
2023-09-01T16:15:07
2025-01-14T11:47:50.902540
Server Side Request Forgery (SSRF) vulnerability in NebulaGraph Studio version 3.7.0, allows remote attackers to gain sensitive information.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/vesoft-inc/nebula-studio
[]
[ "b0e4f2474870feae96d5b8ada427afa78c22426d" ]
CVE-2024-32886
2024-05-08T14:15:08
2025-01-15T05:17:37.867977
Vitess is a database clustering system for horizontal scaling of MySQL. When executing the following simple query, the `vtgate` will go into an endless loop that also keeps consuming memory and eventually will run out of memory. This vulnerability is fixed in 19.0.4, 18.0.5, and 17.0.7.
null
https://github.com/vitessio/vitess
[]
[ "740c3799dc824977608d29c793b3bf1dbe1e9811" ]
CVE-2024-53257
2024-12-03T16:15:23
2025-01-15T05:06:16.306405
Vitess is a database clustering system for horizontal scaling of MySQL. The /debug/querylogz and /debug/env pages for vtgate and vttablet do not properly escape user input. The result is that queries executed by Vitess can write HTML into the monitoring page at will. These pages are rendered using text/template instead of rendering with a proper HTML templating engine. This vulnerability is fixed in 21.0.1, 20.0.4, and 19.0.8.
null
https://github.com/vitessio/vitess
[]
[ "740c3799dc824977608d29c793b3bf1dbe1e9811" ]
CVE-2023-29194
2023-04-14T19:15:09
2025-01-15T04:51:45.809146
Vitess is a database clustering system for horizontal scaling of MySQL. Users can either intentionally or inadvertently create a keyspace containing `/` characters such that from that point on, anyone who tries to view keyspaces from VTAdmin will receive an error. Trying to list all the keyspaces using `vtctldclient GetKeyspaces` will also return an error. Note that all other keyspaces can still be administered using the CLI (vtctldclient). This issue is fixed in version 16.0.1. As a workaround, delete the offending keyspace using a CLI client (vtctldclient).
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ]
https://github.com/vitessio/vitess
[]
[ "740c3799dc824977608d29c793b3bf1dbe1e9811" ]
CVE-2023-29195
2023-05-11T20:15:09
2025-01-15T04:51:38.859888
Vitess is a database clustering system for horizontal scaling of MySQL through generalized sharding. Prior to version 16.0.2, users can either intentionally or inadvertently create a shard containing `/` characters from VTAdmin such that from that point on, anyone who tries to create a new shard from VTAdmin will receive an error. Attempting to view the keyspace(s) will also no longer work. Creating a shard using `vtctldclient` does not have the same problem because the CLI validates the input correctly. Version 16.0.2, corresponding to version 0.16.2 of the `go` module, contains a patch for this issue. Some workarounds are available. Always use `vtctldclient` to create shards, instead of using VTAdmin; disable creating shards from VTAdmin using RBAC; and/or delete the topology record for the offending shard using the client for your topology server.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ]
https://github.com/vitessio/vitess
[]
[ "740c3799dc824977608d29c793b3bf1dbe1e9811" ]
CVE-2017-4952
2018-05-02T14:29:00
2025-02-19T02:26:24.480284
VMware Xenon 1.x, prior to 1.5.4-CR7_1, 1.5.7_7, 1.5.4-CR6_2, 1.3.7-CR1_2, 1.1.0-CR0-3, 1.1.0-CR3_1,1.4.2-CR4_1, and 1.5.4_8, contains an authentication bypass vulnerability due to insufficient access controls for utility endpoints. Successful exploitation of this issue may result in information disclosure.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/vmware-archive/xenon
[]
[ "6d6eac0e7f36b16e388854e5147b62d2b53aa16d" ]
CVE-2022-31677
2022-08-29T15:15:10
2025-02-19T03:27:37.169011
An Insufficient Session Expiration issue was discovered in the Pinniped Supervisor (before v0.19.0). A user authenticating to Kubernetes clusters via the Pinniped Supervisor could potentially use their access token to continue their session beyond what proper use of their refresh token might allow.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/vmware-tanzu/pinniped
[]
[ "52341f4e4901b982b033945406e35aed20fa3d1f" ]
CVE-2022-22975
2022-05-11T16:15:08
2025-02-19T03:23:43.035102
An issue was discovered in the Pinniped Supervisor with either LADPIdentityProvider or ActiveDirectoryIdentityProvider resources. An attack would involve the malicious user changing the common name (CN) of their user entry on the LDAP or AD server to include special characters, which could be used to perform LDAP query injection on the Supervisor's LDAP query which determines their Kubernetes group membership.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/vmware-tanzu/pinniped
[]
[ "52341f4e4901b982b033945406e35aed20fa3d1f" ]
CVE-2020-3996
2020-10-22T21:15:14
2025-01-14T08:47:25.780964
Velero (prior to 1.4.3 and 1.5.2) in some instances doesn’t properly manage volume identifiers which may result in information leakage to unauthorized users.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/vmware-tanzu/velero
[]
[ "56a08a4d695d893f0863f697c2f926e27d70c0c5" ]
CVE-2023-26608
2023-03-01T01:15:10
2025-01-14T11:36:07.384333
SOLDR (System of Orchestration, Lifecycle control, Detection and Response) 1.1.0 allows stored XSS via the module editor.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/vxcontrol/soldr
[]
[ "0f887a666e059f6ceb6942a6dc30b3615af7a1ab" ]
CVE-2021-38599
2021-08-12T16:15:10
2025-01-15T02:00:42.425276
WAL-G before 1.1, when a non-libsodium build (e.g., one of the official binary releases published as GitHub Releases) is used, silently ignores the libsodium encryption key and uploads cleartext backups. This is arguably a Principle of Least Surprise violation because "the user likely wanted to encrypt all file activity."
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/wal-g/wal-g
[]
[ "2611d11da12c89f1ac6c20afb98acaa2d42e0ea0" ]
CVE-2020-26278
2021-01-20T22:15:11
2025-01-15T01:44:55.742374
Weave Net is open source software which creates a virtual network that connects Docker containers across multiple hosts and enables their automatic discovery. Weave Net before version 2.8.0 has a vulnerability in which can allow an attacker to take over any host in the cluster. Weave Net is supplied with a manifest that runs pods on every node in a Kubernetes cluster, which are responsible for managing network connections for all other pods in the cluster. This requires a lot of power over the host, and the manifest sets `privileged: true`, which gives it that power. It also set `hostPID: true`, which gave it the ability to access all other processes on the host, and write anywhere in the root filesystem of the host. This setting was not necessary, and is being removed. You are only vulnerable if you have an additional vulnerability (e.g. a bug in Kubernetes) or misconfiguration that allows an attacker to run code inside the Weave Net pod, No such bug is known at the time of release, and there are no known instances of this being exploited. Weave Net 2.8.0 removes the hostPID setting and moves CNI plugin install to an init container. Users who do not update to 2.8.0 can edit the hostPID line in their existing DaemonSet manifest to say false instead of true, arrange some other way to install CNI plugins (e.g. Ansible) and remove those mounts from the DaemonSet manifest.
[ { "score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/weaveworks/weave
[]
[ "14730f8572996c0ce54fe98004ce2a923db8fb7d" ]
CVE-2020-11091
2020-06-03T23:15:11
2025-01-15T01:42:02.760337
In Weave Net before version 2.6.3, an attacker able to run a process as root in a container is able to respond to DNS requests from the host and thereby insert themselves as a fake service. In a cluster with an IPv4 internal network, if IPv6 is not totally disabled on the host (via ipv6.disable=1 on the kernel cmdline), it will be either unconfigured or configured on some interfaces, but it's pretty likely that ipv6 forwarding is disabled, ie /proc/sys/net/ipv6/conf//forwarding == 0. Also by default, /proc/sys/net/ipv6/conf//accept_ra == 1. The combination of these 2 sysctls means that the host accepts router advertisements and configure the IPv6 stack using them. By sending rogue router advertisements, an attacker can reconfigure the host to redirect part or all of the IPv6 traffic of the host to the attacker controlled container. Even if there was no IPv6 traffic before, if the DNS returns A (IPv4) and AAAA (IPv6) records, many HTTP libraries will try to connect via IPv6 first then fallback to IPv4, giving an opportunity to the attacker to respond. If by chance you also have on the host a vulnerability like last year's RCE in apt (CVE-2019-3462), you can now escalate to the host. Weave Net version 2.6.3 disables the accept_ra option on the veth devices that it creates.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/weaveworks/weave
[]
[ "14730f8572996c0ce54fe98004ce2a923db8fb7d" ]
CVE-2023-38976
2023-08-21T17:15:48
2025-02-19T03:34:35.984230
An issue in weaviate v.1.20.0 allows a remote attacker to cause a denial of service via the handleUnbatchedGraphQLRequest function.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/weaviate/weaviate
[]
[ "5ea51682b1a3a6d6299e72f1bac9d1a539e40679" ]
CVE-2022-37786
2023-01-01T08:15:10
2024-11-29T00:51:44.394595
An issue was discovered in WeCube Platform 3.2.2. There are multiple CSV injection issues: the [Home / Admin / Resources] page, the [Home / Admin / System Params] page, and the [Home / Design / Basekey Configuration] page.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "type": "CVSS_V3" } ]
https://github.com/webankpartners/wecube-platform
[]
[ "9712d3e8477c958209e04a5e4701006f5532d30e" ]
CVE-2022-37787
2023-01-01T08:15:10
2024-11-29T00:51:44.178016
An issue was discovered in WeCube platform 3.2.2. A DOM XSS vulnerability has been found on the plugin database execution page.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/webankpartners/wecube-platform
[]
[ "9712d3e8477c958209e04a5e4701006f5532d30e" ]
CVE-2022-37785
2023-01-01T08:15:10
2024-11-29T00:51:43.424206
An issue was discovered in WeCube Platform 3.2.2. Cleartext passwords are displayed in the configuration for terminal plugins.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/webankpartners/wecube-platform
[]
[ "9712d3e8477c958209e04a5e4701006f5532d30e" ]
CVE-2022-28945
2022-06-02T14:15:46
2024-11-29T00:51:42.815637
An issue in Webbank WeCube v3.2.2 allows attackers to execute a directory traversal via a crafted ZIP file.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/webankpartners/wecube-platform
[]
[ "9712d3e8477c958209e04a5e4701006f5532d30e" ]
CVE-2021-45746
2022-02-24T15:15:24
2024-11-29T00:52:15.941645
A Directory Traversal vulnerability exists in WeBankPartners wecube-platform 3.2.1 via the file variable in PluginPackageController.java.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/webankpartners/wecube-platform
[]
[ "9712d3e8477c958209e04a5e4701006f5532d30e" ]
CVE-2024-31218
2024-04-05T15:15:07
2025-01-15T05:12:42.915814
Webhood is a self-hosted URL scanner used analyzing phishing and malicious sites. Webhood's backend container images in versions 0.9.0 and earlier are subject to Missing Authentication for Critical Function vulnerability. This vulnerability allows an unauthenticated attacker to send a HTTP request to the database (Pocketbase) admin API to create an admin account. The Pocketbase admin API does not check for authentication/authorization when creating an admin account when no admin accounts have been added. In its default deployment, Webhood does not create a database admin account. Therefore, unless users have manually created an admin account in the database, an admin account will not exist in the deployment and the deployment is vulnerable. Versions starting from 0.9.1 are patched. The patch creates a randomly generated admin account if admin accounts have not already been created i.e. the vulnerability is exploitable in the deployment. As a workaround, users can disable access to URL path starting with `/api/admins` entirely. With this workaround, the vulnerability is not exploitable via network.
null
https://github.com/webhood-io/webhood
[]
[ "81c6ea83a2ab24ecd092a499f77f99a80368e132" ]
CVE-2021-46104
2022-01-19T13:15:07
2025-01-14T10:04:22.460553
An issue was discovered in webp_server_go 0.4.0. There is a directory traversal vulnerability that can read arbitrary file information on the server.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/webp-sh/webp_server_go
[]
[ "88dcc9c8733b6803cfb8d0d3445b76232042c7b6" ]
CVE-2024-8462
2024-09-05T13:15:12
2024-10-08T04:25:58.389339
A vulnerability was found in Windmill 1.380.0. It has been classified as problematic. Affected is an unknown function of the file backend/windmill-api/src/users.rs of the component HTTP Request Handler. The manipulation leads to improper restriction of excessive authentication attempts. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 1.390.1 is able to address this issue. The patch is identified as acfe7786152f036f2476f93ab5536571514fa9e3. It is recommended to upgrade the affected component.
null
https://github.com/windmill-labs/windmill
[]
[ "58dbc1a4d1a1b4cfa1130641ba5b20cb038f96f2" ]
CVE-2021-46873
2023-01-29T23:15:08
2025-01-14T10:04:56.532504
WireGuard, such as WireGuard 0.5.3 on Windows, does not fully account for the possibility that an adversary might be able to set a victim's system time to a future value, e.g., because unauthenticated NTP is used. This can lead to an outcome in which one static private key becomes permanently useless.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ]
https://github.com/wireguard/wireguard-windows
[]
[ "28e903804aa1302b791c24093dd7f42f0c7d0952" ]
CVE-2023-35838
2023-08-09T23:15:10
2025-01-14T11:47:11.426910
The WireGuard client 0.5.3 on Windows insecurely configures the operating system and firewall such that traffic to a local network that uses non-RFC1918 IP addresses is blocked. This allows an adversary to trick the victim into blocking IP traffic to selected IP addresses and services even while the VPN is enabled. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "LocalNet attack resulting in the blocking of traffic" rather than to only WireGuard.
[ { "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/wireguard/wireguard-windows
[]
[ "28e903804aa1302b791c24093dd7f42f0c7d0952" ]
CVE-2024-41121
2024-07-19T20:15:08
2025-01-14T12:17:10.540712
Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten. This issue has been addressed in release version 2.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/woodpecker-ci/woodpecker
[]
[ "7a4c6d32dea9159d40d82fa453dea79a1be455a4" ]
CVE-2024-41122
2024-07-19T20:15:08
2025-01-14T12:17:10.520435
Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten. This issue has been addressed in release version 2.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/woodpecker-ci/woodpecker
[]
[ "7a4c6d32dea9159d40d82fa453dea79a1be455a4" ]
CVE-2023-40034
2023-08-16T21:15:10
2025-01-15T04:57:01.672209
Woodpecker is a community fork of the Drone CI system. In affected versions an attacker can post malformed webhook data witch lead to an update of the repository data that can e.g. allow the takeover of an repo. This is only critical if the CI is configured for public usage and connected to a forge witch is also in public usage. This issue has been addressed in version 1.0.2. Users are advised to upgrade. Users unable to upgrade should secure the CI system by making it inaccessible to untrusted entities, for example, by placing it behind a firewall.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/woodpecker-ci/woodpecker
[]
[ "7a4c6d32dea9159d40d82fa453dea79a1be455a4" ]
CVE-2022-29947
2022-04-29T21:15:07
2025-02-19T03:26:53.693887
Woodpecker before 0.15.1 allows XSS via build logs because web/src/components/repo/build/BuildLog.vue lacks escaping.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/woodpecker-ci/woodpecker
[]
[ "7a4c6d32dea9159d40d82fa453dea79a1be455a4" ]
CVE-2025-24337
2025-01-20T14:15:27
2025-02-19T03:38:59.210918
WriteFreely through 0.15.1, when MySQL is used, allows local users to discover credentials by reading config.ini.
null
https://github.com/writefreely/writefreely
[]
[ "8d14c09dc6bb7790f91c4efa532c4534007beb1f" ]
CVE-2019-15716
2019-08-28T15:15:10
2025-02-19T02:49:49.825874
WTF before 0.19.0 does not set the permissions of config.yml, which might make it easier for local attackers to read passwords or API keys if the permissions were misconfigured or were based on unsafe OS defaults.
[ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/wtfutil/wtf
[]
[ "ab94bd34acb01c10e19e0c0128075e5c0d91a019" ]
CVE-2025-24369
2025-01-27T23:15:11
2025-01-29T00:26:49.820224
Anubis is a tool that allows administrators to protect bots against AI scrapers through bot-checking heuristics and a proof-of-work challenge to discourage scraping from multiple IP addresses. Anubis allows attackers to bypass the bot protection by requesting a challenge, formulates any nonce (such as 42069), and then passes the challenge with difficulty zero. Commit e09d0226a628f04b1d80fd83bee777894a45cd02 fixes this behavior by not using a client-specified difficulty value.
null
https://github.com/xe/x
[]
[ "e34b2e76d8ac11cb439b50df62b5cd313d23c51c" ]
CVE-2023-33498
2023-06-07T14:15:09
2025-02-19T03:33:30.663423
alist <=3.16.3 is vulnerable to Incorrect Access Control. Low privilege accounts can upload any file.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/xhofe/alist
[]
[ "d988f98b81f6a5a04713844273eb560f72e1020d" ]
CVE-2023-31726
2023-05-23T22:15:09
2025-02-19T03:32:01.421618
AList 3.15.1 is vulnerable to Incorrect Access Control, which can be exploited by attackers to obtain sensitive information.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/xhofe/alist
[]
[ "d988f98b81f6a5a04713844273eb560f72e1020d" ]
CVE-2022-26533
2022-03-12T01:15:35
2025-01-14T10:53:08.018404
Alist v2.1.0 and below was discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/xhofe/alist
[]
[ "d988f98b81f6a5a04713844273eb560f72e1020d" ]
CVE-2022-45969
2022-12-15T23:15:10
2025-01-14T11:15:59.247693
Alist v3.4.0 is vulnerable to Directory Traversal,
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/xhofe/alist
[]
[ "d988f98b81f6a5a04713844273eb560f72e1020d" ]
CVE-2022-45968
2022-12-12T14:15:10
2025-01-14T11:15:59.061433
Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one).
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/xhofe/alist
[]
[ "d988f98b81f6a5a04713844273eb560f72e1020d" ]
CVE-2022-45970
2022-12-12T14:15:10
2025-01-14T11:15:35.917706
Alist v3.5.1 is vulnerable to Cross Site Scripting (XSS) via the bulletin board.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/xhofe/alist
[]
[ "d988f98b81f6a5a04713844273eb560f72e1020d" ]
CVE-2020-22741
2021-07-19T19:15:07
2025-01-14T08:38:18.388826
An issue was discovered in Xuperchain 3.6.0 that allows for attackers to recover any arbitrary users' private key after obtaining the partial signature in multisignature.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/xuperchain/xuperchain
[]
[ "6b2877f27a4017e1dc75fb69cedeb62f2ec9c3ed" ]
CVE-2019-6035
2019-12-26T16:15:12
2025-02-19T02:59:35.533164
Open redirect vulnerability in Athenz v1.8.24 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted page.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/yahoo/athenz
[]
[ "338bf6f92ac6e60734a37c319f8328e1fd6d965c" ]
CVE-2023-40023
2023-08-14T20:15:12
2025-01-14T12:01:18.446505
yaklang is a programming language designed for cybersecurity. The Yak Engine has been found to contain a local file inclusion (LFI) vulnerability. This vulnerability allows attackers to include files from the server's local file system through the web application. When exploited, this can lead to the unintended exposure of sensitive data, potential remote code execution, or other security breaches. Users utilizing versions of the Yak Engine prior to 1.2.4-sp1 are impacted. This vulnerability has been patched in version 1.2.4-sp1. Users are advised to upgrade. users unable to upgrade may avoid exposing vulnerable versions to untrusted input and to closely monitor any unexpected server behavior until they can upgrade.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/yaklang/yaklang
[]
[ "0e460307d875d2475352b21e2fc97623e193965d" ]
CVE-2023-45825
2023-10-19T19:15:16
2025-02-19T03:33:13.530244
ydb-go-sdk is a pure Go native and database/sql driver for the YDB platform. Since ydb-go-sdk v3.48.6 if you use a custom credentials object (implementation of interface Credentials it may leak into logs. This happens because this object could be serialized into an error message using `fmt.Errorf("something went wrong (credentials: %q)", credentials)` during connection to the YDB server. If such logging occurred, a malicious user with access to logs could read sensitive information (i.e. credentials) information and use it to get access to the database. ydb-go-sdk contains this problem in versions from v3.48.6 to v3.53.2. The fix for this problem has been released in version v3.53.3. Users are advised to upgrade. Users unable to upgrade should implement the `fmt.Stringer` interface in your custom credentials type with explicit stringify of object state.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/ydb-platform/ydb-go-sdk
[]
[ "640314266bc72733a11a2bd4ef57e5105456ef76" ]
CVE-2020-36561
2022-12-27T22:15:11
2025-01-15T01:45:26.327112
Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/yi-ge/unzip
[]
[ "402558c226bceb32d9a9c7fe2ecdc85f97c66eeb" ]
CVE-2023-1971
2023-04-10T17:15:06
2025-02-19T03:28:56.447389
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in yuan1994 tpAdmin 1.3.12. Affected is the function remote of the file application\admin\controller\Upload.php. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225408. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/yuan1994/tpadmin
[]
[ "2c651128f29d369b00f111bf814b0b29d21f1c60" ]
CVE-2023-1970
2023-04-10T16:15:07
2025-02-19T03:28:56.680081
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, has been found in yuan1994 tpAdmin 1.3.12. This issue affects the function Upload of the file application\admin\controller\Upload.php. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225407. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/yuan1994/tpadmin
[]
[ "2c651128f29d369b00f111bf814b0b29d21f1c60" ]
CVE-2021-28484
2021-04-14T18:15:14
2025-01-14T09:02:50.861954
An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send it data, preventing any further operations until the yubihsm-connector is restarted. An attacker can send 0, 1, or 2 bytes to trigger this.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/yubico/yubihsm-connector
[]
[ "edbd86c4bfc543897461c4236817d25657d79d9d" ]
CVE-2024-22121
2024-08-12T13:38:16
2025-01-15T05:15:00.566725
A non-admin user can change or remove important features within the Zabbix Agent application, thus impacting the integrity and availability of the application.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", "type": "CVSS_V3" } ]
https://github.com/zabbix/zabbix
[]
[ "84da35e401c68e886e64af313b6f4d81d0e282f6", "9665d62db0e4b40f8fadbcf830e06530a0cc6935" ]
CVE-2022-23131
2022-01-13T16:15:08
2025-01-14T10:53:32.826421
In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/zabbix/zabbix
[]
[ "9665d62db0e4b40f8fadbcf830e06530a0cc6935" ]
CVE-2021-46088
2022-01-27T16:15:07
2025-01-14T10:10:03.898190
Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/zabbix/zabbix
[]
[ "9665d62db0e4b40f8fadbcf830e06530a0cc6935" ]
CVE-2022-43516
2022-12-05T20:15:10
2025-01-14T11:19:08.539185
A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/zabbix/zabbix
[]
[ "84da35e401c68e886e64af313b6f4d81d0e282f6" ]
CVE-2022-34296
2022-06-23T17:15:18
2025-02-19T03:29:18.119710
In Zalando Skipper before 0.13.218, a query predicate could be bypassed via a prepared request.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/zalando/skipper
[]
[ "691d12a620fd30eda75a575e91b2c76dfa089b64" ]
CVE-2022-38580
2022-10-25T17:15:55
2025-02-19T03:29:35.374517
Zalando Skipper v0.13.236 is vulnerable to Server-Side Request Forgery (SSRF).
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/zalando/skipper
[]
[ "691d12a620fd30eda75a575e91b2c76dfa089b64" ]
CVE-2024-27302
2024-03-06T19:15:08
2025-01-15T05:10:20.920685
go-zero is a web and rpc framework. Go-zero allows user to specify a CORS Filter with a configurable allows param - which is an array of domains allowed in CORS policy. However, the `isOriginAllowed` uses `strings.HasSuffix` to check the origin, which leads to bypass via a malicious domain. This vulnerability is capable of breaking CORS policy and thus allowing any page to make requests and/or retrieve data on behalf of other users. Version 1.4.4 fixes this issue.
null
https://github.com/zeromicro/go-zero
[]
[ "d953675085476c98772fbc495ccaf47b9fd479df" ]
CVE-2022-38867
2023-02-15T22:15:11
2025-01-14T11:09:21.271828
SQL Injection vulnerability in rttys versions 4.0.0, 4.0.1, and 4.0.2 in api.go, allows attackers to execute arbitrary code.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/zhaojh329/rttys
[]
[ "be2391c0e0315b0e3970e73481e42865bf71110b" ]
CVE-2022-32172
2022-10-06T18:16:03
2025-01-15T02:23:20.192921
In Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete template functionality. When an authenticated user deletes a template with a XSS payload in the name field, the Javascript payload will be executed and allow an attacker to access the user’s credentials.
null
https://github.com/zinclabs/zincsearch
[]
[ "256a3935c5aadac1c06bb028d1d34bb0230f5886" ]
CVE-2022-32171
2022-10-06T18:16:02
2025-01-15T02:23:19.778633
In Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete user functionality. When an authenticated user deletes a user having a XSS payload in the user id field, the javascript payload will be executed and allow an attacker to access the user’s credentials.
null
https://github.com/zinclabs/zincsearch
[]
[ "256a3935c5aadac1c06bb028d1d34bb0230f5886" ]
CVE-2024-2339
2024-03-08T20:15:46
2025-02-12T17:50:42.793341
PostgreSQL Anonymizer v1.2 contains a vulnerability that allows a user who owns a table to elevate to superuser. A user can define a masking function for a column and place malicious code in that function. When a privileged user applies the masking rules using the static masking or the anonymous dump method, the malicious code is executed and can grant escalated privileges to the malicious user. PostgreSQL Anonymizer v1.2 does provide a protection against this risk with the restrict_to_trusted_schemas option, but that protection is incomplete. Users that don't own a table, especially masked users cannot exploit this vulnerability. The problem is resolved in v1.3.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://gitlab.com/dalibo/postgresql_anonymizer
[]
[ "5071c21c9d179d0e2ae8fcd47203a8b2cd0f1b5d" ]
CVE-2024-2338
2024-03-08T20:15:45
2025-02-12T17:49:40.357605
PostgreSQL Anonymizer v1.2 contains a SQL injection vulnerability that allows a user who owns a table to elevate to superuser when dynamic masking is enabled. PostgreSQL Anonymizer enables users to set security labels on tables to mask specified columns. There is a flaw that allows complex expressions to be provided as a value. This expression is then later used as it to create the masked views leading to SQL Injection. If dynamic masking is enabled, this will lead to privilege escalation to superuser after the label is created. Users that don't own a table, especially masked users cannot exploit this vulnerability. The problem is resolved in v1.3.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://gitlab.com/dalibo/postgresql_anonymizer
[]
[ "5071c21c9d179d0e2ae8fcd47203a8b2cd0f1b5d" ]
CVE-2020-13353
2020-11-17T01:15:13
2025-02-19T03:05:02.098965
When importing repos via URL, one time use git credentials were persisted beyond the expected time window in Gitaly 1.79.0 or above.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://gitlab.com/gitlab-org/gitaly
[]
[ "9045ffc7c83f270e6517833ab3ce1149e35efb70" ]
CVE-2021-39947
2022-06-06T17:15:09
2025-01-14T09:45:24.900299
In specific circumstances, trace file buffers in GitLab Runner versions up to 14.3.4, 14.4 to 14.4.2, and 14.5 to 14.5.2 would re-use the file descriptor 0 for multiple traces and mix the output of several jobs
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://gitlab.com/gitlab-org/gitlab-runner
[]
[ "8ed4e545331246c19bdf6fdaf5c1c0765620936b" ]
CVE-2019-9904
2019-03-21T18:29:00
2025-01-14T08:11:13.767350
An issue was discovered in lib\cdt\dttree.c in libcdt.a in graphviz 2.40.1. Stack consumption occurs because of recursive agclose calls in lib\cgraph\graph.c in libcgraph.a, related to agfstsubg in lib\cgraph\subg.c.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://gitlab.com/graphviz/graphviz
[]
[ "67cd2e5121379a38e0801cc05cce5033f8a2a609" ]