id
stringlengths 13
16
| published
stringlengths 19
19
| modified
timestamp[ns] | details
stringlengths 30
3.87k
| severity
listlengths 1
1
⌀ | repo_url
stringlengths 23
68
| cwes
sequencelengths 0
1
| commits
sequencelengths 1
4
|
---|---|---|---|---|---|---|---|
CVE-2023-5950 | 2023-11-06T15:15:14 | 2025-01-14T12:08:43.954044 | Rapid7 Velociraptor versions prior to 0.7.0-4 suffer from a reflected cross site scripting vulnerability. This vulnerability allows attackers to inject JS into the error path, potentially leading to unauthorized execution of scripts within a user's web browser. This vulnerability is fixed in version 0.7.0-04 and a patch is available to download. Patches are also available for version 0.6.9 (0.6.9-1).
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/velocidex/velociraptor | [] | [
"00a58d673852aad141a354fe18bd58f721ceaccd"
] |
CVE-2021-3619 | 2021-07-22T19:15:09 | 2025-01-14T09:21:11.098147 | Rapid7 Velociraptor 0.5.9 and prior is vulnerable to a post-authentication persistent cross-site scripting (XSS) issue, where an authenticated user could abuse MIME filetype sniffing to embed executable code on a malicious upload. This issue was fixed in version 0.6.0. Note that login rights to Velociraptor is nearly always reserved for trusted and verified users with IT security backgrounds. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/velocidex/velociraptor | [] | [
"00a58d673852aad141a354fe18bd58f721ceaccd"
] |
CVE-2023-36088 | 2023-09-01T16:15:07 | 2025-01-14T11:47:50.902540 | Server Side Request Forgery (SSRF) vulnerability in NebulaGraph Studio version 3.7.0, allows remote attackers to gain sensitive information. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/vesoft-inc/nebula-studio | [] | [
"b0e4f2474870feae96d5b8ada427afa78c22426d"
] |
CVE-2024-32886 | 2024-05-08T14:15:08 | 2025-01-15T05:17:37.867977 | Vitess is a database clustering system for horizontal scaling of MySQL. When executing the following simple query, the `vtgate` will go into an endless loop that also keeps consuming memory and eventually will run out of memory. This vulnerability is fixed in 19.0.4, 18.0.5, and 17.0.7. | null | https://github.com/vitessio/vitess | [] | [
"740c3799dc824977608d29c793b3bf1dbe1e9811"
] |
CVE-2024-53257 | 2024-12-03T16:15:23 | 2025-01-15T05:06:16.306405 | Vitess is a database clustering system for horizontal scaling of MySQL. The /debug/querylogz and /debug/env pages for vtgate and vttablet do not properly escape user input. The result is that queries executed by Vitess can write HTML into the monitoring page at will. These pages are rendered using text/template instead of rendering with a proper HTML templating engine. This vulnerability is fixed in 21.0.1, 20.0.4, and 19.0.8. | null | https://github.com/vitessio/vitess | [] | [
"740c3799dc824977608d29c793b3bf1dbe1e9811"
] |
CVE-2023-29194 | 2023-04-14T19:15:09 | 2025-01-15T04:51:45.809146 | Vitess is a database clustering system for horizontal scaling of MySQL. Users can either intentionally or inadvertently create a keyspace containing `/` characters such that from that point on, anyone who tries to view keyspaces from VTAdmin will receive an error. Trying to list all the keyspaces using `vtctldclient GetKeyspaces` will also return an error. Note that all other keyspaces can still be administered using the CLI (vtctldclient). This issue is fixed in version 16.0.1. As a workaround, delete the offending keyspace using a CLI client (vtctldclient). | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
] | https://github.com/vitessio/vitess | [] | [
"740c3799dc824977608d29c793b3bf1dbe1e9811"
] |
CVE-2023-29195 | 2023-05-11T20:15:09 | 2025-01-15T04:51:38.859888 | Vitess is a database clustering system for horizontal scaling of MySQL through generalized sharding. Prior to version 16.0.2, users can either intentionally or inadvertently create a shard containing `/` characters from VTAdmin such that from that point on, anyone who tries to create a new shard from VTAdmin will receive an error. Attempting to view the keyspace(s) will also no longer work. Creating a shard using `vtctldclient` does not have the same problem because the CLI validates the input correctly. Version 16.0.2, corresponding to version 0.16.2 of the `go` module, contains a patch for this issue. Some workarounds are available. Always use `vtctldclient` to create shards, instead of using VTAdmin; disable creating shards from VTAdmin using RBAC; and/or delete the topology record for the offending shard using the client for your topology server. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
] | https://github.com/vitessio/vitess | [] | [
"740c3799dc824977608d29c793b3bf1dbe1e9811"
] |
CVE-2017-4952 | 2018-05-02T14:29:00 | 2025-02-19T02:26:24.480284 | VMware Xenon 1.x, prior to 1.5.4-CR7_1, 1.5.7_7, 1.5.4-CR6_2, 1.3.7-CR1_2, 1.1.0-CR0-3, 1.1.0-CR3_1,1.4.2-CR4_1, and 1.5.4_8, contains an authentication bypass vulnerability due to insufficient access controls for utility endpoints. Successful exploitation of this issue may result in information disclosure. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/vmware-archive/xenon | [] | [
"6d6eac0e7f36b16e388854e5147b62d2b53aa16d"
] |
CVE-2022-31677 | 2022-08-29T15:15:10 | 2025-02-19T03:27:37.169011 | An Insufficient Session Expiration issue was discovered in the Pinniped Supervisor (before v0.19.0). A user authenticating to Kubernetes clusters via the Pinniped Supervisor could potentially use their access token to continue their session beyond what proper use of their refresh token might allow. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/vmware-tanzu/pinniped | [] | [
"52341f4e4901b982b033945406e35aed20fa3d1f"
] |
CVE-2022-22975 | 2022-05-11T16:15:08 | 2025-02-19T03:23:43.035102 | An issue was discovered in the Pinniped Supervisor with either LADPIdentityProvider or ActiveDirectoryIdentityProvider resources. An attack would involve the malicious user changing the common name (CN) of their user entry on the LDAP or AD server to include special characters, which could be used to perform LDAP query injection on the Supervisor's LDAP query which determines their Kubernetes group membership. | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/vmware-tanzu/pinniped | [] | [
"52341f4e4901b982b033945406e35aed20fa3d1f"
] |
CVE-2020-3996 | 2020-10-22T21:15:14 | 2025-01-14T08:47:25.780964 | Velero (prior to 1.4.3 and 1.5.2) in some instances doesn’t properly manage volume identifiers which may result in information leakage to unauthorized users. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/vmware-tanzu/velero | [] | [
"56a08a4d695d893f0863f697c2f926e27d70c0c5"
] |
CVE-2023-26608 | 2023-03-01T01:15:10 | 2025-01-14T11:36:07.384333 | SOLDR (System of Orchestration, Lifecycle control, Detection and Response) 1.1.0 allows stored XSS via the module editor. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/vxcontrol/soldr | [] | [
"0f887a666e059f6ceb6942a6dc30b3615af7a1ab"
] |
CVE-2021-38599 | 2021-08-12T16:15:10 | 2025-01-15T02:00:42.425276 | WAL-G before 1.1, when a non-libsodium build (e.g., one of the official binary releases published as GitHub Releases) is used, silently ignores the libsodium encryption key and uploads cleartext backups. This is arguably a Principle of Least Surprise violation because "the user likely wanted to encrypt all file activity." | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/wal-g/wal-g | [] | [
"2611d11da12c89f1ac6c20afb98acaa2d42e0ea0"
] |
CVE-2020-26278 | 2021-01-20T22:15:11 | 2025-01-15T01:44:55.742374 | Weave Net is open source software which creates a virtual network that connects Docker containers across multiple hosts and enables their automatic discovery. Weave Net before version 2.8.0 has a vulnerability in which can allow an attacker to take over any host in the cluster. Weave Net is supplied with a manifest that runs pods on every node in a Kubernetes cluster, which are responsible for managing network connections for all other pods in the cluster. This requires a lot of power over the host, and the manifest sets `privileged: true`, which gives it that power. It also set `hostPID: true`, which gave it the ability to access all other processes on the host, and write anywhere in the root filesystem of the host. This setting was not necessary, and is being removed. You are only vulnerable if you have an additional vulnerability (e.g. a bug in Kubernetes) or misconfiguration that allows an attacker to run code inside the Weave Net pod, No such bug is known at the time of release, and there are no known instances of this being exploited. Weave Net 2.8.0 removes the hostPID setting and moves CNI plugin install to an init container. Users who do not update to 2.8.0 can edit the hostPID line in their existing DaemonSet manifest to say false instead of true, arrange some other way to install CNI plugins (e.g. Ansible) and remove those mounts from the DaemonSet manifest. | [
{
"score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/weaveworks/weave | [] | [
"14730f8572996c0ce54fe98004ce2a923db8fb7d"
] |
CVE-2020-11091 | 2020-06-03T23:15:11 | 2025-01-15T01:42:02.760337 | In Weave Net before version 2.6.3, an attacker able to run a process as root in a container is able to respond to DNS requests from the host and thereby insert themselves as a fake service. In a cluster with an IPv4 internal network, if IPv6 is not totally disabled on the host (via ipv6.disable=1 on the kernel cmdline), it will be either unconfigured or configured on some interfaces, but it's pretty likely that ipv6 forwarding is disabled, ie /proc/sys/net/ipv6/conf//forwarding == 0. Also by default, /proc/sys/net/ipv6/conf//accept_ra == 1. The combination of these 2 sysctls means that the host accepts router advertisements and configure the IPv6 stack using them. By sending rogue router advertisements, an attacker can reconfigure the host to redirect part or all of the IPv6 traffic of the host to the attacker controlled container. Even if there was no IPv6 traffic before, if the DNS returns A (IPv4) and AAAA (IPv6) records, many HTTP libraries will try to connect via IPv6 first then fallback to IPv4, giving an opportunity to the attacker to respond. If by chance you also have on the host a vulnerability like last year's RCE in apt (CVE-2019-3462), you can now escalate to the host. Weave Net version 2.6.3 disables the accept_ra option on the veth devices that it creates. | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/weaveworks/weave | [] | [
"14730f8572996c0ce54fe98004ce2a923db8fb7d"
] |
CVE-2023-38976 | 2023-08-21T17:15:48 | 2025-02-19T03:34:35.984230 | An issue in weaviate v.1.20.0 allows a remote attacker to cause a denial of service via the handleUnbatchedGraphQLRequest function. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/weaviate/weaviate | [] | [
"5ea51682b1a3a6d6299e72f1bac9d1a539e40679"
] |
CVE-2022-37786 | 2023-01-01T08:15:10 | 2024-11-29T00:51:44.394595 | An issue was discovered in WeCube Platform 3.2.2. There are multiple CSV injection issues: the [Home / Admin / Resources] page, the [Home / Admin / System Params] page, and the [Home / Design / Basekey Configuration] page. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"type": "CVSS_V3"
}
] | https://github.com/webankpartners/wecube-platform | [] | [
"9712d3e8477c958209e04a5e4701006f5532d30e"
] |
CVE-2022-37787 | 2023-01-01T08:15:10 | 2024-11-29T00:51:44.178016 | An issue was discovered in WeCube platform 3.2.2. A DOM XSS vulnerability has been found on the plugin database execution page. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/webankpartners/wecube-platform | [] | [
"9712d3e8477c958209e04a5e4701006f5532d30e"
] |
CVE-2022-37785 | 2023-01-01T08:15:10 | 2024-11-29T00:51:43.424206 | An issue was discovered in WeCube Platform 3.2.2. Cleartext passwords are displayed in the configuration for terminal plugins. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/webankpartners/wecube-platform | [] | [
"9712d3e8477c958209e04a5e4701006f5532d30e"
] |
CVE-2022-28945 | 2022-06-02T14:15:46 | 2024-11-29T00:51:42.815637 | An issue in Webbank WeCube v3.2.2 allows attackers to execute a directory traversal via a crafted ZIP file. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/webankpartners/wecube-platform | [] | [
"9712d3e8477c958209e04a5e4701006f5532d30e"
] |
CVE-2021-45746 | 2022-02-24T15:15:24 | 2024-11-29T00:52:15.941645 | A Directory Traversal vulnerability exists in WeBankPartners wecube-platform 3.2.1 via the file variable in PluginPackageController.java. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/webankpartners/wecube-platform | [] | [
"9712d3e8477c958209e04a5e4701006f5532d30e"
] |
CVE-2024-31218 | 2024-04-05T15:15:07 | 2025-01-15T05:12:42.915814 | Webhood is a self-hosted URL scanner used analyzing phishing and malicious sites. Webhood's backend container images in versions 0.9.0 and earlier are subject to Missing Authentication for Critical Function vulnerability. This vulnerability allows an unauthenticated attacker to send a HTTP request to the database (Pocketbase) admin API to create an admin account. The Pocketbase admin API does not check for authentication/authorization when creating an admin account when no admin accounts have been added. In its default deployment, Webhood does not create a database admin account. Therefore, unless users have manually created an admin account in the database, an admin account will not exist in the deployment and the deployment is vulnerable. Versions starting from 0.9.1 are patched. The patch creates a randomly generated admin account if admin accounts have not already been created i.e. the vulnerability is exploitable in the deployment. As a workaround, users can disable access to URL path starting with `/api/admins` entirely. With this workaround, the vulnerability is not exploitable via network. | null | https://github.com/webhood-io/webhood | [] | [
"81c6ea83a2ab24ecd092a499f77f99a80368e132"
] |
CVE-2021-46104 | 2022-01-19T13:15:07 | 2025-01-14T10:04:22.460553 | An issue was discovered in webp_server_go 0.4.0. There is a directory traversal vulnerability that can read arbitrary file information on the server. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/webp-sh/webp_server_go | [] | [
"88dcc9c8733b6803cfb8d0d3445b76232042c7b6"
] |
CVE-2024-8462 | 2024-09-05T13:15:12 | 2024-10-08T04:25:58.389339 | A vulnerability was found in Windmill 1.380.0. It has been classified as problematic. Affected is an unknown function of the file backend/windmill-api/src/users.rs of the component HTTP Request Handler. The manipulation leads to improper restriction of excessive authentication attempts. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 1.390.1 is able to address this issue. The patch is identified as acfe7786152f036f2476f93ab5536571514fa9e3. It is recommended to upgrade the affected component. | null | https://github.com/windmill-labs/windmill | [] | [
"58dbc1a4d1a1b4cfa1130641ba5b20cb038f96f2"
] |
CVE-2021-46873 | 2023-01-29T23:15:08 | 2025-01-14T10:04:56.532504 | WireGuard, such as WireGuard 0.5.3 on Windows, does not fully account for the possibility that an adversary might be able to set a victim's system time to a future value, e.g., because unauthenticated NTP is used. This can lead to an outcome in which one static private key becomes permanently useless. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
] | https://github.com/wireguard/wireguard-windows | [] | [
"28e903804aa1302b791c24093dd7f42f0c7d0952"
] |
CVE-2023-35838 | 2023-08-09T23:15:10 | 2025-01-14T11:47:11.426910 | The WireGuard client 0.5.3 on Windows insecurely configures the operating system and firewall such that traffic to a local network that uses non-RFC1918 IP addresses is blocked. This allows an adversary to trick the victim into blocking IP traffic to selected IP addresses and services even while the VPN is enabled. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "LocalNet attack resulting in the blocking of traffic" rather than to only WireGuard. | [
{
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/wireguard/wireguard-windows | [] | [
"28e903804aa1302b791c24093dd7f42f0c7d0952"
] |
CVE-2024-41121 | 2024-07-19T20:15:08 | 2025-01-14T12:17:10.540712 | Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten. This issue has been addressed in release version 2.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/woodpecker-ci/woodpecker | [] | [
"7a4c6d32dea9159d40d82fa453dea79a1be455a4"
] |
CVE-2024-41122 | 2024-07-19T20:15:08 | 2025-01-14T12:17:10.520435 | Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten. This issue has been addressed in release version 2.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/woodpecker-ci/woodpecker | [] | [
"7a4c6d32dea9159d40d82fa453dea79a1be455a4"
] |
CVE-2023-40034 | 2023-08-16T21:15:10 | 2025-01-15T04:57:01.672209 | Woodpecker is a community fork of the Drone CI system. In affected versions an attacker can post malformed webhook data witch lead to an update of the repository data that can e.g. allow the takeover of an repo. This is only critical if the CI is configured for public usage and connected to a forge witch is also in public usage. This issue has been addressed in version 1.0.2. Users are advised to upgrade. Users unable to upgrade should secure the CI system by making it inaccessible to untrusted entities, for example, by placing it behind a firewall. | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/woodpecker-ci/woodpecker | [] | [
"7a4c6d32dea9159d40d82fa453dea79a1be455a4"
] |
CVE-2022-29947 | 2022-04-29T21:15:07 | 2025-02-19T03:26:53.693887 | Woodpecker before 0.15.1 allows XSS via build logs because web/src/components/repo/build/BuildLog.vue lacks escaping. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/woodpecker-ci/woodpecker | [] | [
"7a4c6d32dea9159d40d82fa453dea79a1be455a4"
] |
CVE-2025-24337 | 2025-01-20T14:15:27 | 2025-02-19T03:38:59.210918 | WriteFreely through 0.15.1, when MySQL is used, allows local users to discover credentials by reading config.ini. | null | https://github.com/writefreely/writefreely | [] | [
"8d14c09dc6bb7790f91c4efa532c4534007beb1f"
] |
CVE-2019-15716 | 2019-08-28T15:15:10 | 2025-02-19T02:49:49.825874 | WTF before 0.19.0 does not set the permissions of config.yml, which might make it easier for local attackers to read passwords or API keys if the permissions were misconfigured or were based on unsafe OS defaults. | [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/wtfutil/wtf | [] | [
"ab94bd34acb01c10e19e0c0128075e5c0d91a019"
] |
CVE-2025-24369 | 2025-01-27T23:15:11 | 2025-01-29T00:26:49.820224 | Anubis is a tool that allows administrators to protect bots against AI scrapers through bot-checking heuristics and a proof-of-work challenge to discourage scraping from multiple IP addresses. Anubis allows attackers to bypass the bot protection by requesting a challenge, formulates any nonce (such as 42069), and then passes the challenge with difficulty zero. Commit e09d0226a628f04b1d80fd83bee777894a45cd02 fixes this behavior by not using a client-specified difficulty value. | null | https://github.com/xe/x | [] | [
"e34b2e76d8ac11cb439b50df62b5cd313d23c51c"
] |
CVE-2023-33498 | 2023-06-07T14:15:09 | 2025-02-19T03:33:30.663423 | alist <=3.16.3 is vulnerable to Incorrect Access Control. Low privilege accounts can upload any file. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/xhofe/alist | [] | [
"d988f98b81f6a5a04713844273eb560f72e1020d"
] |
CVE-2023-31726 | 2023-05-23T22:15:09 | 2025-02-19T03:32:01.421618 | AList 3.15.1 is vulnerable to Incorrect Access Control, which can be exploited by attackers to obtain sensitive information. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/xhofe/alist | [] | [
"d988f98b81f6a5a04713844273eb560f72e1020d"
] |
CVE-2022-26533 | 2022-03-12T01:15:35 | 2025-01-14T10:53:08.018404 | Alist v2.1.0 and below was discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/xhofe/alist | [] | [
"d988f98b81f6a5a04713844273eb560f72e1020d"
] |
CVE-2022-45969 | 2022-12-15T23:15:10 | 2025-01-14T11:15:59.247693 | Alist v3.4.0 is vulnerable to Directory Traversal, | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/xhofe/alist | [] | [
"d988f98b81f6a5a04713844273eb560f72e1020d"
] |
CVE-2022-45968 | 2022-12-12T14:15:10 | 2025-01-14T11:15:59.061433 | Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one). | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/xhofe/alist | [] | [
"d988f98b81f6a5a04713844273eb560f72e1020d"
] |
CVE-2022-45970 | 2022-12-12T14:15:10 | 2025-01-14T11:15:35.917706 | Alist v3.5.1 is vulnerable to Cross Site Scripting (XSS) via the bulletin board. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/xhofe/alist | [] | [
"d988f98b81f6a5a04713844273eb560f72e1020d"
] |
CVE-2020-22741 | 2021-07-19T19:15:07 | 2025-01-14T08:38:18.388826 | An issue was discovered in Xuperchain 3.6.0 that allows for attackers to recover any arbitrary users' private key after obtaining the partial signature in multisignature. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/xuperchain/xuperchain | [] | [
"6b2877f27a4017e1dc75fb69cedeb62f2ec9c3ed"
] |
CVE-2019-6035 | 2019-12-26T16:15:12 | 2025-02-19T02:59:35.533164 | Open redirect vulnerability in Athenz v1.8.24 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted page. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/yahoo/athenz | [] | [
"338bf6f92ac6e60734a37c319f8328e1fd6d965c"
] |
CVE-2023-40023 | 2023-08-14T20:15:12 | 2025-01-14T12:01:18.446505 | yaklang is a programming language designed for cybersecurity. The Yak Engine has been found to contain a local file inclusion (LFI) vulnerability. This vulnerability allows attackers to include files from the server's local file system through the web application. When exploited, this can lead to the unintended exposure of sensitive data, potential remote code execution, or other security breaches. Users utilizing versions of the Yak Engine prior to 1.2.4-sp1 are impacted. This vulnerability has been patched in version 1.2.4-sp1. Users are advised to upgrade. users unable to upgrade may avoid exposing vulnerable versions to untrusted input and to closely monitor any unexpected server behavior until they can upgrade. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/yaklang/yaklang | [] | [
"0e460307d875d2475352b21e2fc97623e193965d"
] |
CVE-2023-45825 | 2023-10-19T19:15:16 | 2025-02-19T03:33:13.530244 | ydb-go-sdk is a pure Go native and database/sql driver for the YDB platform. Since ydb-go-sdk v3.48.6 if you use a custom credentials object (implementation of interface Credentials it may leak into logs. This happens because this object could be serialized into an error message using `fmt.Errorf("something went wrong (credentials: %q)", credentials)` during connection to the YDB server. If such logging occurred, a malicious user with access to logs could read sensitive information (i.e. credentials) information and use it to get access to the database. ydb-go-sdk contains this problem in versions from v3.48.6 to v3.53.2. The fix for this problem has been released in version v3.53.3. Users are advised to upgrade. Users unable to upgrade should implement the `fmt.Stringer` interface in your custom credentials type with explicit stringify of object state. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/ydb-platform/ydb-go-sdk | [] | [
"640314266bc72733a11a2bd4ef57e5105456ef76"
] |
CVE-2020-36561 | 2022-12-27T22:15:11 | 2025-01-15T01:45:26.327112 | Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/yi-ge/unzip | [] | [
"402558c226bceb32d9a9c7fe2ecdc85f97c66eeb"
] |
CVE-2023-1971 | 2023-04-10T17:15:06 | 2025-02-19T03:28:56.447389 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in yuan1994 tpAdmin 1.3.12. Affected is the function remote of the file application\admin\controller\Upload.php. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225408. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/yuan1994/tpadmin | [] | [
"2c651128f29d369b00f111bf814b0b29d21f1c60"
] |
CVE-2023-1970 | 2023-04-10T16:15:07 | 2025-02-19T03:28:56.680081 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, has been found in yuan1994 tpAdmin 1.3.12. This issue affects the function Upload of the file application\admin\controller\Upload.php. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225407. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/yuan1994/tpadmin | [] | [
"2c651128f29d369b00f111bf814b0b29d21f1c60"
] |
CVE-2021-28484 | 2021-04-14T18:15:14 | 2025-01-14T09:02:50.861954 | An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send it data, preventing any further operations until the yubihsm-connector is restarted. An attacker can send 0, 1, or 2 bytes to trigger this. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/yubico/yubihsm-connector | [] | [
"edbd86c4bfc543897461c4236817d25657d79d9d"
] |
CVE-2024-22121 | 2024-08-12T13:38:16 | 2025-01-15T05:15:00.566725 | A non-admin user can change or remove important features within the Zabbix Agent application, thus impacting the integrity and availability of the application. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"type": "CVSS_V3"
}
] | https://github.com/zabbix/zabbix | [] | [
"84da35e401c68e886e64af313b6f4d81d0e282f6",
"9665d62db0e4b40f8fadbcf830e06530a0cc6935"
] |
CVE-2022-23131 | 2022-01-13T16:15:08 | 2025-01-14T10:53:32.826421 | In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default). | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/zabbix/zabbix | [] | [
"9665d62db0e4b40f8fadbcf830e06530a0cc6935"
] |
CVE-2021-46088 | 2022-01-27T16:15:07 | 2025-01-14T10:10:03.898190 | Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/zabbix/zabbix | [] | [
"9665d62db0e4b40f8fadbcf830e06530a0cc6935"
] |
CVE-2022-43516 | 2022-12-05T20:15:10 | 2025-01-14T11:19:08.539185 | A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI) | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/zabbix/zabbix | [] | [
"84da35e401c68e886e64af313b6f4d81d0e282f6"
] |
CVE-2022-34296 | 2022-06-23T17:15:18 | 2025-02-19T03:29:18.119710 | In Zalando Skipper before 0.13.218, a query predicate could be bypassed via a prepared request. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/zalando/skipper | [] | [
"691d12a620fd30eda75a575e91b2c76dfa089b64"
] |
CVE-2022-38580 | 2022-10-25T17:15:55 | 2025-02-19T03:29:35.374517 | Zalando Skipper v0.13.236 is vulnerable to Server-Side Request Forgery (SSRF). | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/zalando/skipper | [] | [
"691d12a620fd30eda75a575e91b2c76dfa089b64"
] |
CVE-2024-27302 | 2024-03-06T19:15:08 | 2025-01-15T05:10:20.920685 | go-zero is a web and rpc framework. Go-zero allows user to specify a CORS Filter with a configurable allows param - which is an array of domains allowed in CORS policy. However, the `isOriginAllowed` uses `strings.HasSuffix` to check the origin, which leads to bypass via a malicious domain. This vulnerability is capable of breaking CORS policy and thus allowing any page to make requests and/or retrieve data on behalf of other users. Version 1.4.4 fixes this issue.
| null | https://github.com/zeromicro/go-zero | [] | [
"d953675085476c98772fbc495ccaf47b9fd479df"
] |
CVE-2022-38867 | 2023-02-15T22:15:11 | 2025-01-14T11:09:21.271828 | SQL Injection vulnerability in rttys versions 4.0.0, 4.0.1, and 4.0.2 in api.go, allows attackers to execute arbitrary code. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/zhaojh329/rttys | [] | [
"be2391c0e0315b0e3970e73481e42865bf71110b"
] |
CVE-2022-32172 | 2022-10-06T18:16:03 | 2025-01-15T02:23:20.192921 | In Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete template functionality. When an authenticated user deletes a template with a XSS payload in the name field, the Javascript payload will be executed and allow an attacker to access the user’s credentials. | null | https://github.com/zinclabs/zincsearch | [] | [
"256a3935c5aadac1c06bb028d1d34bb0230f5886"
] |
CVE-2022-32171 | 2022-10-06T18:16:02 | 2025-01-15T02:23:19.778633 | In Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete user functionality. When an authenticated user deletes a user having a XSS payload in the user id field, the javascript payload will be executed and allow an attacker to access the user’s credentials. | null | https://github.com/zinclabs/zincsearch | [] | [
"256a3935c5aadac1c06bb028d1d34bb0230f5886"
] |
CVE-2024-2339 | 2024-03-08T20:15:46 | 2025-02-12T17:50:42.793341 | PostgreSQL Anonymizer v1.2 contains a vulnerability that allows a user who owns a table to elevate to superuser. A user can define a masking function for a column and place malicious code in that function. When a privileged user applies the masking rules using the static masking or the anonymous dump method, the malicious code is executed and can grant escalated privileges to the malicious user. PostgreSQL Anonymizer v1.2 does provide a protection against this risk with the restrict_to_trusted_schemas option, but that protection is incomplete. Users that don't own a table, especially masked users cannot exploit this vulnerability. The problem is resolved in v1.3. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://gitlab.com/dalibo/postgresql_anonymizer | [] | [
"5071c21c9d179d0e2ae8fcd47203a8b2cd0f1b5d"
] |
CVE-2024-2338 | 2024-03-08T20:15:45 | 2025-02-12T17:49:40.357605 | PostgreSQL Anonymizer v1.2 contains a SQL injection vulnerability that allows a user who owns a table to elevate to superuser when dynamic masking is enabled. PostgreSQL Anonymizer enables users to set security labels on tables to mask specified columns. There is a flaw that allows complex expressions to be provided as a value. This expression is then later used as it to create the masked views leading to SQL Injection. If dynamic masking is enabled, this will lead to privilege escalation to superuser after the label is created. Users that don't own a table, especially masked users cannot exploit this vulnerability. The problem is resolved in v1.3. | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://gitlab.com/dalibo/postgresql_anonymizer | [] | [
"5071c21c9d179d0e2ae8fcd47203a8b2cd0f1b5d"
] |
CVE-2020-13353 | 2020-11-17T01:15:13 | 2025-02-19T03:05:02.098965 | When importing repos via URL, one time use git credentials were persisted beyond the expected time window in Gitaly 1.79.0 or above. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://gitlab.com/gitlab-org/gitaly | [] | [
"9045ffc7c83f270e6517833ab3ce1149e35efb70"
] |
CVE-2021-39947 | 2022-06-06T17:15:09 | 2025-01-14T09:45:24.900299 | In specific circumstances, trace file buffers in GitLab Runner versions up to 14.3.4, 14.4 to 14.4.2, and 14.5 to 14.5.2 would re-use the file descriptor 0 for multiple traces and mix the output of several jobs | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://gitlab.com/gitlab-org/gitlab-runner | [] | [
"8ed4e545331246c19bdf6fdaf5c1c0765620936b"
] |
CVE-2019-9904 | 2019-03-21T18:29:00 | 2025-01-14T08:11:13.767350 | An issue was discovered in lib\cdt\dttree.c in libcdt.a in graphviz 2.40.1. Stack consumption occurs because of recursive agclose calls in lib\cgraph\graph.c in libcgraph.a, related to agfstsubg in lib\cgraph\subg.c. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://gitlab.com/graphviz/graphviz | [] | [
"67cd2e5121379a38e0801cc05cce5033f8a2a609"
] |
Subsets and Splits