id stringlengths 13 16 | published stringlengths 19 19 | modified timestamp[ns] | details stringlengths 30 3.87k | severity listlengths 1 1 ⌀ | repo_url stringlengths 23 68 | cwes listlengths 0 1 | commits listlengths 1 4 |
|---|---|---|---|---|---|---|---|
CVE-2023-5950 | 2023-11-06T15:15:14 | 2025-01-14T12:08:43.954044 | Rapid7 Velociraptor versions prior to 0.7.0-4 suffer from a reflected cross site scripting vulnerability. This vulnerability allows attackers to inject JS into the error path, potentially leading to unauthorized execution of scripts within a user's web browser. This vulnerability is fixed in version 0.7.0-04 and a patc... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/velocidex/velociraptor | [] | [
"00a58d673852aad141a354fe18bd58f721ceaccd"
] |
CVE-2021-3619 | 2021-07-22T19:15:09 | 2025-01-14T09:21:11.098147 | Rapid7 Velociraptor 0.5.9 and prior is vulnerable to a post-authentication persistent cross-site scripting (XSS) issue, where an authenticated user could abuse MIME filetype sniffing to embed executable code on a malicious upload. This issue was fixed in version 0.6.0. Note that login rights to Velociraptor is nearly a... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/velocidex/velociraptor | [] | [
"00a58d673852aad141a354fe18bd58f721ceaccd"
] |
CVE-2023-36088 | 2023-09-01T16:15:07 | 2025-01-14T11:47:50.902540 | Server Side Request Forgery (SSRF) vulnerability in NebulaGraph Studio version 3.7.0, allows remote attackers to gain sensitive information. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/vesoft-inc/nebula-studio | [] | [
"b0e4f2474870feae96d5b8ada427afa78c22426d"
] |
CVE-2024-32886 | 2024-05-08T14:15:08 | 2025-01-15T05:17:37.867977 | Vitess is a database clustering system for horizontal scaling of MySQL. When executing the following simple query, the `vtgate` will go into an endless loop that also keeps consuming memory and eventually will run out of memory. This vulnerability is fixed in 19.0.4, 18.0.5, and 17.0.7. | null | https://github.com/vitessio/vitess | [] | [
"740c3799dc824977608d29c793b3bf1dbe1e9811"
] |
CVE-2024-53257 | 2024-12-03T16:15:23 | 2025-01-15T05:06:16.306405 | Vitess is a database clustering system for horizontal scaling of MySQL. The /debug/querylogz and /debug/env pages for vtgate and vttablet do not properly escape user input. The result is that queries executed by Vitess can write HTML into the monitoring page at will. These pages are rendered using text/template instead... | null | https://github.com/vitessio/vitess | [] | [
"740c3799dc824977608d29c793b3bf1dbe1e9811"
] |
CVE-2023-29194 | 2023-04-14T19:15:09 | 2025-01-15T04:51:45.809146 | Vitess is a database clustering system for horizontal scaling of MySQL. Users can either intentionally or inadvertently create a keyspace containing `/` characters such that from that point on, anyone who tries to view keyspaces from VTAdmin will receive an error. Trying to list all the keyspaces using `vtctldclient Ge... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
] | https://github.com/vitessio/vitess | [] | [
"740c3799dc824977608d29c793b3bf1dbe1e9811"
] |
CVE-2023-29195 | 2023-05-11T20:15:09 | 2025-01-15T04:51:38.859888 | Vitess is a database clustering system for horizontal scaling of MySQL through generalized sharding. Prior to version 16.0.2, users can either intentionally or inadvertently create a shard containing `/` characters from VTAdmin such that from that point on, anyone who tries to create a new shard from VTAdmin will recei... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
] | https://github.com/vitessio/vitess | [] | [
"740c3799dc824977608d29c793b3bf1dbe1e9811"
] |
CVE-2017-4952 | 2018-05-02T14:29:00 | 2025-02-19T02:26:24.480284 | VMware Xenon 1.x, prior to 1.5.4-CR7_1, 1.5.7_7, 1.5.4-CR6_2, 1.3.7-CR1_2, 1.1.0-CR0-3, 1.1.0-CR3_1,1.4.2-CR4_1, and 1.5.4_8, contains an authentication bypass vulnerability due to insufficient access controls for utility endpoints. Successful exploitation of this issue may result in information disclosure. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/vmware-archive/xenon | [] | [
"6d6eac0e7f36b16e388854e5147b62d2b53aa16d"
] |
CVE-2022-31677 | 2022-08-29T15:15:10 | 2025-02-19T03:27:37.169011 | An Insufficient Session Expiration issue was discovered in the Pinniped Supervisor (before v0.19.0). A user authenticating to Kubernetes clusters via the Pinniped Supervisor could potentially use their access token to continue their session beyond what proper use of their refresh token might allow. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/vmware-tanzu/pinniped | [] | [
"52341f4e4901b982b033945406e35aed20fa3d1f"
] |
CVE-2022-22975 | 2022-05-11T16:15:08 | 2025-02-19T03:23:43.035102 | An issue was discovered in the Pinniped Supervisor with either LADPIdentityProvider or ActiveDirectoryIdentityProvider resources. An attack would involve the malicious user changing the common name (CN) of their user entry on the LDAP or AD server to include special characters, which could be used to perform LDAP query... | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/vmware-tanzu/pinniped | [] | [
"52341f4e4901b982b033945406e35aed20fa3d1f"
] |
CVE-2020-3996 | 2020-10-22T21:15:14 | 2025-01-14T08:47:25.780964 | Velero (prior to 1.4.3 and 1.5.2) in some instances doesn’t properly manage volume identifiers which may result in information leakage to unauthorized users. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/vmware-tanzu/velero | [] | [
"56a08a4d695d893f0863f697c2f926e27d70c0c5"
] |
CVE-2023-26608 | 2023-03-01T01:15:10 | 2025-01-14T11:36:07.384333 | SOLDR (System of Orchestration, Lifecycle control, Detection and Response) 1.1.0 allows stored XSS via the module editor. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/vxcontrol/soldr | [] | [
"0f887a666e059f6ceb6942a6dc30b3615af7a1ab"
] |
CVE-2021-38599 | 2021-08-12T16:15:10 | 2025-01-15T02:00:42.425276 | WAL-G before 1.1, when a non-libsodium build (e.g., one of the official binary releases published as GitHub Releases) is used, silently ignores the libsodium encryption key and uploads cleartext backups. This is arguably a Principle of Least Surprise violation because "the user likely wanted to encrypt all file activit... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/wal-g/wal-g | [] | [
"2611d11da12c89f1ac6c20afb98acaa2d42e0ea0"
] |
CVE-2020-26278 | 2021-01-20T22:15:11 | 2025-01-15T01:44:55.742374 | Weave Net is open source software which creates a virtual network that connects Docker containers across multiple hosts and enables their automatic discovery. Weave Net before version 2.8.0 has a vulnerability in which can allow an attacker to take over any host in the cluster. Weave Net is supplied with a manifest tha... | [
{
"score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/weaveworks/weave | [] | [
"14730f8572996c0ce54fe98004ce2a923db8fb7d"
] |
CVE-2020-11091 | 2020-06-03T23:15:11 | 2025-01-15T01:42:02.760337 | In Weave Net before version 2.6.3, an attacker able to run a process as root in a container is able to respond to DNS requests from the host and thereby insert themselves as a fake service. In a cluster with an IPv4 internal network, if IPv6 is not totally disabled on the host (via ipv6.disable=1 on the kernel cmdline)... | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/weaveworks/weave | [] | [
"14730f8572996c0ce54fe98004ce2a923db8fb7d"
] |
CVE-2023-38976 | 2023-08-21T17:15:48 | 2025-02-19T03:34:35.984230 | An issue in weaviate v.1.20.0 allows a remote attacker to cause a denial of service via the handleUnbatchedGraphQLRequest function. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/weaviate/weaviate | [] | [
"5ea51682b1a3a6d6299e72f1bac9d1a539e40679"
] |
CVE-2022-37786 | 2023-01-01T08:15:10 | 2024-11-29T00:51:44.394595 | An issue was discovered in WeCube Platform 3.2.2. There are multiple CSV injection issues: the [Home / Admin / Resources] page, the [Home / Admin / System Params] page, and the [Home / Design / Basekey Configuration] page. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"type": "CVSS_V3"
}
] | https://github.com/webankpartners/wecube-platform | [] | [
"9712d3e8477c958209e04a5e4701006f5532d30e"
] |
CVE-2022-37787 | 2023-01-01T08:15:10 | 2024-11-29T00:51:44.178016 | An issue was discovered in WeCube platform 3.2.2. A DOM XSS vulnerability has been found on the plugin database execution page. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/webankpartners/wecube-platform | [] | [
"9712d3e8477c958209e04a5e4701006f5532d30e"
] |
CVE-2022-37785 | 2023-01-01T08:15:10 | 2024-11-29T00:51:43.424206 | An issue was discovered in WeCube Platform 3.2.2. Cleartext passwords are displayed in the configuration for terminal plugins. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/webankpartners/wecube-platform | [] | [
"9712d3e8477c958209e04a5e4701006f5532d30e"
] |
CVE-2022-28945 | 2022-06-02T14:15:46 | 2024-11-29T00:51:42.815637 | An issue in Webbank WeCube v3.2.2 allows attackers to execute a directory traversal via a crafted ZIP file. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/webankpartners/wecube-platform | [] | [
"9712d3e8477c958209e04a5e4701006f5532d30e"
] |
CVE-2021-45746 | 2022-02-24T15:15:24 | 2024-11-29T00:52:15.941645 | A Directory Traversal vulnerability exists in WeBankPartners wecube-platform 3.2.1 via the file variable in PluginPackageController.java. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/webankpartners/wecube-platform | [] | [
"9712d3e8477c958209e04a5e4701006f5532d30e"
] |
CVE-2024-31218 | 2024-04-05T15:15:07 | 2025-01-15T05:12:42.915814 | Webhood is a self-hosted URL scanner used analyzing phishing and malicious sites. Webhood's backend container images in versions 0.9.0 and earlier are subject to Missing Authentication for Critical Function vulnerability. This vulnerability allows an unauthenticated attacker to send a HTTP request to the database (Pock... | null | https://github.com/webhood-io/webhood | [] | [
"81c6ea83a2ab24ecd092a499f77f99a80368e132"
] |
CVE-2021-46104 | 2022-01-19T13:15:07 | 2025-01-14T10:04:22.460553 | An issue was discovered in webp_server_go 0.4.0. There is a directory traversal vulnerability that can read arbitrary file information on the server. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/webp-sh/webp_server_go | [] | [
"88dcc9c8733b6803cfb8d0d3445b76232042c7b6"
] |
CVE-2024-8462 | 2024-09-05T13:15:12 | 2024-10-08T04:25:58.389339 | A vulnerability was found in Windmill 1.380.0. It has been classified as problematic. Affected is an unknown function of the file backend/windmill-api/src/users.rs of the component HTTP Request Handler. The manipulation leads to improper restriction of excessive authentication attempts. It is possible to launch the att... | null | https://github.com/windmill-labs/windmill | [] | [
"58dbc1a4d1a1b4cfa1130641ba5b20cb038f96f2"
] |
CVE-2021-46873 | 2023-01-29T23:15:08 | 2025-01-14T10:04:56.532504 | WireGuard, such as WireGuard 0.5.3 on Windows, does not fully account for the possibility that an adversary might be able to set a victim's system time to a future value, e.g., because unauthenticated NTP is used. This can lead to an outcome in which one static private key becomes permanently useless. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
] | https://github.com/wireguard/wireguard-windows | [] | [
"28e903804aa1302b791c24093dd7f42f0c7d0952"
] |
CVE-2023-35838 | 2023-08-09T23:15:10 | 2025-01-14T11:47:11.426910 | The WireGuard client 0.5.3 on Windows insecurely configures the operating system and firewall such that traffic to a local network that uses non-RFC1918 IP addresses is blocked. This allows an adversary to trick the victim into blocking IP traffic to selected IP addresses and services even while the VPN is enabled. NOT... | [
{
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/wireguard/wireguard-windows | [] | [
"28e903804aa1302b791c24093dd7f42f0c7d0952"
] |
CVE-2024-41121 | 2024-07-19T20:15:08 | 2025-01-14T12:17:10.540712 | Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally pr... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/woodpecker-ci/woodpecker | [] | [
"7a4c6d32dea9159d40d82fa453dea79a1be455a4"
] |
CVE-2024-41122 | 2024-07-19T20:15:08 | 2025-01-14T12:17:10.520435 | Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally pr... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/woodpecker-ci/woodpecker | [] | [
"7a4c6d32dea9159d40d82fa453dea79a1be455a4"
] |
CVE-2023-40034 | 2023-08-16T21:15:10 | 2025-01-15T04:57:01.672209 | Woodpecker is a community fork of the Drone CI system. In affected versions an attacker can post malformed webhook data witch lead to an update of the repository data that can e.g. allow the takeover of an repo. This is only critical if the CI is configured for public usage and connected to a forge witch is also in pub... | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/woodpecker-ci/woodpecker | [] | [
"7a4c6d32dea9159d40d82fa453dea79a1be455a4"
] |
CVE-2022-29947 | 2022-04-29T21:15:07 | 2025-02-19T03:26:53.693887 | Woodpecker before 0.15.1 allows XSS via build logs because web/src/components/repo/build/BuildLog.vue lacks escaping. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/woodpecker-ci/woodpecker | [] | [
"7a4c6d32dea9159d40d82fa453dea79a1be455a4"
] |
CVE-2025-24337 | 2025-01-20T14:15:27 | 2025-02-19T03:38:59.210918 | WriteFreely through 0.15.1, when MySQL is used, allows local users to discover credentials by reading config.ini. | null | https://github.com/writefreely/writefreely | [] | [
"8d14c09dc6bb7790f91c4efa532c4534007beb1f"
] |
CVE-2019-15716 | 2019-08-28T15:15:10 | 2025-02-19T02:49:49.825874 | WTF before 0.19.0 does not set the permissions of config.yml, which might make it easier for local attackers to read passwords or API keys if the permissions were misconfigured or were based on unsafe OS defaults. | [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/wtfutil/wtf | [] | [
"ab94bd34acb01c10e19e0c0128075e5c0d91a019"
] |
CVE-2025-24369 | 2025-01-27T23:15:11 | 2025-01-29T00:26:49.820224 | Anubis is a tool that allows administrators to protect bots against AI scrapers through bot-checking heuristics and a proof-of-work challenge to discourage scraping from multiple IP addresses. Anubis allows attackers to bypass the bot protection by requesting a challenge, formulates any nonce (such as 42069), and then ... | null | https://github.com/xe/x | [] | [
"e34b2e76d8ac11cb439b50df62b5cd313d23c51c"
] |
CVE-2023-33498 | 2023-06-07T14:15:09 | 2025-02-19T03:33:30.663423 | alist <=3.16.3 is vulnerable to Incorrect Access Control. Low privilege accounts can upload any file. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/xhofe/alist | [] | [
"d988f98b81f6a5a04713844273eb560f72e1020d"
] |
CVE-2023-31726 | 2023-05-23T22:15:09 | 2025-02-19T03:32:01.421618 | AList 3.15.1 is vulnerable to Incorrect Access Control, which can be exploited by attackers to obtain sensitive information. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/xhofe/alist | [] | [
"d988f98b81f6a5a04713844273eb560f72e1020d"
] |
CVE-2022-26533 | 2022-03-12T01:15:35 | 2025-01-14T10:53:08.018404 | Alist v2.1.0 and below was discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/xhofe/alist | [] | [
"d988f98b81f6a5a04713844273eb560f72e1020d"
] |
CVE-2022-45969 | 2022-12-15T23:15:10 | 2025-01-14T11:15:59.247693 | Alist v3.4.0 is vulnerable to Directory Traversal, | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/xhofe/alist | [] | [
"d988f98b81f6a5a04713844273eb560f72e1020d"
] |
CVE-2022-45968 | 2022-12-12T14:15:10 | 2025-01-14T11:15:59.061433 | Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one). | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/xhofe/alist | [] | [
"d988f98b81f6a5a04713844273eb560f72e1020d"
] |
CVE-2022-45970 | 2022-12-12T14:15:10 | 2025-01-14T11:15:35.917706 | Alist v3.5.1 is vulnerable to Cross Site Scripting (XSS) via the bulletin board. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/xhofe/alist | [] | [
"d988f98b81f6a5a04713844273eb560f72e1020d"
] |
CVE-2020-22741 | 2021-07-19T19:15:07 | 2025-01-14T08:38:18.388826 | An issue was discovered in Xuperchain 3.6.0 that allows for attackers to recover any arbitrary users' private key after obtaining the partial signature in multisignature. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/xuperchain/xuperchain | [] | [
"6b2877f27a4017e1dc75fb69cedeb62f2ec9c3ed"
] |
CVE-2019-6035 | 2019-12-26T16:15:12 | 2025-02-19T02:59:35.533164 | Open redirect vulnerability in Athenz v1.8.24 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted page. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/yahoo/athenz | [] | [
"338bf6f92ac6e60734a37c319f8328e1fd6d965c"
] |
CVE-2023-40023 | 2023-08-14T20:15:12 | 2025-01-14T12:01:18.446505 | yaklang is a programming language designed for cybersecurity. The Yak Engine has been found to contain a local file inclusion (LFI) vulnerability. This vulnerability allows attackers to include files from the server's local file system through the web application. When exploited, this can lead to the unintended exposur... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/yaklang/yaklang | [] | [
"0e460307d875d2475352b21e2fc97623e193965d"
] |
CVE-2023-45825 | 2023-10-19T19:15:16 | 2025-02-19T03:33:13.530244 | ydb-go-sdk is a pure Go native and database/sql driver for the YDB platform. Since ydb-go-sdk v3.48.6 if you use a custom credentials object (implementation of interface Credentials it may leak into logs. This happens because this object could be serialized into an error message using `fmt.Errorf("something went wrong ... | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/ydb-platform/ydb-go-sdk | [] | [
"640314266bc72733a11a2bd4ef57e5105456ef76"
] |
CVE-2020-36561 | 2022-12-27T22:15:11 | 2025-01-15T01:45:26.327112 | Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/yi-ge/unzip | [] | [
"402558c226bceb32d9a9c7fe2ecdc85f97c66eeb"
] |
CVE-2023-1971 | 2023-04-10T17:15:06 | 2025-02-19T03:28:56.447389 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in yuan1994 tpAdmin 1.3.12. Affected is the function remote of the file application\admin\controller\Upload.php. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack rem... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/yuan1994/tpadmin | [] | [
"2c651128f29d369b00f111bf814b0b29d21f1c60"
] |
CVE-2023-1970 | 2023-04-10T16:15:07 | 2025-02-19T03:28:56.680081 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, has been found in yuan1994 tpAdmin 1.3.12. This issue affects the function Upload of the file application\admin\controller\Upload.php. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated rem... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/yuan1994/tpadmin | [] | [
"2c651128f29d369b00f111bf814b0b29d21f1c60"
] |
CVE-2021-28484 | 2021-04-14T18:15:14 | 2025-01-14T09:02:50.861954 | An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send it data, preventing a... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/yubico/yubihsm-connector | [] | [
"edbd86c4bfc543897461c4236817d25657d79d9d"
] |
CVE-2024-22121 | 2024-08-12T13:38:16 | 2025-01-15T05:15:00.566725 | A non-admin user can change or remove important features within the Zabbix Agent application, thus impacting the integrity and availability of the application. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"type": "CVSS_V3"
}
] | https://github.com/zabbix/zabbix | [] | [
"84da35e401c68e886e64af313b6f4d81d0e282f6",
"9665d62db0e4b40f8fadbcf830e06530a0cc6935"
] |
CVE-2022-23131 | 2022-01-13T16:15:08 | 2025-01-14T10:53:32.826421 | In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To ... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/zabbix/zabbix | [] | [
"9665d62db0e4b40f8fadbcf830e06530a0cc6935"
] |
CVE-2021-46088 | 2022-01-27T16:15:07 | 2025-01-14T10:10:03.898190 | Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/zabbix/zabbix | [] | [
"9665d62db0e4b40f8fadbcf830e06530a0cc6935"
] |
CVE-2022-43516 | 2022-12-05T20:15:10 | 2025-01-14T11:19:08.539185 | A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI) | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/zabbix/zabbix | [] | [
"84da35e401c68e886e64af313b6f4d81d0e282f6"
] |
CVE-2022-34296 | 2022-06-23T17:15:18 | 2025-02-19T03:29:18.119710 | In Zalando Skipper before 0.13.218, a query predicate could be bypassed via a prepared request. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/zalando/skipper | [] | [
"691d12a620fd30eda75a575e91b2c76dfa089b64"
] |
CVE-2022-38580 | 2022-10-25T17:15:55 | 2025-02-19T03:29:35.374517 | Zalando Skipper v0.13.236 is vulnerable to Server-Side Request Forgery (SSRF). | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/zalando/skipper | [] | [
"691d12a620fd30eda75a575e91b2c76dfa089b64"
] |
CVE-2024-27302 | 2024-03-06T19:15:08 | 2025-01-15T05:10:20.920685 | go-zero is a web and rpc framework. Go-zero allows user to specify a CORS Filter with a configurable allows param - which is an array of domains allowed in CORS policy. However, the `isOriginAllowed` uses `strings.HasSuffix` to check the origin, which leads to bypass via a malicious domain. This vulnerability is capabl... | null | https://github.com/zeromicro/go-zero | [] | [
"d953675085476c98772fbc495ccaf47b9fd479df"
] |
CVE-2022-38867 | 2023-02-15T22:15:11 | 2025-01-14T11:09:21.271828 | SQL Injection vulnerability in rttys versions 4.0.0, 4.0.1, and 4.0.2 in api.go, allows attackers to execute arbitrary code. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/zhaojh329/rttys | [] | [
"be2391c0e0315b0e3970e73481e42865bf71110b"
] |
CVE-2022-32172 | 2022-10-06T18:16:03 | 2025-01-15T02:23:20.192921 | In Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete template functionality. When an authenticated user deletes a template with a XSS payload in the name field, the Javascript payload will be executed and allow an attacker to access the user’s credentials. | null | https://github.com/zinclabs/zincsearch | [] | [
"256a3935c5aadac1c06bb028d1d34bb0230f5886"
] |
CVE-2022-32171 | 2022-10-06T18:16:02 | 2025-01-15T02:23:19.778633 | In Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete user functionality. When an authenticated user deletes a user having a XSS payload in the user id field, the javascript payload will be executed and allow an attacker to access the user’s credentials. | null | https://github.com/zinclabs/zincsearch | [] | [
"256a3935c5aadac1c06bb028d1d34bb0230f5886"
] |
CVE-2024-2339 | 2024-03-08T20:15:46 | 2025-02-12T17:50:42.793341 | PostgreSQL Anonymizer v1.2 contains a vulnerability that allows a user who owns a table to elevate to superuser. A user can define a masking function for a column and place malicious code in that function. When a privileged user applies the masking rules using the static masking or the anonymous dump method, the malic... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://gitlab.com/dalibo/postgresql_anonymizer | [] | [
"5071c21c9d179d0e2ae8fcd47203a8b2cd0f1b5d"
] |
CVE-2024-2338 | 2024-03-08T20:15:45 | 2025-02-12T17:49:40.357605 | PostgreSQL Anonymizer v1.2 contains a SQL injection vulnerability that allows a user who owns a table to elevate to superuser when dynamic masking is enabled. PostgreSQL Anonymizer enables users to set security labels on tables to mask specified columns. There is a flaw that allows complex expressions to be provided as... | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://gitlab.com/dalibo/postgresql_anonymizer | [] | [
"5071c21c9d179d0e2ae8fcd47203a8b2cd0f1b5d"
] |
CVE-2020-13353 | 2020-11-17T01:15:13 | 2025-02-19T03:05:02.098965 | When importing repos via URL, one time use git credentials were persisted beyond the expected time window in Gitaly 1.79.0 or above. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://gitlab.com/gitlab-org/gitaly | [] | [
"9045ffc7c83f270e6517833ab3ce1149e35efb70"
] |
CVE-2021-39947 | 2022-06-06T17:15:09 | 2025-01-14T09:45:24.900299 | In specific circumstances, trace file buffers in GitLab Runner versions up to 14.3.4, 14.4 to 14.4.2, and 14.5 to 14.5.2 would re-use the file descriptor 0 for multiple traces and mix the output of several jobs | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://gitlab.com/gitlab-org/gitlab-runner | [] | [
"8ed4e545331246c19bdf6fdaf5c1c0765620936b"
] |
CVE-2019-9904 | 2019-03-21T18:29:00 | 2025-01-14T08:11:13.767350 | An issue was discovered in lib\cdt\dttree.c in libcdt.a in graphviz 2.40.1. Stack consumption occurs because of recursive agclose calls in lib\cgraph\graph.c in libcgraph.a, related to agfstsubg in lib\cgraph\subg.c. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://gitlab.com/graphviz/graphviz | [] | [
"67cd2e5121379a38e0801cc05cce5033f8a2a609"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.