Datasets:

id
stringlengths
13
16
published
stringlengths
19
19
modified
timestamp[ns]
details
stringlengths
30
3.87k
severity
listlengths
1
1
repo_url
stringlengths
23
68
cwes
listlengths
0
1
commits
listlengths
1
4
CVE-2023-5950
2023-11-06T15:15:14
2025-01-14T12:08:43.954044
Rapid7 Velociraptor versions prior to 0.7.0-4 suffer from a reflected cross site scripting vulnerability. This vulnerability allows attackers to inject JS into the error path, potentially leading to unauthorized execution of scripts within a user's web browser. This vulnerability is fixed in version 0.7.0-04 and a patc...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/velocidex/velociraptor
[]
[ "00a58d673852aad141a354fe18bd58f721ceaccd" ]
CVE-2021-3619
2021-07-22T19:15:09
2025-01-14T09:21:11.098147
Rapid7 Velociraptor 0.5.9 and prior is vulnerable to a post-authentication persistent cross-site scripting (XSS) issue, where an authenticated user could abuse MIME filetype sniffing to embed executable code on a malicious upload. This issue was fixed in version 0.6.0. Note that login rights to Velociraptor is nearly a...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/velocidex/velociraptor
[]
[ "00a58d673852aad141a354fe18bd58f721ceaccd" ]
CVE-2023-36088
2023-09-01T16:15:07
2025-01-14T11:47:50.902540
Server Side Request Forgery (SSRF) vulnerability in NebulaGraph Studio version 3.7.0, allows remote attackers to gain sensitive information.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/vesoft-inc/nebula-studio
[]
[ "b0e4f2474870feae96d5b8ada427afa78c22426d" ]
CVE-2024-32886
2024-05-08T14:15:08
2025-01-15T05:17:37.867977
Vitess is a database clustering system for horizontal scaling of MySQL. When executing the following simple query, the `vtgate` will go into an endless loop that also keeps consuming memory and eventually will run out of memory. This vulnerability is fixed in 19.0.4, 18.0.5, and 17.0.7.
null
https://github.com/vitessio/vitess
[]
[ "740c3799dc824977608d29c793b3bf1dbe1e9811" ]
CVE-2024-53257
2024-12-03T16:15:23
2025-01-15T05:06:16.306405
Vitess is a database clustering system for horizontal scaling of MySQL. The /debug/querylogz and /debug/env pages for vtgate and vttablet do not properly escape user input. The result is that queries executed by Vitess can write HTML into the monitoring page at will. These pages are rendered using text/template instead...
null
https://github.com/vitessio/vitess
[]
[ "740c3799dc824977608d29c793b3bf1dbe1e9811" ]
CVE-2023-29194
2023-04-14T19:15:09
2025-01-15T04:51:45.809146
Vitess is a database clustering system for horizontal scaling of MySQL. Users can either intentionally or inadvertently create a keyspace containing `/` characters such that from that point on, anyone who tries to view keyspaces from VTAdmin will receive an error. Trying to list all the keyspaces using `vtctldclient Ge...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ]
https://github.com/vitessio/vitess
[]
[ "740c3799dc824977608d29c793b3bf1dbe1e9811" ]
CVE-2023-29195
2023-05-11T20:15:09
2025-01-15T04:51:38.859888
Vitess is a database clustering system for horizontal scaling of MySQL through generalized sharding. Prior to version 16.0.2, users can either intentionally or inadvertently create a shard containing `/` characters from VTAdmin such that from that point on, anyone who tries to create a new shard from VTAdmin will recei...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ]
https://github.com/vitessio/vitess
[]
[ "740c3799dc824977608d29c793b3bf1dbe1e9811" ]
CVE-2017-4952
2018-05-02T14:29:00
2025-02-19T02:26:24.480284
VMware Xenon 1.x, prior to 1.5.4-CR7_1, 1.5.7_7, 1.5.4-CR6_2, 1.3.7-CR1_2, 1.1.0-CR0-3, 1.1.0-CR3_1,1.4.2-CR4_1, and 1.5.4_8, contains an authentication bypass vulnerability due to insufficient access controls for utility endpoints. Successful exploitation of this issue may result in information disclosure.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/vmware-archive/xenon
[]
[ "6d6eac0e7f36b16e388854e5147b62d2b53aa16d" ]
CVE-2022-31677
2022-08-29T15:15:10
2025-02-19T03:27:37.169011
An Insufficient Session Expiration issue was discovered in the Pinniped Supervisor (before v0.19.0). A user authenticating to Kubernetes clusters via the Pinniped Supervisor could potentially use their access token to continue their session beyond what proper use of their refresh token might allow.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/vmware-tanzu/pinniped
[]
[ "52341f4e4901b982b033945406e35aed20fa3d1f" ]
CVE-2022-22975
2022-05-11T16:15:08
2025-02-19T03:23:43.035102
An issue was discovered in the Pinniped Supervisor with either LADPIdentityProvider or ActiveDirectoryIdentityProvider resources. An attack would involve the malicious user changing the common name (CN) of their user entry on the LDAP or AD server to include special characters, which could be used to perform LDAP query...
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/vmware-tanzu/pinniped
[]
[ "52341f4e4901b982b033945406e35aed20fa3d1f" ]
CVE-2020-3996
2020-10-22T21:15:14
2025-01-14T08:47:25.780964
Velero (prior to 1.4.3 and 1.5.2) in some instances doesn’t properly manage volume identifiers which may result in information leakage to unauthorized users.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/vmware-tanzu/velero
[]
[ "56a08a4d695d893f0863f697c2f926e27d70c0c5" ]
CVE-2023-26608
2023-03-01T01:15:10
2025-01-14T11:36:07.384333
SOLDR (System of Orchestration, Lifecycle control, Detection and Response) 1.1.0 allows stored XSS via the module editor.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/vxcontrol/soldr
[]
[ "0f887a666e059f6ceb6942a6dc30b3615af7a1ab" ]
CVE-2021-38599
2021-08-12T16:15:10
2025-01-15T02:00:42.425276
WAL-G before 1.1, when a non-libsodium build (e.g., one of the official binary releases published as GitHub Releases) is used, silently ignores the libsodium encryption key and uploads cleartext backups. This is arguably a Principle of Least Surprise violation because "the user likely wanted to encrypt all file activit...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/wal-g/wal-g
[]
[ "2611d11da12c89f1ac6c20afb98acaa2d42e0ea0" ]
CVE-2020-26278
2021-01-20T22:15:11
2025-01-15T01:44:55.742374
Weave Net is open source software which creates a virtual network that connects Docker containers across multiple hosts and enables their automatic discovery. Weave Net before version 2.8.0 has a vulnerability in which can allow an attacker to take over any host in the cluster. Weave Net is supplied with a manifest tha...
[ { "score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/weaveworks/weave
[]
[ "14730f8572996c0ce54fe98004ce2a923db8fb7d" ]
CVE-2020-11091
2020-06-03T23:15:11
2025-01-15T01:42:02.760337
In Weave Net before version 2.6.3, an attacker able to run a process as root in a container is able to respond to DNS requests from the host and thereby insert themselves as a fake service. In a cluster with an IPv4 internal network, if IPv6 is not totally disabled on the host (via ipv6.disable=1 on the kernel cmdline)...
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/weaveworks/weave
[]
[ "14730f8572996c0ce54fe98004ce2a923db8fb7d" ]
CVE-2023-38976
2023-08-21T17:15:48
2025-02-19T03:34:35.984230
An issue in weaviate v.1.20.0 allows a remote attacker to cause a denial of service via the handleUnbatchedGraphQLRequest function.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/weaviate/weaviate
[]
[ "5ea51682b1a3a6d6299e72f1bac9d1a539e40679" ]
CVE-2022-37786
2023-01-01T08:15:10
2024-11-29T00:51:44.394595
An issue was discovered in WeCube Platform 3.2.2. There are multiple CSV injection issues: the [Home / Admin / Resources] page, the [Home / Admin / System Params] page, and the [Home / Design / Basekey Configuration] page.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "type": "CVSS_V3" } ]
https://github.com/webankpartners/wecube-platform
[]
[ "9712d3e8477c958209e04a5e4701006f5532d30e" ]
CVE-2022-37787
2023-01-01T08:15:10
2024-11-29T00:51:44.178016
An issue was discovered in WeCube platform 3.2.2. A DOM XSS vulnerability has been found on the plugin database execution page.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/webankpartners/wecube-platform
[]
[ "9712d3e8477c958209e04a5e4701006f5532d30e" ]
CVE-2022-37785
2023-01-01T08:15:10
2024-11-29T00:51:43.424206
An issue was discovered in WeCube Platform 3.2.2. Cleartext passwords are displayed in the configuration for terminal plugins.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/webankpartners/wecube-platform
[]
[ "9712d3e8477c958209e04a5e4701006f5532d30e" ]
CVE-2022-28945
2022-06-02T14:15:46
2024-11-29T00:51:42.815637
An issue in Webbank WeCube v3.2.2 allows attackers to execute a directory traversal via a crafted ZIP file.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/webankpartners/wecube-platform
[]
[ "9712d3e8477c958209e04a5e4701006f5532d30e" ]
CVE-2021-45746
2022-02-24T15:15:24
2024-11-29T00:52:15.941645
A Directory Traversal vulnerability exists in WeBankPartners wecube-platform 3.2.1 via the file variable in PluginPackageController.java.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/webankpartners/wecube-platform
[]
[ "9712d3e8477c958209e04a5e4701006f5532d30e" ]
CVE-2024-31218
2024-04-05T15:15:07
2025-01-15T05:12:42.915814
Webhood is a self-hosted URL scanner used analyzing phishing and malicious sites. Webhood's backend container images in versions 0.9.0 and earlier are subject to Missing Authentication for Critical Function vulnerability. This vulnerability allows an unauthenticated attacker to send a HTTP request to the database (Pock...
null
https://github.com/webhood-io/webhood
[]
[ "81c6ea83a2ab24ecd092a499f77f99a80368e132" ]
CVE-2021-46104
2022-01-19T13:15:07
2025-01-14T10:04:22.460553
An issue was discovered in webp_server_go 0.4.0. There is a directory traversal vulnerability that can read arbitrary file information on the server.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/webp-sh/webp_server_go
[]
[ "88dcc9c8733b6803cfb8d0d3445b76232042c7b6" ]
CVE-2024-8462
2024-09-05T13:15:12
2024-10-08T04:25:58.389339
A vulnerability was found in Windmill 1.380.0. It has been classified as problematic. Affected is an unknown function of the file backend/windmill-api/src/users.rs of the component HTTP Request Handler. The manipulation leads to improper restriction of excessive authentication attempts. It is possible to launch the att...
null
https://github.com/windmill-labs/windmill
[]
[ "58dbc1a4d1a1b4cfa1130641ba5b20cb038f96f2" ]
CVE-2021-46873
2023-01-29T23:15:08
2025-01-14T10:04:56.532504
WireGuard, such as WireGuard 0.5.3 on Windows, does not fully account for the possibility that an adversary might be able to set a victim's system time to a future value, e.g., because unauthenticated NTP is used. This can lead to an outcome in which one static private key becomes permanently useless.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ]
https://github.com/wireguard/wireguard-windows
[]
[ "28e903804aa1302b791c24093dd7f42f0c7d0952" ]
CVE-2023-35838
2023-08-09T23:15:10
2025-01-14T11:47:11.426910
The WireGuard client 0.5.3 on Windows insecurely configures the operating system and firewall such that traffic to a local network that uses non-RFC1918 IP addresses is blocked. This allows an adversary to trick the victim into blocking IP traffic to selected IP addresses and services even while the VPN is enabled. NOT...
[ { "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/wireguard/wireguard-windows
[]
[ "28e903804aa1302b791c24093dd7f42f0c7d0952" ]
CVE-2024-41121
2024-07-19T20:15:08
2025-01-14T12:17:10.540712
Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally pr...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/woodpecker-ci/woodpecker
[]
[ "7a4c6d32dea9159d40d82fa453dea79a1be455a4" ]
CVE-2024-41122
2024-07-19T20:15:08
2025-01-14T12:17:10.520435
Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally pr...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/woodpecker-ci/woodpecker
[]
[ "7a4c6d32dea9159d40d82fa453dea79a1be455a4" ]
CVE-2023-40034
2023-08-16T21:15:10
2025-01-15T04:57:01.672209
Woodpecker is a community fork of the Drone CI system. In affected versions an attacker can post malformed webhook data witch lead to an update of the repository data that can e.g. allow the takeover of an repo. This is only critical if the CI is configured for public usage and connected to a forge witch is also in pub...
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/woodpecker-ci/woodpecker
[]
[ "7a4c6d32dea9159d40d82fa453dea79a1be455a4" ]
CVE-2022-29947
2022-04-29T21:15:07
2025-02-19T03:26:53.693887
Woodpecker before 0.15.1 allows XSS via build logs because web/src/components/repo/build/BuildLog.vue lacks escaping.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/woodpecker-ci/woodpecker
[]
[ "7a4c6d32dea9159d40d82fa453dea79a1be455a4" ]
CVE-2025-24337
2025-01-20T14:15:27
2025-02-19T03:38:59.210918
WriteFreely through 0.15.1, when MySQL is used, allows local users to discover credentials by reading config.ini.
null
https://github.com/writefreely/writefreely
[]
[ "8d14c09dc6bb7790f91c4efa532c4534007beb1f" ]
CVE-2019-15716
2019-08-28T15:15:10
2025-02-19T02:49:49.825874
WTF before 0.19.0 does not set the permissions of config.yml, which might make it easier for local attackers to read passwords or API keys if the permissions were misconfigured or were based on unsafe OS defaults.
[ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/wtfutil/wtf
[]
[ "ab94bd34acb01c10e19e0c0128075e5c0d91a019" ]
CVE-2025-24369
2025-01-27T23:15:11
2025-01-29T00:26:49.820224
Anubis is a tool that allows administrators to protect bots against AI scrapers through bot-checking heuristics and a proof-of-work challenge to discourage scraping from multiple IP addresses. Anubis allows attackers to bypass the bot protection by requesting a challenge, formulates any nonce (such as 42069), and then ...
null
https://github.com/xe/x
[]
[ "e34b2e76d8ac11cb439b50df62b5cd313d23c51c" ]
CVE-2023-33498
2023-06-07T14:15:09
2025-02-19T03:33:30.663423
alist <=3.16.3 is vulnerable to Incorrect Access Control. Low privilege accounts can upload any file.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/xhofe/alist
[]
[ "d988f98b81f6a5a04713844273eb560f72e1020d" ]
CVE-2023-31726
2023-05-23T22:15:09
2025-02-19T03:32:01.421618
AList 3.15.1 is vulnerable to Incorrect Access Control, which can be exploited by attackers to obtain sensitive information.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/xhofe/alist
[]
[ "d988f98b81f6a5a04713844273eb560f72e1020d" ]
CVE-2022-26533
2022-03-12T01:15:35
2025-01-14T10:53:08.018404
Alist v2.1.0 and below was discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/xhofe/alist
[]
[ "d988f98b81f6a5a04713844273eb560f72e1020d" ]
CVE-2022-45969
2022-12-15T23:15:10
2025-01-14T11:15:59.247693
Alist v3.4.0 is vulnerable to Directory Traversal,
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/xhofe/alist
[]
[ "d988f98b81f6a5a04713844273eb560f72e1020d" ]
CVE-2022-45968
2022-12-12T14:15:10
2025-01-14T11:15:59.061433
Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one).
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/xhofe/alist
[]
[ "d988f98b81f6a5a04713844273eb560f72e1020d" ]
CVE-2022-45970
2022-12-12T14:15:10
2025-01-14T11:15:35.917706
Alist v3.5.1 is vulnerable to Cross Site Scripting (XSS) via the bulletin board.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/xhofe/alist
[]
[ "d988f98b81f6a5a04713844273eb560f72e1020d" ]
CVE-2020-22741
2021-07-19T19:15:07
2025-01-14T08:38:18.388826
An issue was discovered in Xuperchain 3.6.0 that allows for attackers to recover any arbitrary users' private key after obtaining the partial signature in multisignature.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/xuperchain/xuperchain
[]
[ "6b2877f27a4017e1dc75fb69cedeb62f2ec9c3ed" ]
CVE-2019-6035
2019-12-26T16:15:12
2025-02-19T02:59:35.533164
Open redirect vulnerability in Athenz v1.8.24 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted page.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/yahoo/athenz
[]
[ "338bf6f92ac6e60734a37c319f8328e1fd6d965c" ]
CVE-2023-40023
2023-08-14T20:15:12
2025-01-14T12:01:18.446505
yaklang is a programming language designed for cybersecurity. The Yak Engine has been found to contain a local file inclusion (LFI) vulnerability. This vulnerability allows attackers to include files from the server's local file system through the web application. When exploited, this can lead to the unintended exposur...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/yaklang/yaklang
[]
[ "0e460307d875d2475352b21e2fc97623e193965d" ]
CVE-2023-45825
2023-10-19T19:15:16
2025-02-19T03:33:13.530244
ydb-go-sdk is a pure Go native and database/sql driver for the YDB platform. Since ydb-go-sdk v3.48.6 if you use a custom credentials object (implementation of interface Credentials it may leak into logs. This happens because this object could be serialized into an error message using `fmt.Errorf("something went wrong ...
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/ydb-platform/ydb-go-sdk
[]
[ "640314266bc72733a11a2bd4ef57e5105456ef76" ]
CVE-2020-36561
2022-12-27T22:15:11
2025-01-15T01:45:26.327112
Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/yi-ge/unzip
[]
[ "402558c226bceb32d9a9c7fe2ecdc85f97c66eeb" ]
CVE-2023-1971
2023-04-10T17:15:06
2025-02-19T03:28:56.447389
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in yuan1994 tpAdmin 1.3.12. Affected is the function remote of the file application\admin\controller\Upload.php. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack rem...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/yuan1994/tpadmin
[]
[ "2c651128f29d369b00f111bf814b0b29d21f1c60" ]
CVE-2023-1970
2023-04-10T16:15:07
2025-02-19T03:28:56.680081
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, has been found in yuan1994 tpAdmin 1.3.12. This issue affects the function Upload of the file application\admin\controller\Upload.php. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated rem...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/yuan1994/tpadmin
[]
[ "2c651128f29d369b00f111bf814b0b29d21f1c60" ]
CVE-2021-28484
2021-04-14T18:15:14
2025-01-14T09:02:50.861954
An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send it data, preventing a...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/yubico/yubihsm-connector
[]
[ "edbd86c4bfc543897461c4236817d25657d79d9d" ]
CVE-2024-22121
2024-08-12T13:38:16
2025-01-15T05:15:00.566725
A non-admin user can change or remove important features within the Zabbix Agent application, thus impacting the integrity and availability of the application.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", "type": "CVSS_V3" } ]
https://github.com/zabbix/zabbix
[]
[ "84da35e401c68e886e64af313b6f4d81d0e282f6", "9665d62db0e4b40f8fadbcf830e06530a0cc6935" ]
CVE-2022-23131
2022-01-13T16:15:08
2025-01-14T10:53:32.826421
In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To ...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/zabbix/zabbix
[]
[ "9665d62db0e4b40f8fadbcf830e06530a0cc6935" ]
CVE-2021-46088
2022-01-27T16:15:07
2025-01-14T10:10:03.898190
Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/zabbix/zabbix
[]
[ "9665d62db0e4b40f8fadbcf830e06530a0cc6935" ]
CVE-2022-43516
2022-12-05T20:15:10
2025-01-14T11:19:08.539185
A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/zabbix/zabbix
[]
[ "84da35e401c68e886e64af313b6f4d81d0e282f6" ]
CVE-2022-34296
2022-06-23T17:15:18
2025-02-19T03:29:18.119710
In Zalando Skipper before 0.13.218, a query predicate could be bypassed via a prepared request.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/zalando/skipper
[]
[ "691d12a620fd30eda75a575e91b2c76dfa089b64" ]
CVE-2022-38580
2022-10-25T17:15:55
2025-02-19T03:29:35.374517
Zalando Skipper v0.13.236 is vulnerable to Server-Side Request Forgery (SSRF).
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/zalando/skipper
[]
[ "691d12a620fd30eda75a575e91b2c76dfa089b64" ]
CVE-2024-27302
2024-03-06T19:15:08
2025-01-15T05:10:20.920685
go-zero is a web and rpc framework. Go-zero allows user to specify a CORS Filter with a configurable allows param - which is an array of domains allowed in CORS policy. However, the `isOriginAllowed` uses `strings.HasSuffix` to check the origin, which leads to bypass via a malicious domain. This vulnerability is capabl...
null
https://github.com/zeromicro/go-zero
[]
[ "d953675085476c98772fbc495ccaf47b9fd479df" ]
CVE-2022-38867
2023-02-15T22:15:11
2025-01-14T11:09:21.271828
SQL Injection vulnerability in rttys versions 4.0.0, 4.0.1, and 4.0.2 in api.go, allows attackers to execute arbitrary code.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/zhaojh329/rttys
[]
[ "be2391c0e0315b0e3970e73481e42865bf71110b" ]
CVE-2022-32172
2022-10-06T18:16:03
2025-01-15T02:23:20.192921
In Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete template functionality. When an authenticated user deletes a template with a XSS payload in the name field, the Javascript payload will be executed and allow an attacker to access the user’s credentials.
null
https://github.com/zinclabs/zincsearch
[]
[ "256a3935c5aadac1c06bb028d1d34bb0230f5886" ]
CVE-2022-32171
2022-10-06T18:16:02
2025-01-15T02:23:19.778633
In Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete user functionality. When an authenticated user deletes a user having a XSS payload in the user id field, the javascript payload will be executed and allow an attacker to access the user’s credentials.
null
https://github.com/zinclabs/zincsearch
[]
[ "256a3935c5aadac1c06bb028d1d34bb0230f5886" ]
CVE-2024-2339
2024-03-08T20:15:46
2025-02-12T17:50:42.793341
PostgreSQL Anonymizer v1.2 contains a vulnerability that allows a user who owns a table to elevate to superuser. A user can define a masking function for a column and place malicious code in that function. When a privileged user applies the masking rules using the static masking or the anonymous dump method, the malic...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://gitlab.com/dalibo/postgresql_anonymizer
[]
[ "5071c21c9d179d0e2ae8fcd47203a8b2cd0f1b5d" ]
CVE-2024-2338
2024-03-08T20:15:45
2025-02-12T17:49:40.357605
PostgreSQL Anonymizer v1.2 contains a SQL injection vulnerability that allows a user who owns a table to elevate to superuser when dynamic masking is enabled. PostgreSQL Anonymizer enables users to set security labels on tables to mask specified columns. There is a flaw that allows complex expressions to be provided as...
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://gitlab.com/dalibo/postgresql_anonymizer
[]
[ "5071c21c9d179d0e2ae8fcd47203a8b2cd0f1b5d" ]
CVE-2020-13353
2020-11-17T01:15:13
2025-02-19T03:05:02.098965
When importing repos via URL, one time use git credentials were persisted beyond the expected time window in Gitaly 1.79.0 or above.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://gitlab.com/gitlab-org/gitaly
[]
[ "9045ffc7c83f270e6517833ab3ce1149e35efb70" ]
CVE-2021-39947
2022-06-06T17:15:09
2025-01-14T09:45:24.900299
In specific circumstances, trace file buffers in GitLab Runner versions up to 14.3.4, 14.4 to 14.4.2, and 14.5 to 14.5.2 would re-use the file descriptor 0 for multiple traces and mix the output of several jobs
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://gitlab.com/gitlab-org/gitlab-runner
[]
[ "8ed4e545331246c19bdf6fdaf5c1c0765620936b" ]
CVE-2019-9904
2019-03-21T18:29:00
2025-01-14T08:11:13.767350
An issue was discovered in lib\cdt\dttree.c in libcdt.a in graphviz 2.40.1. Stack consumption occurs because of recursive agclose calls in lib\cgraph\graph.c in libcgraph.a, related to agfstsubg in lib\cgraph\subg.c.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://gitlab.com/graphviz/graphviz
[]
[ "67cd2e5121379a38e0801cc05cce5033f8a2a609" ]