Most recent vulnerabilities by source

The vulnerabilities are sorted by update time (recent to old)

Vulnerability ID Description
ghsa-x6cj-gx36-vcxv (github) Use after free in Dawn in Google Chrome prior to 123.0.6312.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
ghsa-whx6-m9j4-w2m2 (github) yyjson through 0.8.0 has a double free, leading to remote code execution in some cases, because the pool_free function lacks loop checks. (pool_free is part of the pool series allocator, along with pool_malloc and pool_realloc.)
ghsa-v5qg-55pp-x38m (github) A double-free vulnerability was found in libdwarf. In a multiply-corrupted DWARF object, libdwarf may try to dealloc(free) an allocation twice, potentially causing unpredictable and various results.
ghsa-v475-xhc9-wfxg (github) A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Fixes for PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 are in development and are expected to be released by April 14, 2024. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. All other versions of PAN-OS are also not impacted.
ghsa-rj8v-47w4-c66w (github) There is a Cross-site Scripting vulnerability in Portal for ArcGIS in versions <=11.1 that may allow a remote, authenticated attacker to create a crafted link which when opening an authenticated users bio page will render an image in the victims browser.  The privileges required to execute this attack are low.
ghsa-r9g8-4h9q-3jfp (github) Use after free in Bookmarks in Google Chrome prior to 123.0.6312.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
ghsa-qgq8-952v-8jwq (github) There is a Cross-site Scripting vulnerability in Portal for ArcGIS in versions <=11.0 that may allow a remote, authenticated attacker to create a crafted link which when accessing the page editor an image will render in the victim’s browser. The privileges required to execute this attack are high.
ghsa-q6w6-rjjj-5p52 (github) A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.
ghsa-q63v-rwfp-q5p2 (github) NLnet Labs Unbound version 1.18.0 up to and including version 1.19.1 contain a vulnerability that can cause denial of service by a certain code path that can lead to an infinite loop. Unbound 1.18.0 introduced a feature that removes EDE records from responses with size higher than the client's advertised buffer size. Before removing all the EDE records however, it would try to see if trimming the extra text fields on those records would result in an acceptable size while still retaining the EDE codes. Due to an unchecked condition, the code that trims the text of the EDE records could loop indefinitely. This happens when Unbound would reply with attached EDE information on a positive reply and the client's buffer size is smaller than the needed space to include EDE records. The vulnerability can only be triggered when the 'ede: yes' option is used; non default configuration. From version 1.19.2 on, the code is fixed to avoid looping indefinitely.
ghsa-mqqf-4p7r-rf89 (github) A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
ghsa-mq8w-c2j9-rqxc (github) When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.
ghsa-mh2p-2x66-3hr4 (github) Out of bounds memory access in V8 in Google Chrome prior to 123.0.6312.105 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
ghsa-m4v8-wqvr-p9f7 (github) ### Impact Undici cleared Authorization and Proxy-Authorization headers for `fetch()`, but did not clear them for `undici.request()`. ### Patches This has been patched in https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75. Fixes has been released in v5.28.4 and v6.11.1. ### Workarounds use `fetch()` or disable `maxRedirections`. ### References Linzi Shang reported this. * https://hackerone.com/reports/2408074 * https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3
ghsa-jf9g-42gm-v87w (github) Heap buffer overflow in ANGLE in Google Chrome prior to 123.0.6312.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
ghsa-gc85-62pw-52fp (github) T.38 dissector crash in Wireshark 4.2.0 to 4.0.3 and 4.0.0 to 4.0.13 allows denial of service via packet injection or crafted capture file
ghsa-g47c-q844-rxj3 (github) Inappropriate implementation in V8 in Google Chrome prior to 123.0.6312.105 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
ghsa-c4ch-cv96-r58v (github) HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.
ghsa-c43m-486j-j32p (github) In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
ghsa-c3j9-w5jx-cmmq (github) ascii_load_sockaddr in smtpd in OpenBSD before 7.1 errata 024 and 7.2 before errata 020, and OpenSMTPD Portable through 7.0.0-portable, can abort upon a connection from a local, scoped IPv6 address.
ghsa-9qxr-qj54-h672 (github) ### Impact If an attacker can alter the `integrity` option passed to `fetch()`, they can let `fetch()` accept requests as valid even if they have been tampered. ### Patches Fixed in https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3. Fixes has been released in v5.28.4 and v6.11.1. ### Workarounds Ensure that `integrity` cannot be tampered with. ### References https://hackerone.com/reports/2377760
ghsa-9fvf-9v35-97qv (github) Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
ghsa-97xx-95pm-5qv6 (github) When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http http://curl.se The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.
ghsa-97xg-px2h-jvxp (github) A vulnerability was found in UPX up to 4.2.2. It has been rated as critical. This issue affects the function get_ne64 of the file bele.h. The manipulation leads to heap-based buffer overflow. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259055. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
ghsa-8xr9-89pc-8wcx (github) There is an HTML injection vulnerability in Esri Portal for ArcGIS versions 11.1 and below that may allow a remote, unauthenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim’s browser.
ghsa-8fvm-73q4-3j6f (github) There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 10.8.1 – 1121 that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. 
ghsa-85r2-29g6-f4w7 (github) There is a path traversal in Esri Portal for ArcGIS versions <= 11.2. Successful exploitation may allow a remote, authenticated attacker to traverse the file system to access files or execute code outside of the intended directory. 
ghsa-7hpg-wrjj-gghq (github) HTTP/2 CONTINUATION DoS attack can cause Apache Traffic Server to consume more resources on the server.  Version from 8.0.0 through 8.1.9, from 9.0.0 through 9.2.3 are affected. Users can set a new setting (proxy.config.http2.max_continuation_frames_per_minute) to limit the number of CONTINUATION frames per minute.  ATS does have a fixed amount of memory a request can use and ATS adheres to these limits in previous releases. Users are recommended to upgrade to versions 8.1.10 or 9.2.4 which fixes the issue.
ghsa-7hfh-vfcv-wfqp (github) There is a difficult to exploit improper authentication issue in the Home application for Esri Portal for ArcGIS versions 10.8.1 through 11.2 on Windows and Linux, and ArcGIS Enterprise 11.1 and below on Kubernetes which, under unique circumstances, could potentially allow a remote, unauthenticated attacker to compromise the confidentiality, integrity, and availability of the software.
ghsa-6jfg-4px6-v4c9 (github) There is a cross-site-request forgery vulnerability in Esri Portal for ArcGIS Versions 11.1 and below that may in some cases allow a remote, unauthenticated attacker to trick an authorized user into executing unwanted actions via a crafted form. The impact to Confidentiality and Integrity vectors is limited and of low severity. 
ghsa-6h48-8w2f-5w94 (github) An issue was discovered in Mbed TLS 2.18.0 through 2.28.x before 2.28.8 and 3.x before 3.6.0, and Mbed Crypto. The PSA Crypto API mishandles shared memory.
Vulnerability ID CVSS Base Score Description Vendor Product Publish Date Last Update Date
cve-2023-29323 (NVD) N/A ascii_load_sockaddr in smtpd in OpenBSD before 7.1 errata 024 and 7.2 before errata 020, and OpenSMTPD Portable before 7.0.0-portable commit f748277, can abort upon a connection from a local, scoped IPv6 address. n/a
n/a
2023-04-04T00:00:00 2024-04-19T22:06:20.632286
cve-2024-1480 (NVD) CVSS-v3.1: 7.5 Unitronics Vision Standard Unauthenticated Password Retrieval Unitronics
Unitronics
Unitronics
Unitronics
Unitronics
Vision230
Vision280
Vision290
Vision530
Vision120
2024-04-19T21:19:27.592Z 2024-04-19T21:19:27.592Z
cve-2024-31994 (NVD) Mealie vulnerable to a DoS in recipe image importer (GHSL-2023-228) mealie-recipes
mealie
2024-04-19T21:11:37.890Z 2024-04-19T21:11:37.890Z
cve-2024-30974 (NVD) N/A SQL Injection vulnerability in autoexpress v.1.3.0 allows attackers to run arbitrary SQL commands via the carId parameter. n/a
n/a
2024-04-19T00:00:00 2024-04-19T21:08:06.157795
cve-2024-31993 (NVD) Mealie vulnerable to a GET-based SSRF in recipe image importer (GHSL-2023-227) mealie-recipes
mealie
2024-04-19T21:02:56.989Z 2024-04-19T21:02:56.989Z
cve-2024-22905 (NVD) N/A Buffer Overflow vulnerability in ARM mbed-os v.6.17.0 allows a remote attacker to execute arbitrary code via a crafted script to the hciTrSerialRxIncoming function. n/a
n/a
2024-04-19T00:00:00 2024-04-19T21:00:22.347146
cve-2024-31992 (NVD) Mealie contains a DoS vulnerability in recipe importer mealie-recipes
mealie
2024-04-19T20:49:18.141Z 2024-04-19T20:58:04.083Z
cve-2024-32391 (NVD) N/A Cross Site Scripting vulnerability in MacCMS v.10 v.2024.1000.3000 allows a remote attacker to execute arbitrary code via a crafted payload. n/a
n/a
2024-04-19T00:00:00 2024-04-19T20:54:42.458432
cve-2024-31991 (NVD) Mealie vulnerable to a GET-based SSRF in recipe importer (GHSL-2023-225) mealie-recipes
mealie
2024-04-19T20:42:05.782Z 2024-04-19T20:54:21.936Z
cve-2024-32392 (NVD) N/A Cross Site Scripting vulnerability in CmSimple v.5.15 allows a remote attacker to execute arbitrary code via the functions.php component. n/a
n/a
2024-04-19T00:00:00 2024-04-19T20:51:22.958102
cve-2024-31584 (NVD) N/A Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csrc/jit/mobile/flatbuffer_loader.cpp. n/a
n/a
2024-04-19T00:00:00 2024-04-19T20:47:50.376803
cve-2024-4018 (NVD) CVSS-v3.1: 8.8 Privilege Escalation in U-Series Appliance BeyondTrust
U-Series Appliance
2024-04-19T20:29:19.626Z 2024-04-19T20:40:47.336Z
cve-2024-4017 (NVD) CVSS-v3.1: 8.8 Privilege Escalation in U-Series Appliance BeyondTrust
U-Series Appliance
2024-04-19T20:40:25.256Z 2024-04-19T20:40:25.256Z
cve-2024-32650 (NVD) Rustls vulnerable to an infinite loop in rustls::conn::ConnectionCommon::complete_io() with proper client input rustls
rustls
2024-04-19T16:05:44.050Z 2024-04-19T19:47:45.579Z
cve-2024-1681 (NVD) Log Injection Vulnerability in corydolphin/flask-cors corydolphin
corydolphin/flask-cors
2024-04-19T19:37:27.998Z 2024-04-19T19:37:27.998Z
cve-2024-25180 (NVD) N/A An issue discovered in pdfmake 0.2.9 allows remote attackers to run arbitrary code via crafted POST request to the path '/pdf'. n/a
n/a
2024-02-29T00:00:00 2024-04-19T19:03:49.254626
cve-2024-31450 (NVD) Owncast vulnerable to arbitrary file deletion in emoji.go (GHSL-2023-277) owncast
owncast
2024-04-19T18:59:19.526Z 2024-04-19T18:59:19.526Z
cve-2024-32652 (NVD) @hono/node-server contains Denial of Service risk when receiving Host header that cannot be parsed honojs
node-server
2024-04-19T18:29:42.857Z 2024-04-19T18:29:42.857Z
cve-2024-3979 (NVD) COVESA vsomeip race condition COVESA
vsomeip
2024-04-19T18:00:08.395Z 2024-04-19T18:00:08.395Z
cve-2023-47435 (NVD) N/A An issue in the verifyPassword function of hexo-theme-matery v2.0.0 allows attackers to bypass authentication and access password protected pages. n/a
n/a
2024-04-19T00:00:00 2024-04-19T17:55:51.078541
cve-2024-31547 (NVD) N/A Computer Laboratory Management System v1.0 is vulnerable to SQL Injection via the "id" parameter of /admin/item/view_item.php. n/a
n/a
2024-04-19T00:00:00 2024-04-19T17:17:18.699867
cve-2024-31546 (NVD) N/A Computer Laboratory Management System v1.0 is vulnerable to SQL Injection via the "id" parameter of /admin/damage/view_damage.php. n/a
n/a
2024-04-19T00:00:00 2024-04-19T17:14:41.147928
cve-2024-2440 (NVD) CVSS-v3.1: 5.5 Race Condition was identified in GitHub Enterprise Server that allowed maintaining admin permissions GitHub
Enterprise Server
2024-04-19T17:02:29.144Z 2024-04-19T17:02:35.368Z
cve-2022-40745 (NVD) CVSS-v3.1: 5.5 IBM Aspera Faspex information disclosure IBM
Aspera Faspex
2024-04-19T17:01:38.927Z 2024-04-19T17:01:38.927Z
cve-2024-31552 (NVD) N/A CuteHttpFileServer v.3.1 version has an arbitrary file download vulnerability, which allows attackers to download arbitrary files on the server and obtain sensitive information. n/a
n/a
2024-04-19T00:00:00 2024-04-19T16:55:36.246694
cve-2023-37397 (NVD) CVSS-v3.1: 3.6 IBM Aspera Faspex data manipulation IBM
Aspera Faspex
2024-04-19T16:54:19.875Z 2024-04-19T16:54:19.875Z
cve-2023-51798 (NVD) N/A Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via a floating point exception (FPE) error at libavfilter/vf_minterpolate.c:1078:60 in interpolate. n/a
n/a
2024-04-19T00:00:00 2024-04-19T16:51:56.531471
cve-2023-51797 (NVD) N/A Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavfilter/avf_showwaves.c:722:24 in showwaves_filter_frame n/a
n/a
2024-04-19T00:00:00 2024-04-19T16:51:04.866270
cve-2024-3863 (NVD) N/A The executable file warning was not presented when downloading .xrm-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10. Mozilla
Mozilla
Mozilla
Firefox
Firefox ESR
Thunderbird
2024-04-16T15:14:08.950Z 2024-04-19T16:50:51.302Z
cve-2024-3861 (NVD) N/A If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10. Mozilla
Mozilla
Mozilla
Firefox
Firefox ESR
Thunderbird
2024-04-16T15:14:08.332Z 2024-04-19T16:50:50.888Z
Vulnerability ID Description
pysec-2024-31 The vantage6 technology enables to manage and deploy privacy enhancing technologies like Federated Learning (FL) and Multi-Party Computation (MPC). It is possible to find out usernames from the response time of login requests. This could aid attackers in credential attacks. Version 4.2.0 patches this vulnerability.
pysec-2024-30 The vantage6 technology enables to manage and deploy privacy enhancing technologies like Federated Learning (FL) and Multi-Party Computation (MPC). Prior to 4.2.0, authenticated users could inject code into algorithm environment variables, resulting in remote code execution. This vulnerability is patched in 4.2.0.
pysec-2024-29 OctoPrint is a web interface for 3D printer.s OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to change the password of other admin accounts, including their own, without having to repeat their password. An attacker who managed to hijack an admin account might use this to lock out actual admins from their OctoPrint instance. The vulnerability will be patched in version 1.10.0.
pysec-2024-28 An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
pysec-2023-252 Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2.
pysec-2024-27 CrateDB 5.5.1 is contains an authentication bypass vulnerability in the Admin UI component. After configuring password authentication and_ Local_ In the case of an address, identity authentication can be bypassed by setting the X-Real IP request header to a specific value and accessing the Admin UI directly using the default user identity.(https://github.com/crate/crate/issues/15231)
pysec-2024-26 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.
pysec-2024-25 DuckDB <=0.9.2 and DuckDB extension-template <=0.9.2 are vulnerable to malicious extension injection via the custom extension feature.
pysec-2024-24 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.
pysec-2024-23 Whoogle Search is a self-hosted metasearch engine. Versions 0.8.3 and prior have a limited file write vulnerability when the configuration options in Whoogle are enabled. The `config` function in `app/routes.py` does not validate the user-controlled `name` variable on line 447 and `config_data` variable on line 437. The `name` variable is insecurely concatenated in `os.path.join`, leading to path manipulation. The POST data from the `config_data` variable is saved with `pickle.dump` which leads to a limited file write. However, the data that is saved is earlier transformed into a dictionary and the `url` key value pair is added before the file is saved on the system. All in all, the issue allows us to save and overwrite files on the system that the application has permissions to, with a dictionary containing arbitrary data and the `url` key value, which is a limited file write. Version 0.8.4 contains a patch for this issue.
pysec-2009-11 The rst parser (parser/text_rst.py) in MoinMoin 1.6.1 does not check the ACL of an included page, which allows attackers to read unauthorized include files via unknown vectors.
pysec-2024-22 TuiTse-TsuSin is a package for organizing the comparative corpus of Taiwanese Chinese characters and Roman characters, and extracting sentences of the Taiwanese Chinese characters and the Roman characters. Prior to version 1.3.2, when using `tuitse_html` without quoting the input, there is a html injection vulnerability. Version 1.3.2 contains a patch for the issue. As a workaround, sanitize Taigi input with HTML quotation.
pysec-2024-21 A vulnerability classified as critical was found in van_der_Schaar LAB TemporAI 0.0.3. Affected by this vulnerability is the function load_from_file of the component PKL File Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252181 was assigned to this vulnerability. NOTE: The vendor was contacted early and confirmed immediately the existence of the issue. A patch is planned to be released in February 2024.
pysec-2024-20 Whoogle Search is a self-hosted metasearch engine. In versions prior to 0.8.4, the `element` method in `app/routes.py` does not validate the user-controlled `src_type` and `element_url` variables and passes them to the `send` method which sends a GET request on lines 339-343 in `request.py`, which leads to a server-side request forgery. This issue allows for crafting GET requests to internal and external resources on behalf of the server. For example, this issue would allow for accessing resources on the internal network that the server has access to, even though these resources may not be accessible on the internet. This issue is fixed in version 0.8.4.
pysec-2024-19 Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the `element` method in `app/routes.py` does not validate the user-controlled `src_type` and `element_url` variables and passes them to the `send` method which sends a `GET` request on lines 339-343 in `requests.py`. The returned contents of the URL are then passed to and reflected back to the user in the `send_file` function on line 484, together with the user-controlled `src_type`, which allows the attacker to control the HTTP response content type leading to a cross-site scripting vulnerability. An attacker could craft a special URL to point to a malicious website and send the link to a victim. The fact that the link would contain a trusted domain (e.g. from one of public Whoogle instances) could be used to trick the user into clicking the link.The malicious website could, for example, be a copy of a real website, meant to steal a person’s credentials to the website, or trick that person in another way. Version 0.8.4 contains a patch for this issue.
pysec-2024-18 Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the `window` endpoint does not sanitize user-supplied input from the `location` variable and passes it to the `send` method which sends a `GET` request on lines 339-343 in `request.py,` which leads to a server-side request forgery. This issue allows for crafting GET requests to internal and external resources on behalf of the server. For example, this issue would allow for accessing resources on the internal network that the server has access to, even though these resources may not be accessible on the internet. This issue is fixed in version 0.8.4.
pysec-2024-17 pyLoad is a free and open-source Download Manager written in pure Python. The `pyload` API allows any API call to be made using GET requests. Since the session cookie is not set to `SameSite: strict`, this opens the library up to severe attack possibilities via a Cross-Site Request Forgery (CSRF) attack. As a result any API call can be made via a CSRF attack by an unauthenticated user. This issue has been addressed in release `0.5.0b3.dev78`. All users are advised to upgrade.
pysec-2024-16 Nautobot is a Network Source of Truth and Network Automation Platform built as a web application. All users of Nautobot versions earlier than 1.6.10 or 2.1.2 are potentially impacted by a cross-site scripting vulnerability. Due to inadequate input sanitization, any user-editable fields that support Markdown rendering, including are potentially susceptible to cross-site scripting (XSS) attacks via maliciously crafted data. This issue is fixed in Nautobot versions 1.6.10 and 2.1.2.
pysec-2023-251 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.
pysec-2023-250 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation made it possible for an attacker to modify the HTTP request (e.g. to insert a new header) or create a new HTTP request if the attacker controls the HTTP version. The vulnerability only occurs if the attacker can control the HTTP version of the request. This issue has been patched in version 3.9.0.
pysec-2024-15 changedetection.io is an open source tool designed to monitor websites for content changes. In affected versions the API endpoint `/api/v1/watch/<uuid>/history` can be accessed by any unauthorized user. As a result any unauthorized user can check one's watch history. However, because unauthorized party first needs to know a watch UUID, and the watch history endpoint itself returns only paths to the snapshot on the server, an impact on users' data privacy is minimal. This issue has been addressed in version 0.45.13. Users are advised to upgrade. There are no known workarounds for this vulnerability.
pysec-2024-5 cdo-local-uuid project provides a specialized UUID-generating function that can, on user request, cause a program to generate deterministic UUIDs. An information leakage vulnerability is present in `cdo-local-uuid` at version `0.4.0`, and in `case-utils` in unpatched versions (matching the pattern `0.x.0`) at and since `0.5.0`, before `0.15.0`. The vulnerability stems from a Python function, `cdo_local_uuid.local_uuid()`, and its original implementation `case_utils.local_uuid()`.
pysec-2024-14 Apache Airflow, versions before 2.8.1, have a vulnerability that allows an authenticated user to access the source code of a DAG to which they don't have access. This vulnerability is considered low since it requires an authenticated user to exploit it. Users are recommended to upgrade to version 2.8.1, which fixes this issue.
pysec-2024-13 Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration setting resulting in poisoned data after XCom deserialization. This vulnerability is considered low since it requires a DAG author to exploit it. Users are recommended to upgrade to version 2.8.1 or later, which fixes this issue.
pysec-2023-241 Piccolo is an object-relational mapping and query builder which supports asyncio. Prior to version 1.1.1, the handling of named transaction `savepoints` in all database implementations is vulnerable to SQL Injection via f-strings. While the likelihood of an end developer exposing a `savepoints` `name` parameter to a user is highly unlikely, it would not be unheard of. If a malicious user was able to abuse this functionality they would have essentially direct access to the database and the ability to modify data to the level of permissions associated with the database user. A non exhaustive list of actions possible based on database permissions is: Read all data stored in the database, including usernames and password hashes; insert arbitrary data into the database, including modifying existing records; and gain a shell on the underlying server. Version 1.1.1 fixes this issue.
pysec-2024-11 Remote Code Execution vulnerability in Apache IoTDB.This issue affects Apache IoTDB: from 1.0.0 through 1.2.2. Users are recommended to upgrade to version 1.3.0, which fixes the issue.
pysec-2024-10 In Gentoo Portage before 3.0.47, there is missing PGP validation of executed code: the standalone emerge-webrsync downloads a .gpgsig file but does not perform signature verification. Unless emerge-webrsync is used, Portage is not vulnerable.
pysec-2024-9 MetaGPT through 0.6.4 allows the QaEngineer role to execute arbitrary code because RunCode.run_script() passes shell metacharacters to subprocess.Popen.
pysec-2024-8 The JSON loader in Embedchain before 0.1.57 allows a ReDoS (regular expression denial of service) via a long string to json.py.
pysec-2024-7 The OpenAPI loader in Embedchain before 0.1.57 allows attackers to execute arbitrary code, related to the openapi.py yaml.load function argument.
Vulnerability ID Description
gsd-2024-3978 The format of the source doesn't require a description, click on the link for more details
gsd-2024-3977 The format of the source doesn't require a description, click on the link for more details
gsd-2024-3976 The format of the source doesn't require a description, click on the link for more details
gsd-2024-28950 The format of the source doesn't require a description, click on the link for more details
gsd-2024-31153 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4019 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4018 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4017 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4016 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4015 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4014 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4013 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4012 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4011 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4010 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4009 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4008 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4007 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4006 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4005 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4004 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4003 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4002 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4001 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4000 The format of the source doesn't require a description, click on the link for more details
gsd-2024-31858 The format of the source doesn't require a description, click on the link for more details
gsd-2024-31407 The format of the source doesn't require a description, click on the link for more details
gsd-2024-32942 The format of the source doesn't require a description, click on the link for more details
gsd-2024-32937 The format of the source doesn't require a description, click on the link for more details
gsd-2024-32935 The format of the source doesn't require a description, click on the link for more details
Vulnerability ID Description
mal-2024-328 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (8a91f5415b99b3319f866bca1a90562b8bbc37d23f330a4e1e681e3803abec5b) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-908 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (f3b142a0f7e3a073d733c5173f30071ba189294b64eff717882b0679e6226560) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-570 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (75b02908b5e87f4a4205a5f373381fd176a535eb5fc0a0a15a2c18879b91464f) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-910 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (663e6f2eed1c67a480f59e225cd7282d5ec20cf6fb00d4887f06c6a49794a9b2) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-909 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (bb1b249803843dfe82a17ee4255301159f54eaeba7c8dfcd3d1f2da6e52149e1) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-907 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (d563fc2ce6141a32b52e9acdd16b1bb909b5a54b7cef5a86b2b4adbb7dfdf5c1) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-906 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (c3e723a378988af53667c99ddad5b34f5b5b1be60cf96b8b2e7c63d672c7731b) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-905 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (1e564492b095748bf11e6f8cbe81eeb753565ea50565b5d90be97234f83d13fa) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-904 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (05e324fa0bbd163b84f143cfdf696328031ae60c94d27665fdb29101da05a14c) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-903 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (f7b87ef7a01ff837b416ea633e7a93e87043bede2173f2cffde6dede41fca9d0) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-902 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (6b7ef89aa825a4b724a25a95595bc1af6bc7590b373b4ca0b62abbf7acaf2a57) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-901 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (38d4ba8d8347a741afe930d1a57480d1b2674554816cfec9be4f6b247db6b2a0) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-899 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (e3d8f3e6fb6ec314f3098f561a8205e2c2d885a2af209298114036f25b46be3e) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-895 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (fbc0976e1337a3efa48a52f77fdef02a7087dc45ceae46bbf74c460027671342) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-894 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (5fe20d610fac42ed237437021b64cb0e9dd8edffe8b40ca212f8064bec973dbe) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-888 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (986eff549c21e30a3d6caf1ae2b6601ecd8c3a86c2bf1353db2df2c93d82bc01) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-885 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (baca6b336baaa73d4bb4e2e5bffb1ecc4447699637d6d7b60302bcd641132c84) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-883 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (cc4c555cd9b6629dc3e1ef3e7b51a4ec04a28cc7bfe43abf7864a9c38acbd604) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-881 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (878aeb82a49d804368d247c215e6c7558f6dd72355c907d30d144233ef77b4de) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-880 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (150bf82e31ac0ddbdcfdacf8e75ed3a3bc34e68b57b64427c76ef4e231f75746) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-879 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (b81eaf733d55e3ad94ca021747a06855af037334f33ca5cd3427fbe7c277fe53) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-878 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (429f162a437e29e187824827b59e4917853e02e9517a5bafaffd7c4df62202b5) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-870 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (4627eb83d8f5670a2c27f6b9a4b6fc46351f1955473f267ebe81684c1e777d5b) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-869 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (75e5f2b06ed59b1023d5b7d62471910cc2c922a27ae54456320b888dc5ea7f4d) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-856 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (c3dbd8240849571c0511de2015396a1f8ab92982d71a683246250e3124fdfa0b) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-854 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (f35a0a3e19768b5a789b2da58af8c3df97e105103c97302083210f8a53f9be8e) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-853 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (2976088d1f33a5e64ad952bfc59c15cf57033bf60c6f0c32a454db43aeb06407) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-851 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (8cdf7577c7f14a65c7696c0bf599db4d39ca3a25ddd8ad778f9c44e6391ea64f) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-849 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (fda8d87483f706604b9f7056d332677ebfc0f2e7f9febc42fc70ef3eb35afbdb) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
mal-2024-847 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ghsa-malware (e05d19cb4731bbbec8c578bd55a6c6a32e2e957225d96f07aa8a6d7c46df6a76) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
Vulnerability ID Description
wid-sec-w-2024-0365 Microsoft Developer Tools: Mehrere Schwachstellen ermöglichen Codeausführung
wid-sec-w-2024-0280 libxml2: Schwachstelle ermöglicht Denial of Service
wid-sec-w-2024-0278 expat: Mehrere Schwachstellen ermöglichen Denial of Service
wid-sec-w-2024-0181 OpenSSL: Schwachstelle ermöglicht Denial of Service
wid-sec-w-2024-0158 Red Hat Advanced Cluster Management for Kubernetes: Mehrere Schwachstellen
wid-sec-w-2024-0135 Linux Kernel: Mehrere Schwachstellen
wid-sec-w-2024-0073 Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff
wid-sec-w-2024-0034 OpenSSL: Schwachstelle ermöglicht nicht spezifizierten Angriff
wid-sec-w-2024-0032 Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen
wid-sec-w-2024-0015 Linux-Kernel (bluetooth): Schwachstelle ermöglicht Denial of Service und Code-Ausführung
wid-sec-w-2023-3223 Linux Kernel: Schwachstelle ermöglicht Denial of Service
wid-sec-w-2023-3174 SSH Protokoll: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
wid-sec-w-2023-2953 Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen
wid-sec-w-2023-2838 OpenSSL: Schwachstelle ermöglicht Denial of Service
wid-sec-w-2023-2770 Linux Kernel: Schwachstelle ermöglicht Denial of Service
wid-sec-w-2023-2760 Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation
wid-sec-w-2023-2620 Samba: Mehrere Schwachstellen
wid-sec-w-2023-2618 http/2 Implementierungen: Schwachstelle ermöglicht Denial of Service
wid-sec-w-2023-2571 Django: Schwachstelle ermöglicht Denial of Service
wid-sec-w-2023-2570 cURL: Mehre Schwachstellen
wid-sec-w-2023-2526 Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation
wid-sec-w-2023-2449 Red Hat Ansible Automation Platform: Schwachstelle ermöglicht Manipulation von Dateien
wid-sec-w-2023-2434 Linux Kernel: Schwachstelle ermöglicht Codeausführung
wid-sec-w-2023-2384 GNU libc: Mehrere Schwachstellen
wid-sec-w-2023-2358 Linux Kernel: Schwachstelle ermöglicht Denial of Service
wid-sec-w-2023-2357 shadow: Schwachstelle ermöglicht Offenlegung von Informationen
wid-sec-w-2023-2352 Apache Commons: Schwachstelle ermöglicht Denial of Service
wid-sec-w-2023-2314 GNU libc: Schwachstelle ermöglicht Denial of Service
wid-sec-w-2023-2119 Python: Mehrere Schwachstellen
wid-sec-w-2023-2023 avahi: Mehrere Schwachstellen
Vulnerability ID Description
ssa-602936 SSA-602936: Multiple Vulnerabilities in SCALANCE SC-600 Family before V3.1
ssa-580228 SSA-580228: Use of Hard-Coded Credentials Vulnerability in Location Intelligence before V4.3
ssa-543502 SSA-543502: Local Privilege Escalation Vulnerability in Unicam FX
ssa-516818 SSA-516818: TCP Sequence Number Validation Vulnerability in the TCP/IP Stack of CP343-1 Devices
ssa-434032 SSA-434032: Input Validation Vulnerability in the DHCP Client of Nucleus RTOS
ssa-309571 SSA-309571: IPU 2021.1 Vulnerabilities in Siemens Industrial Products using Intel CPUs (June 2021)
ssa-248289 SSA-248289: Denial of Service Vulnerabilities in the IPv6 Stack of Nucleus RTOS
ssa-108696 SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400
ssa-017796 SSA-017796: Multiple File Parsing Vulnerabilities in Tecnomatix Plant Simulation
ssa-844761 SSA-844761: Multiple Vulnerabilities in SiNVR/SiVMS Video Server
ssa-794653 SSA-794653: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
ssa-786191 SSA-786191: Local Privilege Escalation Vulnerability in Spectrum Power 7
ssa-777015 SSA-777015: Multiple Vulnerabilities in SIMATIC CN 4100 before V2.7
ssa-772220 SSA-772220: OpenSSL Vulnerabilities in Industrial Products
ssa-761844 SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS)
ssa-761617 SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server
ssa-712929 SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products
ssa-702935 SSA-702935: Redfish Server Vulnerability in maxView Storage Manager
ssa-589891 SSA-589891: Multiple PAR File Parsing Vulnerabilities in Solid Edge
ssa-583634 SSA-583634: Command Injection Vulnerability in the CPCI85 Firmware of SICAM A8000 Devices
ssa-570294 SSA-570294: Multiple Vulnerabilities in SICAM Q100 Before V2.50
ssa-480095 SSA-480095: Vulnerabilities in the Web Interface of SICAM Q100 Devices before V2.60
ssa-887801 SSA-887801: Information Disclosure Vulnerability in SIMATIC STEP 7 (TIA Portal)
ssa-844582 SSA-844582: Electromagnetic Fault Injection in LOGO! V8.3 BM Devices Results in Broken LOGO! V8.3 Product CA
ssa-831302 SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP V1.0
ssa-783481 SSA-783481: Denial-of-Service Vulnerability in LOGO! 8 BM
ssa-618620 SSA-618620: Vulnerabilities in Boot Loader (U-Boot) of RUGGEDCOM ROS Devices
ssa-482757 SSA-482757: Missing Immutable Root of Trust in S7-1500 CPU devices
ssa-280603 SSA-280603: Denial of Service Vulnerability in SINUMERIK ONE and SINUMERIK MC
ssa-264815 SSA-264815: Type Confusion Vulnerability in OpenSSL X.400 Address Processing in SIMATIC Products
Vulnerability ID Description
rhsa-2024_1449 Red Hat Security Advisory: OpenShift Container Platform 4.15.5 bug fix and security update
rhsa-2024_1461 Red Hat Security Advisory: OpenShift Container Platform 4.14.18 packages and security update
rhsa-2024_1458 Red Hat Security Advisory: OpenShift Container Platform 4.14.18 bug fix and security update
rhsa-2024_1454 Red Hat Security Advisory: OpenShift Container Platform 4.13.38 bug fix and security update
rhsa-2024_1456 Red Hat Security Advisory: OpenShift Container Platform 4.13.38 packages and security update
rhsa-2024_1532 Red Hat Security Advisory: kernel security and bug fix update
rhsa-2024_1533 Red Hat Security Advisory: kernel-rt security and bug fix update
rhsa-2024_1512 Red Hat Security Advisory: libreoffice security fix update
rhsa-2024_1513 Red Hat Security Advisory: libreoffice security fix update
rhsa-2024_1514 Red Hat Security Advisory: libreoffice security fix update
rhsa-2024_1522 Red Hat Security Advisory: dnsmasq security update
rhsa-2024_1530 Red Hat Security Advisory: expat security update
rhsa-2024_1515 Red Hat Security Advisory: squid security and bug fix update
rhsa-2024_1518 Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.6 (python-twisted) security update
rhsa-2024_1516 Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (python-twisted) security update
rhsa-2024_1510 Red Hat Security Advisory: nodejs:18 security update
rhsa-2024_1509 Red Hat Security Advisory: Red Hat Data Grid 8.4.7 security update
rhba-2021_2979 Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.23 packages update
rhea-2022_5139 Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
rhea-2022_5221 Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
rhea-2022_5615 Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
rhea-2022_4925 Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
rhba-2023_1759 Red Hat Bug Fix Advisory: OpenShift Container Platform 4.11.37 packages and security update
rhba-2023_1507 Red Hat Bug Fix Advisory: OpenShift Container Platform 4.12.10 packages update
rhba-2023_1321 Red Hat Bug Fix Advisory: OpenShift Container Platform 4.9.58 packages update
rhba-2023_1037 Red Hat Bug Fix Advisory: Red Hat build of MicroShift 4.12.6 bug fix and enhancement update
rhea-2022_1596 Red Hat Enhancement Advisory: OpenShift Virtualization 4.9.4 Images
rhba-2022_7200 Red Hat Bug Fix Advisory: OpenShift Container Platform 4.11.12 packages update
rhea-2021_2679 Red Hat Enhancement Advisory: ACS 3.62 enhancement update
rhba-2022_8558 Red Hat Bug Fix Advisory: openvswitch2.13 bug fix and enhancement update
Vulnerability ID Description
icsa-24-053-01 Delta Electronics CNCSoft-B DOPSoft
icsa-24-051-03 Mitsubishi Electric Electrical discharge machines
icsa-24-051-02 ICSNPP - Ethercat Zeek Plugin
icsa-24-051-01 Commend WS203VICM
icsa-24-046-16 Rockwell Automation FactoryTalk Service Platform
icsa-23-306-02 Mitsubishi Electric MELSEC iQ-F/iQ-R Series CPU Module (Update A)
icsa-24-044-01 Mitsubishi Electric MELSEC iQ-R Series Safety CPU
icsa-24-046-15 Siemens SINEC NMS
icsa-24-046-14 Siemens Polarion ALM
icsa-24-046-13 Siemens Parasolid
icsa-24-046-12 Siemens SIMATIC WinCC, OpenPCS
icsa-24-046-11 Siemens SCALANCE XCM-/XRM-300
icsa-24-046-10 Siemens Simcenter Femap
icsa-24-046-09 Siemens SCALANCE SC-600 Family
icsa-24-046-08 Siemens RUGGEDCOM APE1808
icsa-24-046-07 Siemens Tecnomatix Plant Simulation
icsa-24-046-06 Siemens Unicam FX
icsa-24-046-05 Siemens Location Intelligence
icsa-24-046-04 Siemens CP343-1 Devices
icsa-24-046-03 Siemens SIMATIC RTLS Gateways
icsa-24-046-02 Siemens SIDIS Prime
icsa-24-046-01 Siemens SCALANCE W1750D
icsa-24-039-01 Qolsys IQ Panel 4, IQ4 HUB
icsa-23-082-06 ProPump and Controls Osprey Pump Controller (Update A)
icsa-24-032-03 AVEVA Edge products (formerly known as InduSoft Web Studio)
icsa-24-032-01 Gessler GmbH WEB-MASTER
icsa-24-030-07 Rockwell Automation LP30/40/50 and BM40 Operator Interface
icsa-24-030-06 Rockwell Automation FactoryTalk Service Platform
icsa-24-030-05 Rockwell Automation ControlLogix and GuardLogix
icsa-24-030-04 Hitron Systems Security Camera DVR
Vulnerability ID Description
cisco-sa-ise-xss-bl4vtml Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability
cisco-sa-ise-priv-esc-kjlp2aw Cisco Identity Services Engine Privilege Escalation Vulnerabilities
cisco-sa-struts-c2kcmkmt Apache Struts Vulnerability Affecting Cisco Products: December 2023
cisco-sa-http2-reset-d8kf32vz HTTP/2 Rapid Reset Attack Affecting Cisco Products: October 2023
cisco-sa-asa-ssl-vpn-y88qom77 Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Packet Validation Vulnerability
cisco-sa-wsa-bypass-vxvqwzsj Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerability
cisco-sa-ftd-icmpv6-dos-4emklun Cisco Firepower Threat Defense Software and Cisco FirePOWER Services ICMPv6 with Snort 2 Denial of Service Vulnerability
cisco-sa-uipphone-xss-ncmuykqa Cisco IP Phone Stored Cross-Site Scripting Vulnerability
cisco-sa-secure-endpoint-dos-rzogfknd Cisco Secure Endpoint for Windows Scanning Evasion Vulnerability
cisco-sa-ise-mult-j-kxpnynr Cisco Identity Services Engine Vulnerabilities
cisco-sa-appd-php-authpriv-gebwtvu5 Cisco AppDynamics PHP Agent Privilege Escalation Vulnerability
cisco-sa-accsc-dos-9slzkz8 Cisco Secure Client Software Denial of Service Vulnerabilities
cisco-sa-asa-icmpv6-t5tzqwnd Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software ICMPv6 Message Processing Denial of Service Vulnerability
cisco-sa-asa-webvpn-dos-3ghzqbas Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access VPN Denial of Service Vulnerability
cisco-sa-asa-webvpn-loeksnmo Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Web Client Services Client-Side Request Smuggling Vulnerability
cisco-sa-snort-ftd-zxytnjom Multiple Cisco Products Snort FTP Inspection Bypass Vulnerability
cisco-sa-sa-ftd-snort3-urldos-occfqtex Cisco Firepower Threat Defense Software SSL/TLS URL Category and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability
cisco-sa-ise-injection-qexegrcw Cisco Identity Services Engine Command Injection Vulnerabilities
cisco-sa-ise-file-upload-fcelp4xs Cisco Identity Services Engine Vulnerabilities
cisco-sa-ftdsnort3sip-bypass-lmz2thkn Cisco Firepower Threat Defense Software Snort 3 Geolocation IP Filter Bypass Vulnerability
cisco-sa-ftd-snort3-uanuntcv Cisco Firepower Threat Defense Software Snort 3 Detection Engine Denial of Service Vulnerability
cisco-sa-ftd-snort3-8u4hhxh8 Cisco Firepower Threat Defense Software SSL and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability
cisco-sa-ftd-smbsnort3-dos-pfojoyuv Cisco Firepower Threat Defense Software SMB Protocol Snort 3 Detection Engine Bypass and Denial of Service Vulnerability
cisco-sa-ftd-intrusion-dos-dft7wygc Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Firewalls Inspection Rules Denial of Service Vulnerability
cisco-sa-ftd-fmc-code-inj-wshrgz8l Cisco Firepower Threat Defense Software and Firepower Management Center Software Code Injection Vulnerability
cisco-sa-fmc-xss-sk2gkfvj Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities
cisco-sa-fmc-logview-dos-ayjdex55 Cisco Firepower Management Center Software Log API Denial of Service Vulnerability
cisco-sa-fmc-file-download-7js4ug2j Cisco Firepower Management Center Software Arbitrary File Download Vulnerability
cisco-sa-fmc-cmdinj-btegufox Cisco Firepower Management Center Software Command Injection Vulnerabilities
cisco-sa-fmc-cmd-inj-29mp49hn Cisco Firepower Management Center Software Command Injection Vulnerability