All the vulnerabilites related to ikus060 - ikus060/rdiffweb
cve-2022-3371
Vulnerability from cvelistv5
Published
2022-09-30 13:15
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
No limit in length of "Token name" parameter results in DOS attack /memory corruption in ikus060/rdiffweb prior to 2.5.0a3 in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7 | x_refsource_MISC | |
https://huntr.dev/bounties/4e8f6136-50c7-4fa1-ac98-699bcb7b35ce | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/4e8f6136-50c7-4fa1-ac98-699bcb7b35ce" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.0a3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0a3." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-30T13:15:12", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/4e8f6136-50c7-4fa1-ac98-699bcb7b35ce" } ], "source": { "advisory": "4e8f6136-50c7-4fa1-ac98-699bcb7b35ce", "discovery": "EXTERNAL" }, "title": "No limit in length of \"Token name\" parameter results in DOS attack /memory corruption in ikus060/rdiffweb prior to 2.5.0a3 in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3371", "STATE": "PUBLIC", "TITLE": "No limit in length of \"Token name\" parameter results in DOS attack /memory corruption in ikus060/rdiffweb prior to 2.5.0a3 in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.5.0a3" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0a3." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-770 Allocation of Resources Without Limits or Throttling" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7" }, { "name": "https://huntr.dev/bounties/4e8f6136-50c7-4fa1-ac98-699bcb7b35ce", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/4e8f6136-50c7-4fa1-ac98-699bcb7b35ce" } ] }, "source": { "advisory": "4e8f6136-50c7-4fa1-ac98-699bcb7b35ce", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3371", "datePublished": "2022-09-30T13:15:12", "dateReserved": "2022-09-30T00:00:00", "dateUpdated": "2024-08-03T01:07:06.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4723
Vulnerability from cvelistv5
Published
2022-12-23 00:00
Modified
2024-08-03 01:48
Severity ?
EPSS score ?
Summary
Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:48:40.414Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/9369681b-8bfc-4146-a54c-c5108442d92c" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/6e9ee210548f6d3210704cac302cfc7cdb239765" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.5." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-23T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/9369681b-8bfc-4146-a54c-c5108442d92c" }, { "url": "https://github.com/ikus060/rdiffweb/commit/6e9ee210548f6d3210704cac302cfc7cdb239765" } ], "source": { "advisory": "9369681b-8bfc-4146-a54c-c5108442d92c", "discovery": "EXTERNAL" }, "title": "Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-4723", "datePublished": "2022-12-23T00:00:00", "dateReserved": "2022-12-23T00:00:00", "dateUpdated": "2024-08-03T01:48:40.414Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3179
Vulnerability from cvelistv5
Published
2022-09-13 16:35
Modified
2024-08-03 01:00
Severity ?
EPSS score ?
Summary
Weak Password Requirements in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://github.com/ikus060/rdiffweb/commit/233befc33bdc45d4838c773d5aed4408720504c5 | x_refsource_MISC | |
https://huntr.dev/bounties/58eae29e-3619-449d-9bba-fdcbabcba5fe | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:00:10.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/233befc33bdc45d4838c773d5aed4408720504c5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/58eae29e-3619-449d-9bba-fdcbabcba5fe" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-521", "description": "CWE-521 Weak Password Requirements", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-13T16:35:09", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/233befc33bdc45d4838c773d5aed4408720504c5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/58eae29e-3619-449d-9bba-fdcbabcba5fe" } ], "source": { "advisory": "58eae29e-3619-449d-9bba-fdcbabcba5fe", "discovery": "EXTERNAL" }, "title": "Weak Password Requirements in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3179", "STATE": "PUBLIC", "TITLE": "Weak Password Requirements in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.2" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.2." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-521 Weak Password Requirements" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ikus060/rdiffweb/commit/233befc33bdc45d4838c773d5aed4408720504c5", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/233befc33bdc45d4838c773d5aed4408720504c5" }, { "name": "https://huntr.dev/bounties/58eae29e-3619-449d-9bba-fdcbabcba5fe", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/58eae29e-3619-449d-9bba-fdcbabcba5fe" } ] }, "source": { "advisory": "58eae29e-3619-449d-9bba-fdcbabcba5fe", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3179", "datePublished": "2022-09-13T16:35:09", "dateReserved": "2022-09-12T00:00:00", "dateUpdated": "2024-08-03T01:00:10.567Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3175
Vulnerability from cvelistv5
Published
2022-09-13 09:20
Modified
2024-08-03 01:00
Severity ?
EPSS score ?
Summary
Missing Custom Error Page in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/c40badc3-c9e7-4b69-9e2e-2b9f05865159 | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/233befc33bdc45d4838c773d5aed4408720504c5 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:00:10.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/c40badc3-c9e7-4b69-9e2e-2b9f05865159" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/233befc33bdc45d4838c773d5aed4408720504c5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Missing Custom Error Page in GitHub repository ikus060/rdiffweb prior to 2.4.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-756", "description": "CWE-756 Missing Custom Error Page", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-13T09:20:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/c40badc3-c9e7-4b69-9e2e-2b9f05865159" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/233befc33bdc45d4838c773d5aed4408720504c5" } ], "source": { "advisory": "c40badc3-c9e7-4b69-9e2e-2b9f05865159", "discovery": "EXTERNAL" }, "title": "Missing Custom Error Page in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3175", "STATE": "PUBLIC", "TITLE": "Missing Custom Error Page in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.2" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Missing Custom Error Page in GitHub repository ikus060/rdiffweb prior to 2.4.2." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-756 Missing Custom Error Page" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/c40badc3-c9e7-4b69-9e2e-2b9f05865159", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/c40badc3-c9e7-4b69-9e2e-2b9f05865159" }, { "name": "https://github.com/ikus060/rdiffweb/commit/233befc33bdc45d4838c773d5aed4408720504c5", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/233befc33bdc45d4838c773d5aed4408720504c5" } ] }, "source": { "advisory": "c40badc3-c9e7-4b69-9e2e-2b9f05865159", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3175", "datePublished": "2022-09-13T09:20:10", "dateReserved": "2022-09-12T00:00:00", "dateUpdated": "2024-08-03T01:00:10.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4722
Vulnerability from cvelistv5
Published
2022-12-23 00:00
Modified
2024-08-03 01:48
Severity ?
EPSS score ?
Summary
Authentication Bypass by Primary Weakness in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:48:40.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/c62126dc-d9a6-4d3e-988d-967031876c58" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/d1aaa96b665a39fba9e98d6054a9de511ba0a837" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Authentication Bypass by Primary Weakness in GitHub repository ikus060/rdiffweb prior to 2.5.5." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "CWE-305 Authentication Bypass by Primary Weakness", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-23T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/c62126dc-d9a6-4d3e-988d-967031876c58" }, { "url": "https://github.com/ikus060/rdiffweb/commit/d1aaa96b665a39fba9e98d6054a9de511ba0a837" } ], "source": { "advisory": "c62126dc-d9a6-4d3e-988d-967031876c58", "discovery": "EXTERNAL" }, "title": "Authentication Bypass by Primary Weakness in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-4722", "datePublished": "2022-12-23T00:00:00", "dateReserved": "2022-12-23T00:00:00", "dateUpdated": "2024-08-03T01:48:40.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3290
Vulnerability from cvelistv5
Published
2022-09-26 19:00
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Improper Handling of Length Parameter Inconsistency in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3 | x_refsource_MISC | |
https://huntr.dev/bounties/d8b8519d-96a5-484c-8141-624c54290bf5 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:05.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/d8b8519d-96a5-484c-8141-624c54290bf5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Handling of Length Parameter Inconsistency in GitHub repository ikus060/rdiffweb prior to 2.4.8." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-130", "description": "CWE-130 Improper Handling of Length Parameter Inconsistency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-26T19:00:14", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/d8b8519d-96a5-484c-8141-624c54290bf5" } ], "source": { "advisory": "d8b8519d-96a5-484c-8141-624c54290bf5", "discovery": "EXTERNAL" }, "title": "Improper Handling of Length Parameter Inconsistency in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3290", "STATE": "PUBLIC", "TITLE": "Improper Handling of Length Parameter Inconsistency in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.8" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper Handling of Length Parameter Inconsistency in GitHub repository ikus060/rdiffweb prior to 2.4.8." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-130 Improper Handling of Length Parameter Inconsistency" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3" }, { "name": "https://huntr.dev/bounties/d8b8519d-96a5-484c-8141-624c54290bf5", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/d8b8519d-96a5-484c-8141-624c54290bf5" } ] }, "source": { "advisory": "d8b8519d-96a5-484c-8141-624c54290bf5", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3290", "datePublished": "2022-09-26T19:00:14", "dateReserved": "2022-09-23T00:00:00", "dateUpdated": "2024-08-03T01:07:05.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3250
Vulnerability from cvelistv5
Published
2022-09-21 16:55
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/39889a3f-8bb7-448a-b0d4-a18c671bbd23 | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/ac334dd27ceadac0661b1e2e059a8423433c3fee | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:05.912Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/39889a3f-8bb7-448a-b0d4-a18c671bbd23" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/ac334dd27ceadac0661b1e2e059a8423433c3fee" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute in GitHub repository ikus060/rdiffweb prior to 2.4.6." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-614", "description": "CWE-614 Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-21T16:55:14", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/39889a3f-8bb7-448a-b0d4-a18c671bbd23" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/ac334dd27ceadac0661b1e2e059a8423433c3fee" } ], "source": { "advisory": "39889a3f-8bb7-448a-b0d4-a18c671bbd23", "discovery": "EXTERNAL" }, "title": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3250", "STATE": "PUBLIC", "TITLE": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.6" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute in GitHub repository ikus060/rdiffweb prior to 2.4.6." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT", "availabilityImpact": "LOW", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-614 Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/39889a3f-8bb7-448a-b0d4-a18c671bbd23", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/39889a3f-8bb7-448a-b0d4-a18c671bbd23" }, { "name": "https://github.com/ikus060/rdiffweb/commit/ac334dd27ceadac0661b1e2e059a8423433c3fee", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/ac334dd27ceadac0661b1e2e059a8423433c3fee" } ] }, "source": { "advisory": "39889a3f-8bb7-448a-b0d4-a18c671bbd23", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3250", "datePublished": "2022-09-21T16:55:14", "dateReserved": "2022-09-20T00:00:00", "dateUpdated": "2024-08-03T01:07:05.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3269
Vulnerability from cvelistv5
Published
2022-09-23 09:20
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Session Fixation in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/67c25969-5e7a-4424-817e-e1a918f63cc6 | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/39e7dcd4a1f44d2a7bd92b79d78a800910b1b22b | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:05.856Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/67c25969-5e7a-4424-817e-e1a918f63cc6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/39e7dcd4a1f44d2a7bd92b79d78a800910b1b22b" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.7", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Session Fixation in GitHub repository ikus060/rdiffweb prior to 2.4.7." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-384", "description": "CWE-384 Session Fixation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-23T09:20:09", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/67c25969-5e7a-4424-817e-e1a918f63cc6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/39e7dcd4a1f44d2a7bd92b79d78a800910b1b22b" } ], "source": { "advisory": "67c25969-5e7a-4424-817e-e1a918f63cc6", "discovery": "EXTERNAL" }, "title": "Session Fixation in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3269", "STATE": "PUBLIC", "TITLE": "Session Fixation in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.7" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Session Fixation in GitHub repository ikus060/rdiffweb prior to 2.4.7." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-384 Session Fixation" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/67c25969-5e7a-4424-817e-e1a918f63cc6", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/67c25969-5e7a-4424-817e-e1a918f63cc6" }, { "name": "https://github.com/ikus060/rdiffweb/commit/39e7dcd4a1f44d2a7bd92b79d78a800910b1b22b", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/39e7dcd4a1f44d2a7bd92b79d78a800910b1b22b" } ] }, "source": { "advisory": "67c25969-5e7a-4424-817e-e1a918f63cc6", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3269", "datePublished": "2022-09-23T09:20:09", "dateReserved": "2022-09-22T00:00:00", "dateUpdated": "2024-08-03T01:07:05.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3274
Vulnerability from cvelistv5
Published
2022-09-22 18:15
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery (CSRF) on user's settings in GitHub repository ikus060/rdiffweb prior to 2.4.6. in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/8834c356-4ddb-4be7-898b-d76f480e9c3f | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/e974df75bdbcff3996ad70bd1b4424ec1485ea3f | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:05.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/8834c356-4ddb-4be7-898b-d76f480e9c3f" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/e974df75bdbcff3996ad70bd1b4424ec1485ea3f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.7", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.7." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-22T18:15:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/8834c356-4ddb-4be7-898b-d76f480e9c3f" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/e974df75bdbcff3996ad70bd1b4424ec1485ea3f" } ], "source": { "advisory": "8834c356-4ddb-4be7-898b-d76f480e9c3f", "discovery": "EXTERNAL" }, "title": "Cross-Site Request Forgery (CSRF) on user\u0027s settings in GitHub repository ikus060/rdiffweb prior to 2.4.6. in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3274", "STATE": "PUBLIC", "TITLE": "Cross-Site Request Forgery (CSRF) on user\u0027s settings in GitHub repository ikus060/rdiffweb prior to 2.4.6. in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.7" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.7." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352 Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/8834c356-4ddb-4be7-898b-d76f480e9c3f", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/8834c356-4ddb-4be7-898b-d76f480e9c3f" }, { "name": "https://github.com/ikus060/rdiffweb/commit/e974df75bdbcff3996ad70bd1b4424ec1485ea3f", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/e974df75bdbcff3996ad70bd1b4424ec1485ea3f" } ] }, "source": { "advisory": "8834c356-4ddb-4be7-898b-d76f480e9c3f", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3274", "datePublished": "2022-09-22T18:15:11", "dateReserved": "2022-09-22T00:00:00", "dateUpdated": "2024-08-03T01:07:05.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3364
Vulnerability from cvelistv5
Published
2022-09-29 20:45
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
No limit in length of "Fullname" parameter results in DOS attack /memory corruption in ikus060/rdiffweb prior to 2.5.0a3 in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/e70ad507-1424-463b-bdf1-c4a6fbe6e720 | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.596Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/e70ad507-1424-463b-bdf1-c4a6fbe6e720" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.0a3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0a3." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-29T20:45:11", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/e70ad507-1424-463b-bdf1-c4a6fbe6e720" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7" } ], "source": { "advisory": "e70ad507-1424-463b-bdf1-c4a6fbe6e720", "discovery": "EXTERNAL" }, "title": "No limit in length of \"Fullname\" parameter results in DOS attack /memory corruption in ikus060/rdiffweb prior to 2.5.0a3 in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3364", "STATE": "PUBLIC", "TITLE": "No limit in length of \"Fullname\" parameter results in DOS attack /memory corruption in ikus060/rdiffweb prior to 2.5.0a3 in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.5.0a3" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0a3." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-770 Allocation of Resources Without Limits or Throttling" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/e70ad507-1424-463b-bdf1-c4a6fbe6e720", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/e70ad507-1424-463b-bdf1-c4a6fbe6e720" }, { "name": "https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7" } ] }, "source": { "advisory": "e70ad507-1424-463b-bdf1-c4a6fbe6e720", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3364", "datePublished": "2022-09-29T20:45:12", "dateReserved": "2022-09-29T00:00:00", "dateUpdated": "2024-08-03T01:07:06.596Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3232
Vulnerability from cvelistv5
Published
2022-09-17 19:40
Modified
2024-08-03 01:00
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery (CSRF) in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/15c8fd98-7f50-4d46-b013-42710af1f99c | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/422791ea45713aaaa865bdca74addb9fffd93a71 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:00:10.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/15c8fd98-7f50-4d46-b013-42710af1f99c" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/422791ea45713aaaa865bdca74addb9fffd93a71" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.5." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-17T19:40:08", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/15c8fd98-7f50-4d46-b013-42710af1f99c" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/422791ea45713aaaa865bdca74addb9fffd93a71" } ], "source": { "advisory": "15c8fd98-7f50-4d46-b013-42710af1f99c", "discovery": "EXTERNAL" }, "title": "Cross-Site Request Forgery (CSRF) in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3232", "STATE": "PUBLIC", "TITLE": "Cross-Site Request Forgery (CSRF) in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.5" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.5." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352 Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/15c8fd98-7f50-4d46-b013-42710af1f99c", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/15c8fd98-7f50-4d46-b013-42710af1f99c" }, { "name": "https://github.com/ikus060/rdiffweb/commit/422791ea45713aaaa865bdca74addb9fffd93a71", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/422791ea45713aaaa865bdca74addb9fffd93a71" } ] }, "source": { "advisory": "15c8fd98-7f50-4d46-b013-42710af1f99c", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3232", "datePublished": "2022-09-17T19:40:08", "dateReserved": "2022-09-16T00:00:00", "dateUpdated": "2024-08-03T01:00:10.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3326
Vulnerability from cvelistv5
Published
2022-09-28 23:45
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Weak Password Requirements in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/1f6a5e49-23f2-45f7-8661-19f9cee8ae97 | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/ee98e5af78ec60db8a17fef6ea0ca250e3f31eec | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/1f6a5e49-23f2-45f7-8661-19f9cee8ae97" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/ee98e5af78ec60db8a17fef6ea0ca250e3f31eec" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.9." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-521", "description": "CWE-521 Weak Password Requirements", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-28T23:45:11", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/1f6a5e49-23f2-45f7-8661-19f9cee8ae97" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/ee98e5af78ec60db8a17fef6ea0ca250e3f31eec" } ], "source": { "advisory": "1f6a5e49-23f2-45f7-8661-19f9cee8ae97", "discovery": "EXTERNAL" }, "title": "Weak Password Requirements in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3326", "STATE": "PUBLIC", "TITLE": "Weak Password Requirements in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.9" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.9." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-521 Weak Password Requirements" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/1f6a5e49-23f2-45f7-8661-19f9cee8ae97", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/1f6a5e49-23f2-45f7-8661-19f9cee8ae97" }, { "name": "https://github.com/ikus060/rdiffweb/commit/ee98e5af78ec60db8a17fef6ea0ca250e3f31eec", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/ee98e5af78ec60db8a17fef6ea0ca250e3f31eec" } ] }, "source": { "advisory": "1f6a5e49-23f2-45f7-8661-19f9cee8ae97", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3326", "datePublished": "2022-09-28T23:45:11", "dateReserved": "2022-09-26T00:00:00", "dateUpdated": "2024-08-03T01:07:06.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3272
Vulnerability from cvelistv5
Published
2022-09-26 16:50
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Improper Handling of Length Parameter Inconsistency in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3 | x_refsource_MISC | |
https://huntr.dev/bounties/733678b9-daa1-4d6a-875a-382fa09a6e38 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:05.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/733678b9-daa1-4d6a-875a-382fa09a6e38" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Handling of Length Parameter Inconsistency in GitHub repository ikus060/rdiffweb prior to 2.4.8." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-130", "description": "CWE-130 Improper Handling of Length Parameter Inconsistency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-26T16:50:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/733678b9-daa1-4d6a-875a-382fa09a6e38" } ], "source": { "advisory": "733678b9-daa1-4d6a-875a-382fa09a6e38", "discovery": "EXTERNAL" }, "title": "Improper Handling of Length Parameter Inconsistency in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3272", "STATE": "PUBLIC", "TITLE": "Improper Handling of Length Parameter Inconsistency in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.8" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper Handling of Length Parameter Inconsistency in GitHub repository ikus060/rdiffweb prior to 2.4.8." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-130 Improper Handling of Length Parameter Inconsistency" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3" }, { "name": "https://huntr.dev/bounties/733678b9-daa1-4d6a-875a-382fa09a6e38", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/733678b9-daa1-4d6a-875a-382fa09a6e38" } ] }, "source": { "advisory": "733678b9-daa1-4d6a-875a-382fa09a6e38", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3272", "datePublished": "2022-09-26T16:50:10", "dateReserved": "2022-09-22T00:00:00", "dateUpdated": "2024-08-03T01:07:05.877Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3327
Vulnerability from cvelistv5
Published
2022-10-19 00:00
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Missing Authentication for Critical Function in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.516Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/02207c8f-2b15-4a31-a86a-74fd2fca0ed1" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/f2a32f2a9f3fb8be1a9432ac3d81d3aacdb13095" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.0a6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior to 2.5.0a6." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-19T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/02207c8f-2b15-4a31-a86a-74fd2fca0ed1" }, { "url": "https://github.com/ikus060/rdiffweb/commit/f2a32f2a9f3fb8be1a9432ac3d81d3aacdb13095" } ], "source": { "advisory": "02207c8f-2b15-4a31-a86a-74fd2fca0ed1", "discovery": "EXTERNAL" }, "title": "Missing Authentication for Critical Function in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3327", "datePublished": "2022-10-19T00:00:00", "dateReserved": "2022-09-26T00:00:00", "dateUpdated": "2024-08-03T01:07:06.516Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4138
Vulnerability from cvelistv5
Published
2023-08-03 13:41
Modified
2024-10-11 18:19
Severity ?
EPSS score ?
Summary
Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:17:11.962Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/1b1fa915-d588-4bb1-9e82-6a6be79befed" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/feef0d7b11d86aed29bf98c21526088117964d85" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:ikus-soft:rdiffweb:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rdiffweb", "vendor": "ikus-soft", "versions": [ { "lessThan": "2.8.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-4138", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-11T18:15:42.901811Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-11T18:19:21.848Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.8.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.8.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-03T13:41:50.659Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/1b1fa915-d588-4bb1-9e82-6a6be79befed" }, { "url": "https://github.com/ikus060/rdiffweb/commit/feef0d7b11d86aed29bf98c21526088117964d85" } ], "source": { "advisory": "1b1fa915-d588-4bb1-9e82-6a6be79befed", "discovery": "EXTERNAL" }, "title": "Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-4138", "datePublished": "2023-08-03T13:41:50.659Z", "dateReserved": "2023-08-03T13:41:37.464Z", "dateUpdated": "2024-10-11T18:19:21.848Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3438
Vulnerability from cvelistv5
Published
2022-10-10 00:00
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Open Redirect in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.543Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/bc5689e4-221a-4200-a8ab-42c659f89f67" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/4d464b467f14b8eb9103d7f5f0774e49995527c7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.0a4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.0a4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-10T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/bc5689e4-221a-4200-a8ab-42c659f89f67" }, { "url": "https://github.com/ikus060/rdiffweb/commit/4d464b467f14b8eb9103d7f5f0774e49995527c7" } ], "source": { "advisory": "bc5689e4-221a-4200-a8ab-42c659f89f67", "discovery": "EXTERNAL" }, "title": "Open Redirect in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3438", "datePublished": "2022-10-10T00:00:00", "dateReserved": "2022-10-10T00:00:00", "dateUpdated": "2024-08-03T01:07:06.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4646
Vulnerability from cvelistv5
Published
2022-12-22 00:00
Modified
2024-08-03 01:48
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery (CSRF) in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:48:40.375Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/17bc1b0f-1f5c-432f-88e4-c9866ccf6e10" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/e6f0d8002129be90fe82fa3e3ea0a6942caba398" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.5.4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-22T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/17bc1b0f-1f5c-432f-88e4-c9866ccf6e10" }, { "url": "https://github.com/ikus060/rdiffweb/commit/e6f0d8002129be90fe82fa3e3ea0a6942caba398" } ], "source": { "advisory": "17bc1b0f-1f5c-432f-88e4-c9866ccf6e10", "discovery": "EXTERNAL" }, "title": "Cross-Site Request Forgery (CSRF) in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-4646", "datePublished": "2022-12-22T00:00:00", "dateReserved": "2022-12-22T00:00:00", "dateUpdated": "2024-08-03T01:48:40.375Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3267
Vulnerability from cvelistv5
Published
2022-09-22 09:20
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery (CSRF) in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/7b6ec9f4-4fe9-4716-8dba-3491ffa3f6f2 | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/20fc0d304412cc569b21f31e52cb8b94094d6314 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:05.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/7b6ec9f4-4fe9-4716-8dba-3491ffa3f6f2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/20fc0d304412cc569b21f31e52cb8b94094d6314" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.6." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-22T09:20:14", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/7b6ec9f4-4fe9-4716-8dba-3491ffa3f6f2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/20fc0d304412cc569b21f31e52cb8b94094d6314" } ], "source": { "advisory": "7b6ec9f4-4fe9-4716-8dba-3491ffa3f6f2", "discovery": "EXTERNAL" }, "title": "Cross-Site Request Forgery (CSRF) in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3267", "STATE": "PUBLIC", "TITLE": "Cross-Site Request Forgery (CSRF) in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.6" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.6." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352 Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/7b6ec9f4-4fe9-4716-8dba-3491ffa3f6f2", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/7b6ec9f4-4fe9-4716-8dba-3491ffa3f6f2" }, { "name": "https://github.com/ikus060/rdiffweb/commit/20fc0d304412cc569b21f31e52cb8b94094d6314", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/20fc0d304412cc569b21f31e52cb8b94094d6314" } ] }, "source": { "advisory": "7b6ec9f4-4fe9-4716-8dba-3491ffa3f6f2", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3267", "datePublished": "2022-09-22T09:20:14", "dateReserved": "2022-09-22T00:00:00", "dateUpdated": "2024-08-03T01:07:05.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3167
Vulnerability from cvelistv5
Published
2022-09-08 18:35
Modified
2024-08-03 01:00
Severity ?
EPSS score ?
Summary
Improper Restriction of Rendered UI Layers or Frames in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/e5c2625b-34cc-4805-8223-80f2689e4e5c | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/7294bb7466532762c93d711211e5958940c1b428 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:00:10.609Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/e5c2625b-34cc-4805-8223-80f2689e4e5c" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/7294bb7466532762c93d711211e5958940c1b428" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Restriction of Rendered UI Layers or Frames in GitHub repository ikus060/rdiffweb prior to 2.4.1." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1021", "description": "CWE-1021 Improper Restriction of Rendered UI Layers or Frames", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-08T18:35:09", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/e5c2625b-34cc-4805-8223-80f2689e4e5c" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/7294bb7466532762c93d711211e5958940c1b428" } ], "source": { "advisory": "e5c2625b-34cc-4805-8223-80f2689e4e5c", "discovery": "EXTERNAL" }, "title": "Improper Restriction of Rendered UI Layers or Frames in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3167", "STATE": "PUBLIC", "TITLE": "Improper Restriction of Rendered UI Layers or Frames in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.1" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper Restriction of Rendered UI Layers or Frames in GitHub repository ikus060/rdiffweb prior to 2.4.1." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1021 Improper Restriction of Rendered UI Layers or Frames" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/e5c2625b-34cc-4805-8223-80f2689e4e5c", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/e5c2625b-34cc-4805-8223-80f2689e4e5c" }, { "name": "https://github.com/ikus060/rdiffweb/commit/7294bb7466532762c93d711211e5958940c1b428", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/7294bb7466532762c93d711211e5958940c1b428" } ] }, "source": { "advisory": "e5c2625b-34cc-4805-8223-80f2689e4e5c", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3167", "datePublished": "2022-09-08T18:35:09", "dateReserved": "2022-09-08T00:00:00", "dateUpdated": "2024-08-03T01:00:10.609Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3456
Vulnerability from cvelistv5
Published
2022-10-13 00:00
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.721Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/b34412ca-50c5-4615-b7e3-5d07d33acfce" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/b78ec09f4582e363f6f449df6f987127e126c311" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-13T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/b34412ca-50c5-4615-b7e3-5d07d33acfce" }, { "url": "https://github.com/ikus060/rdiffweb/commit/b78ec09f4582e363f6f449df6f987127e126c311" } ], "source": { "advisory": "b34412ca-50c5-4615-b7e3-5d07d33acfce", "discovery": "EXTERNAL" }, "title": "Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3456", "datePublished": "2022-10-13T00:00:00", "dateReserved": "2022-10-11T00:00:00", "dateUpdated": "2024-08-03T01:07:06.721Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4720
Vulnerability from cvelistv5
Published
2022-12-23 00:00
Modified
2024-08-03 01:48
Severity ?
EPSS score ?
Summary
Open Redirect in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:48:40.269Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/6afaae56a29536f0118b3380d296c416aa6d078d" }, { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/339687af-6e25-4ad8-823d-c097f607ea70" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.5." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-23T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://github.com/ikus060/rdiffweb/commit/6afaae56a29536f0118b3380d296c416aa6d078d" }, { "url": "https://huntr.dev/bounties/339687af-6e25-4ad8-823d-c097f607ea70" } ], "source": { "advisory": "339687af-6e25-4ad8-823d-c097f607ea70", "discovery": "EXTERNAL" }, "title": "Open Redirect in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-4720", "datePublished": "2022-12-23T00:00:00", "dateReserved": "2022-12-23T00:00:00", "dateUpdated": "2024-08-03T01:48:40.269Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3295
Vulnerability from cvelistv5
Published
2022-09-26 12:20
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/202dd03a-3d97-4c64-bc73-1a0f36614233 | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:05.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/202dd03a-3d97-4c64-bc73-1a0f36614233" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.4.8." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-26T12:20:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/202dd03a-3d97-4c64-bc73-1a0f36614233" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3" } ], "source": { "advisory": "202dd03a-3d97-4c64-bc73-1a0f36614233", "discovery": "EXTERNAL" }, "title": "Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3295", "STATE": "PUBLIC", "TITLE": "Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.8" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.4.8." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-770 Allocation of Resources Without Limits or Throttling" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/202dd03a-3d97-4c64-bc73-1a0f36614233", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/202dd03a-3d97-4c64-bc73-1a0f36614233" }, { "name": "https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3" } ] }, "source": { "advisory": "202dd03a-3d97-4c64-bc73-1a0f36614233", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3295", "datePublished": "2022-09-26T12:20:10", "dateReserved": "2022-09-24T00:00:00", "dateUpdated": "2024-08-03T01:07:05.902Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3301
Vulnerability from cvelistv5
Published
2022-09-26 11:10
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Improper Cleanup on Thrown Exception in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/d3bf1e5d-055a-44b8-8d60-54ab966ed63a | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/5ac38b2a75becbab9f948bd5e37ecbcd9f0b362e | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/d3bf1e5d-055a-44b8-8d60-54ab966ed63a" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/5ac38b2a75becbab9f948bd5e37ecbcd9f0b362e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Cleanup on Thrown Exception in GitHub repository ikus060/rdiffweb prior to 2.4.8." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-460", "description": "CWE-460 Improper Cleanup on Thrown Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-26T11:10:09", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/d3bf1e5d-055a-44b8-8d60-54ab966ed63a" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/5ac38b2a75becbab9f948bd5e37ecbcd9f0b362e" } ], "source": { "advisory": "d3bf1e5d-055a-44b8-8d60-54ab966ed63a", "discovery": "EXTERNAL" }, "title": "Improper Cleanup on Thrown Exception in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3301", "STATE": "PUBLIC", "TITLE": "Improper Cleanup on Thrown Exception in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.8" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper Cleanup on Thrown Exception in GitHub repository ikus060/rdiffweb prior to 2.4.8." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-460 Improper Cleanup on Thrown Exception" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/d3bf1e5d-055a-44b8-8d60-54ab966ed63a", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/d3bf1e5d-055a-44b8-8d60-54ab966ed63a" }, { "name": "https://github.com/ikus060/rdiffweb/commit/5ac38b2a75becbab9f948bd5e37ecbcd9f0b362e", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/5ac38b2a75becbab9f948bd5e37ecbcd9f0b362e" } ] }, "source": { "advisory": "d3bf1e5d-055a-44b8-8d60-54ab966ed63a", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3301", "datePublished": "2022-09-26T11:10:09", "dateReserved": "2022-09-26T00:00:00", "dateUpdated": "2024-08-03T01:07:06.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3363
Vulnerability from cvelistv5
Published
2022-10-26 00:00
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Business Logic Errors in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/b8a40ba6-2452-4abe-a80a-2d065ee8891e" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/c27c46bac656b1da74f28eac1b52dfa5df76e6f2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.0a7", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.0a7." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-26T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/b8a40ba6-2452-4abe-a80a-2d065ee8891e" }, { "url": "https://github.com/ikus060/rdiffweb/commit/c27c46bac656b1da74f28eac1b52dfa5df76e6f2" } ], "source": { "advisory": "b8a40ba6-2452-4abe-a80a-2d065ee8891e", "discovery": "EXTERNAL" }, "title": "Business Logic Errors in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3363", "datePublished": "2022-10-26T00:00:00", "dateReserved": "2022-09-29T00:00:00", "dateUpdated": "2024-08-03T01:07:06.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3457
Vulnerability from cvelistv5
Published
2022-10-13 00:00
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Origin Validation Error in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.763Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/cfcab02e-d6ad-4dcf-b1b0-da90434bc55b" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/afc1bdfab5161c74012ff2590a6ec49cc0d8fde0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.0a5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Origin Validation Error in GitHub repository ikus060/rdiffweb prior to 2.5.0a5." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346 Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-13T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/cfcab02e-d6ad-4dcf-b1b0-da90434bc55b" }, { "url": "https://github.com/ikus060/rdiffweb/commit/afc1bdfab5161c74012ff2590a6ec49cc0d8fde0" } ], "source": { "advisory": "cfcab02e-d6ad-4dcf-b1b0-da90434bc55b", "discovery": "EXTERNAL" }, "title": "Origin Validation Error in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3457", "datePublished": "2022-10-13T00:00:00", "dateReserved": "2022-10-11T00:00:00", "dateUpdated": "2024-08-03T01:07:06.763Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3389
Vulnerability from cvelistv5
Published
2022-10-06 00:00
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Path Traversal in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.627Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/f7d2a6ab-2faf-4719-bdb6-e4e5d6065752" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/323383d1db656f1b1291be529947bd943a6b0e99" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Path Traversal in GitHub repository ikus060/rdiffweb prior to 2.4.10." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-06T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/f7d2a6ab-2faf-4719-bdb6-e4e5d6065752" }, { "url": "https://github.com/ikus060/rdiffweb/commit/323383d1db656f1b1291be529947bd943a6b0e99" } ], "source": { "advisory": "f7d2a6ab-2faf-4719-bdb6-e4e5d6065752", "discovery": "EXTERNAL" }, "title": "Path Traversal in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3389", "datePublished": "2022-10-06T00:00:00", "dateReserved": "2022-10-02T00:00:00", "dateUpdated": "2024-08-03T01:07:06.627Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3233
Vulnerability from cvelistv5
Published
2022-09-21 19:40
Modified
2024-08-03 01:00
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery (CSRF) in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/5ec206e0-eca0-4957-9af4-fdd9185d1db3 | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/18a5aabd48fa6d2d2771a25f95610c28a1a097ca | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:00:10.625Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/5ec206e0-eca0-4957-9af4-fdd9185d1db3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/18a5aabd48fa6d2d2771a25f95610c28a1a097ca" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.6." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-21T19:40:08", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/5ec206e0-eca0-4957-9af4-fdd9185d1db3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/18a5aabd48fa6d2d2771a25f95610c28a1a097ca" } ], "source": { "advisory": "5ec206e0-eca0-4957-9af4-fdd9185d1db3", "discovery": "EXTERNAL" }, "title": "Cross-Site Request Forgery (CSRF) in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3233", "STATE": "PUBLIC", "TITLE": "Cross-Site Request Forgery (CSRF) in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.6" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.6." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352 Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/5ec206e0-eca0-4957-9af4-fdd9185d1db3", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/5ec206e0-eca0-4957-9af4-fdd9185d1db3" }, { "name": "https://github.com/ikus060/rdiffweb/commit/18a5aabd48fa6d2d2771a25f95610c28a1a097ca", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/18a5aabd48fa6d2d2771a25f95610c28a1a097ca" } ] }, "source": { "advisory": "5ec206e0-eca0-4957-9af4-fdd9185d1db3", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3233", "datePublished": "2022-09-21T19:40:08", "dateReserved": "2022-09-16T00:00:00", "dateUpdated": "2024-08-03T01:00:10.625Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4721
Vulnerability from cvelistv5
Published
2022-12-23 00:00
Modified
2024-08-03 01:48
Severity ?
EPSS score ?
Summary
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:48:40.070Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/3c48ef5d-da4d-4ee4-aaca-af65e7273720" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/6afaae56a29536f0118b3380d296c416aa6d078d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository ikus060/rdiffweb prior to 2.5.5." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-75", "description": "CWE-75 Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-23T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/3c48ef5d-da4d-4ee4-aaca-af65e7273720" }, { "url": "https://github.com/ikus060/rdiffweb/commit/6afaae56a29536f0118b3380d296c416aa6d078d" } ], "source": { "advisory": "3c48ef5d-da4d-4ee4-aaca-af65e7273720", "discovery": "EXTERNAL" }, "title": "Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-4721", "datePublished": "2022-12-23T00:00:00", "dateReserved": "2022-12-23T00:00:00", "dateUpdated": "2024-08-03T01:48:40.070Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3273
Vulnerability from cvelistv5
Published
2022-10-06 00:00
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.202Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/a6df4bad-3382-4add-8918-760d885690f6" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/b5e3bb0a98268d18ceead36ab9b2b7eaacd659a8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.0a4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0a4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 3.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-06T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/a6df4bad-3382-4add-8918-760d885690f6" }, { "url": "https://github.com/ikus060/rdiffweb/commit/b5e3bb0a98268d18ceead36ab9b2b7eaacd659a8" } ], "source": { "advisory": "a6df4bad-3382-4add-8918-760d885690f6", "discovery": "EXTERNAL" }, "title": "Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3273", "datePublished": "2022-10-06T00:00:00", "dateReserved": "2022-09-22T00:00:00", "dateUpdated": "2024-08-03T01:07:06.202Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3292
Vulnerability from cvelistv5
Published
2022-09-28 20:15
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Use of Cache Containing Sensitive Information in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/e9309018-e94f-4e15-b7d1-5d38b6021c5d | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/2406780831618405a13113377a784f3102465f40 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.509Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/e9309018-e94f-4e15-b7d1-5d38b6021c5d" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/2406780831618405a13113377a784f3102465f40" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Use of Cache Containing Sensitive Information in GitHub repository ikus060/rdiffweb prior to 2.4.8." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-524", "description": "CWE-524 Use of Cache Containing Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-28T20:15:13", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/e9309018-e94f-4e15-b7d1-5d38b6021c5d" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/2406780831618405a13113377a784f3102465f40" } ], "source": { "advisory": "e9309018-e94f-4e15-b7d1-5d38b6021c5d", "discovery": "EXTERNAL" }, "title": "Use of Cache Containing Sensitive Information in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3292", "STATE": "PUBLIC", "TITLE": "Use of Cache Containing Sensitive Information in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.8" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use of Cache Containing Sensitive Information in GitHub repository ikus060/rdiffweb prior to 2.4.8." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-524 Use of Cache Containing Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/e9309018-e94f-4e15-b7d1-5d38b6021c5d", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/e9309018-e94f-4e15-b7d1-5d38b6021c5d" }, { "name": "https://github.com/ikus060/rdiffweb/commit/2406780831618405a13113377a784f3102465f40", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/2406780831618405a13113377a784f3102465f40" } ] }, "source": { "advisory": "e9309018-e94f-4e15-b7d1-5d38b6021c5d", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3292", "datePublished": "2022-09-28T20:15:13", "dateReserved": "2022-09-23T00:00:00", "dateUpdated": "2024-08-03T01:07:06.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4724
Vulnerability from cvelistv5
Published
2022-12-23 00:00
Modified
2024-08-03 01:48
Severity ?
EPSS score ?
Summary
Improper Access Control in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:48:40.367Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/e6fb1931-8d9c-4895-be4a-59839b4b6445" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/c4a19cf67d575c4886171b8efcbf4675d51f3929" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Access Control in GitHub repository ikus060/rdiffweb prior to 2.5.5." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-23T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/e6fb1931-8d9c-4895-be4a-59839b4b6445" }, { "url": "https://github.com/ikus060/rdiffweb/commit/c4a19cf67d575c4886171b8efcbf4675d51f3929" } ], "source": { "advisory": "e6fb1931-8d9c-4895-be4a-59839b4b6445", "discovery": "EXTERNAL" }, "title": "Improper Access Control in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-4724", "datePublished": "2022-12-23T00:00:00", "dateReserved": "2022-12-23T00:00:00", "dateUpdated": "2024-08-03T01:48:40.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3362
Vulnerability from cvelistv5
Published
2022-11-14 00:00
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Insufficient Session Expiration in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.645Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/ca428c31-858d-47fa-adc9-2a59f8e8b2b1" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/6efb995bc32c8a8e9ad755eb813dec991dffb2b8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient Session Expiration in GitHub repository ikus060/rdiffweb prior to 2.5.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613 Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/ca428c31-858d-47fa-adc9-2a59f8e8b2b1" }, { "url": "https://github.com/ikus060/rdiffweb/commit/6efb995bc32c8a8e9ad755eb813dec991dffb2b8" } ], "source": { "advisory": "ca428c31-858d-47fa-adc9-2a59f8e8b2b1", "discovery": "EXTERNAL" }, "title": "Insufficient Session Expiration in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3362", "datePublished": "2022-11-14T00:00:00", "dateReserved": "2022-09-29T00:00:00", "dateUpdated": "2024-08-03T01:07:06.645Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3439
Vulnerability from cvelistv5
Published
2022-10-14 00:00
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/b78ec09f4582e363f6f449df6f987127e126c311" }, { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/37b86c45-b240-4626-bd53-b6f02d10e0d7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://github.com/ikus060/rdiffweb/commit/b78ec09f4582e363f6f449df6f987127e126c311" }, { "url": "https://huntr.dev/bounties/37b86c45-b240-4626-bd53-b6f02d10e0d7" } ], "source": { "advisory": "37b86c45-b240-4626-bd53-b6f02d10e0d7", "discovery": "EXTERNAL" }, "title": "Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3439", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-10-10T00:00:00", "dateUpdated": "2024-08-03T01:07:06.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3174
Vulnerability from cvelistv5
Published
2022-09-13 09:20
Modified
2024-08-03 01:00
Severity ?
EPSS score ?
Summary
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/d8a32bd6-c76d-4140-a5ca-ef368a3058ce | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/f2de2371c5e13ce1c6fd6f9a1ed3e5d46b93cd7e | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:00:10.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/d8a32bd6-c76d-4140-a5ca-ef368a3058ce" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/f2de2371c5e13ce1c6fd6f9a1ed3e5d46b93cd7e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute in GitHub repository ikus060/rdiffweb prior to 2.4.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-614", "description": "CWE-614 Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-13T09:20:16", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/d8a32bd6-c76d-4140-a5ca-ef368a3058ce" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/f2de2371c5e13ce1c6fd6f9a1ed3e5d46b93cd7e" } ], "source": { "advisory": "d8a32bd6-c76d-4140-a5ca-ef368a3058ce", "discovery": "EXTERNAL" }, "title": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3174", "STATE": "PUBLIC", "TITLE": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.2" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute in GitHub repository ikus060/rdiffweb prior to 2.4.2." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-614 Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/d8a32bd6-c76d-4140-a5ca-ef368a3058ce", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/d8a32bd6-c76d-4140-a5ca-ef368a3058ce" }, { "name": "https://github.com/ikus060/rdiffweb/commit/f2de2371c5e13ce1c6fd6f9a1ed3e5d46b93cd7e", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/f2de2371c5e13ce1c6fd6f9a1ed3e5d46b93cd7e" } ] }, "source": { "advisory": "d8a32bd6-c76d-4140-a5ca-ef368a3058ce", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3174", "datePublished": "2022-09-13T09:20:16", "dateReserved": "2022-09-12T00:00:00", "dateUpdated": "2024-08-03T01:00:10.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3298
Vulnerability from cvelistv5
Published
2022-09-26 22:00
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/f9fedf94-41c9-49c4-8552-e407123a44e7 | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/626cca1b75b6c587afd4241a9692e8929b1921a5 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.531Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/f9fedf94-41c9-49c4-8552-e407123a44e7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/626cca1b75b6c587afd4241a9692e8929b1921a5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.4.8." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-26T22:00:14", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/f9fedf94-41c9-49c4-8552-e407123a44e7" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/626cca1b75b6c587afd4241a9692e8929b1921a5" } ], "source": { "advisory": "f9fedf94-41c9-49c4-8552-e407123a44e7", "discovery": "EXTERNAL" }, "title": "Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3298", "STATE": "PUBLIC", "TITLE": "Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.8" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.4.8." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-770 Allocation of Resources Without Limits or Throttling" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/f9fedf94-41c9-49c4-8552-e407123a44e7", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/f9fedf94-41c9-49c4-8552-e407123a44e7" }, { "name": "https://github.com/ikus060/rdiffweb/commit/626cca1b75b6c587afd4241a9692e8929b1921a5", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/626cca1b75b6c587afd4241a9692e8929b1921a5" } ] }, "source": { "advisory": "f9fedf94-41c9-49c4-8552-e407123a44e7", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3298", "datePublished": "2022-09-26T22:00:14", "dateReserved": "2022-09-25T00:00:00", "dateUpdated": "2024-08-03T01:07:06.531Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5289
Vulnerability from cvelistv5
Published
2023-09-29 13:59
Modified
2024-09-23 17:13
Severity ?
EPSS score ?
Summary
Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:52:08.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/8d0e0804-d3fd-49fe-bfa4-7a91135767ce" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/06f89b43469aae70e8833e55192721523f86c5a2" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5289", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:12:56.172904Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T17:13:06.116Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.8.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.8.4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-29T13:59:17.250Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/8d0e0804-d3fd-49fe-bfa4-7a91135767ce" }, { "url": "https://github.com/ikus060/rdiffweb/commit/06f89b43469aae70e8833e55192721523f86c5a2" } ], "source": { "advisory": "8d0e0804-d3fd-49fe-bfa4-7a91135767ce", "discovery": "EXTERNAL" }, "title": "Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-5289", "datePublished": "2023-09-29T13:59:17.250Z", "dateReserved": "2023-09-29T13:59:04.251Z", "dateUpdated": "2024-09-23T17:13:06.116Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4719
Vulnerability from cvelistv5
Published
2022-12-23 00:00
Modified
2024-08-03 01:48
Severity ?
EPSS score ?
Summary
Business Logic Errors in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:48:40.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/9f746881-ad42-446b-9b1d-153391eacc09" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/bc4bed89affcba71251fe54ed10639da9d392c1d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.5." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-23T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/9f746881-ad42-446b-9b1d-153391eacc09" }, { "url": "https://github.com/ikus060/rdiffweb/commit/bc4bed89affcba71251fe54ed10639da9d392c1d" } ], "source": { "advisory": "9f746881-ad42-446b-9b1d-153391eacc09", "discovery": "EXTERNAL" }, "title": "Business Logic Errors in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-4719", "datePublished": "2022-12-23T00:00:00", "dateReserved": "2022-12-23T00:00:00", "dateUpdated": "2024-08-03T01:48:40.024Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3221
Vulnerability from cvelistv5
Published
2022-09-15 08:45
Modified
2024-08-03 01:00
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery (CSRF) in ikus060/rdiffweb
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/1fa1aac9-b16a-4a70-a7da-960b3908ae1d | x_refsource_CONFIRM | |
https://github.com/ikus060/rdiffweb/commit/9125f5a2d918fed0f3fc1c86fa94cd1779ed9f73 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:00:10.668Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/1fa1aac9-b16a-4a70-a7da-960b3908ae1d" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/9125f5a2d918fed0f3fc1c86fa94cd1779ed9f73" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.4.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.3." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-15T08:45:19", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/1fa1aac9-b16a-4a70-a7da-960b3908ae1d" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ikus060/rdiffweb/commit/9125f5a2d918fed0f3fc1c86fa94cd1779ed9f73" } ], "source": { "advisory": "1fa1aac9-b16a-4a70-a7da-960b3908ae1d", "discovery": "EXTERNAL" }, "title": "Cross-Site Request Forgery (CSRF) in ikus060/rdiffweb", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3221", "STATE": "PUBLIC", "TITLE": "Cross-Site Request Forgery (CSRF) in ikus060/rdiffweb" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ikus060/rdiffweb", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.4.3" } ] } } ] }, "vendor_name": "ikus060" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.3." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352 Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/1fa1aac9-b16a-4a70-a7da-960b3908ae1d", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/1fa1aac9-b16a-4a70-a7da-960b3908ae1d" }, { "name": "https://github.com/ikus060/rdiffweb/commit/9125f5a2d918fed0f3fc1c86fa94cd1779ed9f73", "refsource": "MISC", "url": "https://github.com/ikus060/rdiffweb/commit/9125f5a2d918fed0f3fc1c86fa94cd1779ed9f73" } ] }, "source": { "advisory": "1fa1aac9-b16a-4a70-a7da-960b3908ae1d", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3221", "datePublished": "2022-09-15T08:45:19", "dateReserved": "2022-09-15T00:00:00", "dateUpdated": "2024-08-03T01:00:10.668Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4314
Vulnerability from cvelistv5
Published
2022-12-06 00:00
Modified
2024-08-03 01:34
Severity ?
EPSS score ?
Summary
Improper Privilege Management in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:34:50.146Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/b2dc504d-92ae-4221-a096-12ff223d95a8" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/b2df3679564d0daa2856213bb307d3e34bd89a25" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Privilege Management in GitHub repository ikus060/rdiffweb prior to 2.5.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-12T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/b2dc504d-92ae-4221-a096-12ff223d95a8" }, { "url": "https://github.com/ikus060/rdiffweb/commit/b2df3679564d0daa2856213bb307d3e34bd89a25" } ], "source": { "advisory": "b2dc504d-92ae-4221-a096-12ff223d95a8", "discovery": "EXTERNAL" }, "title": "Improper Privilege Management in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-4314", "datePublished": "2022-12-06T00:00:00", "dateReserved": "2022-12-06T00:00:00", "dateUpdated": "2024-08-03T01:34:50.146Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4644
Vulnerability from cvelistv5
Published
2022-12-22 00:00
Modified
2024-08-03 01:48
Severity ?
EPSS score ?
Summary
Open Redirect in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:48:39.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/77e5f425-c764-4cb0-936a-7a76bfcf19b0" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/5f861670ef8f38ca8eea52a98672d0e0fabb5368" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-22T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/77e5f425-c764-4cb0-936a-7a76bfcf19b0" }, { "url": "https://github.com/ikus060/rdiffweb/commit/5f861670ef8f38ca8eea52a98672d0e0fabb5368" } ], "source": { "advisory": "77e5f425-c764-4cb0-936a-7a76bfcf19b0", "discovery": "EXTERNAL" }, "title": "Open Redirect in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-4644", "datePublished": "2022-12-22T00:00:00", "dateReserved": "2022-12-22T00:00:00", "dateUpdated": "2024-08-03T01:48:39.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4018
Vulnerability from cvelistv5
Published
2022-11-16 00:00
Modified
2024-08-03 01:27
Severity ?
EPSS score ?
Summary
Missing Authentication for Critical Function in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:27:54.120Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/f2a32f2a9f3fb8be1a9432ac3d81d3aacdb13095" }, { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/5340c2f6-0252-40f6-8929-cca5d64958a5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.0a6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior to 2.5.0a6." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-16T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://github.com/ikus060/rdiffweb/commit/f2a32f2a9f3fb8be1a9432ac3d81d3aacdb13095" }, { "url": "https://huntr.dev/bounties/5340c2f6-0252-40f6-8929-cca5d64958a5" } ], "source": { "advisory": "5340c2f6-0252-40f6-8929-cca5d64958a5", "discovery": "EXTERNAL" }, "title": "Missing Authentication for Critical Function in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-4018", "datePublished": "2022-11-16T00:00:00", "dateReserved": "2022-11-16T00:00:00", "dateUpdated": "2024-08-03T01:27:54.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3376
Vulnerability from cvelistv5
Published
2022-10-06 00:00
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
Weak Password Requirements in ikus060/rdiffweb
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ikus060 | ikus060/rdiffweb |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.524Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/a9021e93-6d18-4ac1-98ce-550c4697a4ed" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ikus060/rdiffweb/commit/2ffc2af65c8f8113b06e0b89929c604bcdf844b9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ikus060/rdiffweb", "vendor": "ikus060", "versions": [ { "lessThan": "2.5.0a4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.5.0a4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-521", "description": "CWE-521 Weak Password Requirements", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-06T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/a9021e93-6d18-4ac1-98ce-550c4697a4ed" }, { "url": "https://github.com/ikus060/rdiffweb/commit/2ffc2af65c8f8113b06e0b89929c604bcdf844b9" } ], "source": { "advisory": "a9021e93-6d18-4ac1-98ce-550c4697a4ed", "discovery": "EXTERNAL" }, "title": "Weak Password Requirements in ikus060/rdiffweb" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3376", "datePublished": "2022-10-06T00:00:00", "dateReserved": "2022-09-30T00:00:00", "dateUpdated": "2024-08-03T01:07:06.524Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }