PT-2021-02: Encryption bypass when downloading a firmware update in Diebold-Nixdorf RM3/CRS
PT-2021-02: Encryption bypass when downloading a firmware update in Diebold-Nixdorf RM3/CRS RM3/CRS dispenser firmware (all versions up to and including 41128 1002 RM3_CRS.BTR + 170329 2332 RM3_CRS.FRM) Severity: Severity level: High Encryption bypass when downloading a firmware update in...
2.1AI Score
PT-2021-01: Encryption bypass when downloading a firmware update in Diebold-Nixdorf CMDv5
PT-2021-01: Encryption bypass when downloading a firmware update in Diebold-Nixdorf CMDv5 CMDv5 dispenser firmware (all versions up to and including 141128 1002 CD5_ATM.BTR + 170329 2332 CD5_ATM.FRM) Severity: Severity level: High Encryption bypass when downloading a firmware update in...
2.1AI Score
A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been declared as critical. This vulnerability affects unknown code of the file /protocol/iscuser/uploadiscuser.php of the component JSON Content Handler. The manipulation of the argument messagecontent leads to.....
CVE-2024-5589 Netentsec NS-ASG Application Security Gateway sql injection
A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been classified as critical. This affects an unknown part of the file /admin/config_MT.php?action=delete. The manipulation of the argument Mid leads to sql injection. It is possible to initiate the attack...
SQL Injection in Harbor scan log API
Impact A user with an administrator, project_admin, or project_maintainer role could utilize and exploit SQL Injection to allow the execution of any Postgres function or the extraction of sensitive information from the database through this API: GET...
Description Under OIDC authentication mode, there is a redirect_url parameter exposed in the URL which is used to redirect the current user to the defined location after the successful OIDC login, This redirect_url can be an ambiguous URL and can be used to embed a phishing URL. For example: if a.....
activeadmin vulnerable to stored persistent cross-site scripting (XSS) in dynamic form legends
Impact Users settings their active admin form legends dynamically may be vulnerable to stored XSS, as long as its value can be injected directly by a malicious user. For example: A public web application allows users to create entities with arbitrary names. Active Admin is used to administrate...
Password confirmation stored in plain text via registration form in statamic/cms
Users registering via the user:register_form tag will have their password confirmation stored in plain text in their user file. Impact This only affects sites matching all of the following conditions: - Running Statamic versions between 5.3.0 and 5.6.1. (This version range represents only one...
Unsafe Reflection in base Component class in yiisoft/yii2
Yii2 supports attaching Behaviors to Components by setting properties having the format 'as <behaviour-name>'. Internally this is done using the __set() magic method. If the value passed to this method is not an instance of the Behavior class, a new object is instantiated using...
path traversal vulnerability was identified in the parisneo/lollms-webui
A path traversal vulnerability was identified in the parisneo/lollms-webui repository, specifically within version 9.6. The vulnerability arises due to improper handling of user-supplied input in the 'list_personalities' endpoint. By crafting a malicious HTTP request, an attacker can traverse the.....
code injection vulnerability exists in the huggingface/text-generation-inference repository
A code injection vulnerability exists in the huggingface/text-generation-inference repository, specifically within the autodocs.yml workflow file. The vulnerability arises from the insecure handling of the github.head_ref user input, which is used to dynamically construct a command for installing.....
qdrant/qdrant version 1.9.0-dev is vulnerable to path traversal due to improper input validation in the /collections/{name}/snapshots/upload endpoint. By manipulating the name parameter through URL encoding, an attacker can upload a file to an arbitrary location on the system, such as...
Decompressors can crash the JVM and leak memory content in Aircompressor
Summary All decompressor implementations of Aircompressor (LZ4, LZO, Snappy, Zstandard) can crash the JVM for certain input, and in some cases also leak the content of other memory of the Java process (which could contain sensitive information). Details When decompressing certain data, the...
0.0004EPSS
ip SSRF improper categorization in isPublic
The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for...
Improper Handling of Insufficient Permissions in `wagtail.contrib.settings`
Impact Due to an improperly applied permission check in the wagtail.contrib.settings module, a user with access to the Wagtail admin and knowledge of the URL of the edit view for a settings model can access and update that setting, even when they have not been granted permission over the model....
Slack integration leaks sensitive information in logs
Impact Sentry's Slack integration incorrectly records the incoming request body in logs. This request data can contain sensitive information, including the deprecated Slack verification token. With this verification token, it is possible under specific configurations, an attacker can forge...
Sensitive Data Disclosure Vulnerability in Connection Configuration Endpoints
The Fides webserver has a number of endpoints that retrieve ConnectionConfiguration records and their associated secrets which can contain sensitive data (e.g. passwords, private keys, etc.). These secrets are stored encrypted at rest (in the application database), and the associated endpoints are....
Reflected Cross-site Scripting in yiisoft/yii2 Debug mode
During the internal penetration testing of our product based on Yii2, we discovered an XSS vulnerability within the framework itself. This issue is relevant for the latest version of Yii2 (2.0.49.3). Conditions for vulnerability reproduction The framework is in debug mode (YII_DEBUG set to true)......
GHSA-8R3F-844C-MC37 vulnerabilities
Vulnerabilities for packages: guac, fuse-overlayfs-snapshotter, goreleaser, melange, restic, tekton-chains, kyverno-policy-reporter, trust-manager, kine, prometheus-beat-exporter, slsa-verifier, kubernetes-csi-external-snapshotter, fulcio, kor, cfssl, external-dns, kuberay-operator,...
7.5AI Score
CVE-2023-45289 vulnerabilities
Vulnerabilities for packages: fuse-overlayfs-snapshotter, goreleaser, fq, go-licenses, bom, kyverno-policy-reporter, kine, prometheus-beat-exporter, slsa-verifier, kubernetes-csi-external-snapshotter, kor, cfssl, newrelic-prometheus-configurator, external-dns, govulncheck, kuberay-operator,...
6.5AI Score
0.0004EPSS
GHSA-RR6R-CFGF-GC6H vulnerabilities
Vulnerabilities for packages: fuse-overlayfs-snapshotter, goreleaser, fq, go-licenses, bom, kyverno-policy-reporter, kine, prometheus-beat-exporter, slsa-verifier, kubernetes-csi-external-snapshotter, kor, cfssl, newrelic-prometheus-configurator, external-dns, govulncheck, kuberay-operator,...
7.5AI Score
CVE-2023-45288 vulnerabilities
Vulnerabilities for packages: fuse-overlayfs-snapshotter, melange, fq, restic, harbor-scanner-trivy, tekton-chains, bom, nri-consul, trust-manager, prometheus-beat-exporter, fulcio, external-dns, terragrunt, tflint, flux, gh, gke-gcloud-auth-plugin, kubernetes-dashboard, keda, velero,...
7AI Score
0.0004EPSS
Vulnerabilities for packages: fuse-overlayfs-snapshotter, goreleaser, bom, trust-manager, kubernetes-csi-external-snapshotter, aactl, external-dns, flux, prometheus, dynamic-localpv-provisioner, gke-gcloud-auth-plugin, weaviate, kubernetes-dashboard, keda, aws-efs-csi-driver,...
6.5AI Score
0.001EPSS
CVE-2023-48795 vulnerabilities
Vulnerabilities for packages: goreleaser, melange, fq, tekton-chains, go-licenses, bom, kyverno-policy-reporter, slsa-verifier, fulcio, cfssl, external-dns, terragrunt, gitlab-kas, flux, crossplane, prometheus, dynamic-localpv-provisioner, weaviate, kubescape, sops, kubernetes-dashboard,...
7AI Score
0.962EPSS
CVE-2024-24786 vulnerabilities
Vulnerabilities for packages: guac, fuse-overlayfs-snapshotter, goreleaser, melange, restic, tekton-chains, kyverno-policy-reporter, trust-manager, kine, prometheus-beat-exporter, slsa-verifier, kubernetes-csi-external-snapshotter, fulcio, kor, cfssl, external-dns, kuberay-operator,...
6.7AI Score
0.0004EPSS
CVE-2024-24784 vulnerabilities
Vulnerabilities for packages: fuse-overlayfs-snapshotter, goreleaser, fq, go-licenses, bom, kyverno-policy-reporter, kine, prometheus-beat-exporter, slsa-verifier, kubernetes-csi-external-snapshotter, kor, cfssl, newrelic-prometheus-configurator, external-dns, govulncheck, kuberay-operator,...
6.5AI Score
0.0004EPSS
CVE-2023-39325 vulnerabilities
Vulnerabilities for packages: fuse-overlayfs-snapshotter, goreleaser, tekton-chains, go, bom, trust-manager, slsa-verifier, aactl, kubernetes-csi-external-snapshotter, external-dns, flux, prometheus, dynamic-localpv-provisioner, gke-gcloud-auth-plugin, weaviate, kubescape, kubernetes-dashboard,...
8.2AI Score
0.002EPSS
GHSA-9763-4F94-GFCH vulnerabilities
Vulnerabilities for packages: apko, actions-runner-controller, gitness, goreleaser, melange, pulumi-language-dotnet, kubevela, tekton-chains, policy-controller, vault, boring-registry, slsa-verifier, terragrunt, vexctl, wolfictl, argo-cd, crossplane, flux, rclone, zarf, pulumi-language-yaml,...
7.5AI Score
GHSA-3Q2C-PVP5-3CQP vulnerabilities
Vulnerabilities for packages: fuse-overlayfs-snapshotter, goreleaser, fq, go-licenses, bom, kyverno-policy-reporter, kine, prometheus-beat-exporter, slsa-verifier, kubernetes-csi-external-snapshotter, kor, cfssl, newrelic-prometheus-configurator, external-dns, govulncheck, kuberay-operator,...
7.5AI Score
GHSA-FGQ5-Q76C-GX78 vulnerabilities
Vulnerabilities for packages: fuse-overlayfs-snapshotter, goreleaser, fq, go-licenses, bom, kyverno-policy-reporter, kine, prometheus-beat-exporter, slsa-verifier, kubernetes-csi-external-snapshotter, kor, cfssl, newrelic-prometheus-configurator, external-dns, govulncheck, kuberay-operator,...
7.5AI Score
GHSA-J6M3-GC37-6R6Q vulnerabilities
Vulnerabilities for packages: fuse-overlayfs-snapshotter, goreleaser, fq, go-licenses, bom, kyverno-policy-reporter, kine, prometheus-beat-exporter, slsa-verifier, kubernetes-csi-external-snapshotter, kor, cfssl, newrelic-prometheus-configurator, external-dns, govulncheck, kuberay-operator,...
7.5AI Score
GHSA-4V7X-PQXF-CX7M vulnerabilities
Vulnerabilities for packages: fuse-overlayfs-snapshotter, melange, fq, restic, harbor-scanner-trivy, tekton-chains, bom, nri-consul, trust-manager, prometheus-beat-exporter, fulcio, external-dns, terragrunt, tflint, flux, gh, gke-gcloud-auth-plugin, kubernetes-dashboard, keda, velero,...
7.5AI Score
GHSA-2WRH-6PVC-2JM9 vulnerabilities
Vulnerabilities for packages: fuse-overlayfs-snapshotter, goreleaser, bom, trust-manager, kubernetes-csi-external-snapshotter, aactl, external-dns, flux, prometheus, dynamic-localpv-provisioner, gke-gcloud-auth-plugin, weaviate, kubernetes-dashboard, keda, aws-efs-csi-driver,...
7.5AI Score
GHSA-4374-P667-P6C8 vulnerabilities
Vulnerabilities for packages: fuse-overlayfs-snapshotter, goreleaser, tekton-chains, go, bom, trust-manager, slsa-verifier, aactl, kubernetes-csi-external-snapshotter, external-dns, flux, prometheus, dynamic-localpv-provisioner, gke-gcloud-auth-plugin, weaviate, kubescape, kubernetes-dashboard,...
7.5AI Score
GHSA-45X7-PX36-X8W8 vulnerabilities
Vulnerabilities for packages: goreleaser, melange, fq, tekton-chains, go-licenses, bom, kyverno-policy-reporter, slsa-verifier, fulcio, cfssl, external-dns, terragrunt, gitlab-kas, flux, crossplane, prometheus, dynamic-localpv-provisioner, weaviate, kubescape, sops, kubernetes-dashboard,...
7.5AI Score
CVE-2024-24783 vulnerabilities
Vulnerabilities for packages: fuse-overlayfs-snapshotter, goreleaser, fq, go-licenses, bom, kyverno-policy-reporter, kine, prometheus-beat-exporter, slsa-verifier, kubernetes-csi-external-snapshotter, kor, cfssl, newrelic-prometheus-configurator, external-dns, govulncheck, kuberay-operator,...
6.5AI Score
0.0004EPSS
CVE-2024-24785 vulnerabilities
Vulnerabilities for packages: fuse-overlayfs-snapshotter, goreleaser, fq, go-licenses, bom, kyverno-policy-reporter, kine, prometheus-beat-exporter, slsa-verifier, kubernetes-csi-external-snapshotter, kor, cfssl, newrelic-prometheus-configurator, external-dns, govulncheck, kuberay-operator,...
6.5AI Score
0.0004EPSS
GHSA-32CH-6X54-Q4H9 vulnerabilities
Vulnerabilities for packages: fuse-overlayfs-snapshotter, goreleaser, fq, go-licenses, bom, kyverno-policy-reporter, kine, prometheus-beat-exporter, slsa-verifier, kubernetes-csi-external-snapshotter, kor, cfssl, newrelic-prometheus-configurator, external-dns, govulncheck, kuberay-operator,...
7.5AI Score
CVE-2023-45290 vulnerabilities
Vulnerabilities for packages: fuse-overlayfs-snapshotter, goreleaser, fq, go-licenses, bom, kyverno-policy-reporter, kine, prometheus-beat-exporter, slsa-verifier, kubernetes-csi-external-snapshotter, kor, cfssl, newrelic-prometheus-configurator, external-dns, govulncheck, kuberay-operator,...
6.5AI Score
0.0004EPSS
6.4AI Score
0.019EPSS
camperusati.eu Cross Site Scripting vulnerability OBB-3932520
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...
6.2AI Score
agenziaideacasa.it Cross Site Scripting vulnerability OBB-3932516
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...
6.2AI Score
intermec.com.co Cross Site Scripting vulnerability OBB-3932515
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...
6.2AI Score
exellere.it Cross Site Scripting vulnerability OBB-3932513
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...
6.2AI Score
cfla-acfl.ca Cross Site Scripting vulnerability OBB-3932507
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...
6.2AI Score
In the Linux kernel, the following vulnerability has been resolved: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change While PLL CPUX clock rate change when CPU is running from it works in vast majority of cases, now and then it causes instability. This leads to system crashes and other.....
7.2AI Score
In the Linux kernel, the following vulnerability has been resolved: mm/userfaultfd: reset ptes when close() for wr-protected ones Userfaultfd unregister includes a step to remove wr-protect bits from all the relevant pgtable entries, but that only covered an explicit UFFDIO_UNREGISTER ioctl, not a....
7.2AI Score
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: qca: add missing firmware sanity checks Add the missing sanity checks when parsing the firmware files before downloading them to avoid accessing and corrupting memory beyond the vmalloced...
7.3AI Score
In the Linux kernel, the following vulnerability has been resolved: net: fix out-of-bounds access in ops_init net_alloc_generic is called by net_alloc, which is called without any locking. It reads max_gen_ptrs, which is changed under pernet_ops_rwsem. It is read twice, first to allocate an array,....
7.1AI Score
In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault() This was missed because of the function pointer indirection. nvidia_smmu_context_fault() is also installed as a irq function, and the 'void *' was changed to a...
7AI Score