Количество 14
Количество 14

CVE-2024-34069
Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVE-2024-34069
Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVE-2024-34069
Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVE-2024-34069
CVE-2024-34069
Werkzeug is a comprehensive WSGI web application library. The debugger ...

SUSE-SU-2024:1624-2
Security update for python-Werkzeug

SUSE-SU-2024:1624-1
Security update for python-Werkzeug

SUSE-SU-2024:1608-1
Security update for python-Werkzeug

SUSE-SU-2024:1591-2
Security update for python-Werkzeug

SUSE-SU-2024:1591-1
Security update for python-Werkzeug

SUSE-SU-2024:1572-1
Security update for python-Werkzeug
GHSA-2g68-c3qc-8985
Werkzeug debugger vulnerable to remote execution when interacting with attacker controlled domain

BDU:2025-03918
Уязвимость библиотеки для разработки веб-приложений Werkzeug, связанная с подделкой межсайтовых запросов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

ROS-20240703-09
Множественные уязвимости python-werkzeug
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-34069 Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3. | CVSS3: 7.5 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-34069 Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3. | CVSS3: 7.5 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-34069 Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3. | CVSS3: 7.5 | 0% Низкий | около 1 года назад |
![]() | CVSS3: 7.5 | 0% Низкий | около 1 года назад | |
CVE-2024-34069 Werkzeug is a comprehensive WSGI web application library. The debugger ... | CVSS3: 7.5 | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1624-2 Security update for python-Werkzeug | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1624-1 Security update for python-Werkzeug | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1608-1 Security update for python-Werkzeug | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1591-2 Security update for python-Werkzeug | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1591-1 Security update for python-Werkzeug | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1572-1 Security update for python-Werkzeug | 0% Низкий | около 1 года назад | |
GHSA-2g68-c3qc-8985 Werkzeug debugger vulnerable to remote execution when interacting with attacker controlled domain | CVSS3: 7.5 | 0% Низкий | около 1 года назад | |
![]() | BDU:2025-03918 Уязвимость библиотеки для разработки веб-приложений Werkzeug, связанная с подделкой межсайтовых запросов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | около 1 года назад |
![]() | ROS-20240703-09 Множественные уязвимости python-werkzeug | CVSS3: 7.5 | 12 месяцев назад |
Уязвимостей на страницу