Логотип exploitDog
bind:"GHSA-2g68-c3qc-8985" OR bind:"CVE-2024-34069"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-2g68-c3qc-8985" OR bind:"CVE-2024-34069"

Количество 14

Количество 14

github логотип

GHSA-2g68-c3qc-8985

около 1 года назад

Werkzeug debugger vulnerable to remote execution when interacting with attacker controlled domain

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2024-34069

около 1 года назад

Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2024-34069

около 1 года назад

Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2024-34069

около 1 года назад

Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2024-34069

около 1 года назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2024-34069

около 1 года назад

Werkzeug is a comprehensive WSGI web application library. The debugger ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1624-2

около 1 года назад

Security update for python-Werkzeug

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1624-1

около 1 года назад

Security update for python-Werkzeug

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1608-1

около 1 года назад

Security update for python-Werkzeug

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1591-2

около 1 года назад

Security update for python-Werkzeug

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1591-1

около 1 года назад

Security update for python-Werkzeug

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1572-1

около 1 года назад

Security update for python-Werkzeug

EPSS: Низкий
fstec логотип

BDU:2025-03918

около 1 года назад

Уязвимость библиотеки для разработки веб-приложений Werkzeug, связанная с подделкой межсайтовых запросов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20240703-09

12 месяцев назад

Множественные уязвимости python-werkzeug

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-2g68-c3qc-8985

Werkzeug debugger vulnerable to remote execution when interacting with attacker controlled domain

CVSS3: 7.5
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-34069

Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVSS3: 7.5
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-34069

Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVSS3: 7.5
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-34069

Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVSS3: 7.5
0%
Низкий
около 1 года назад
msrc логотип
CVSS3: 7.5
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-34069

Werkzeug is a comprehensive WSGI web application library. The debugger ...

CVSS3: 7.5
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1624-2

Security update for python-Werkzeug

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1624-1

Security update for python-Werkzeug

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1608-1

Security update for python-Werkzeug

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1591-2

Security update for python-Werkzeug

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1591-1

Security update for python-Werkzeug

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1572-1

Security update for python-Werkzeug

0%
Низкий
около 1 года назад
fstec логотип
BDU:2025-03918

Уязвимость библиотеки для разработки веб-приложений Werkzeug, связанная с подделкой межсайтовых запросов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
около 1 года назад
redos логотип
ROS-20240703-09

Множественные уязвимости python-werkzeug

CVSS3: 7.5
12 месяцев назад

Уязвимостей на страницу