Количество 14
Количество 14
GHSA-2g68-c3qc-8985
Werkzeug debugger vulnerable to remote execution when interacting with attacker controlled domain
CVE-2024-34069
Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.
CVE-2024-34069
Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.
CVE-2024-34069
Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.
CVE-2024-34069
Werkzeug's improper usage of a pathname and improper CSRF protection results in the remote command execution
CVE-2024-34069
Werkzeug is a comprehensive WSGI web application library. The debugger ...
SUSE-SU-2024:1624-2
Security update for python-Werkzeug
SUSE-SU-2024:1624-1
Security update for python-Werkzeug
SUSE-SU-2024:1608-1
Security update for python-Werkzeug
SUSE-SU-2024:1591-2
Security update for python-Werkzeug
SUSE-SU-2024:1591-1
Security update for python-Werkzeug
SUSE-SU-2024:1572-1
Security update for python-Werkzeug
BDU:2025-03918
Уязвимость библиотеки для разработки веб-приложений Werkzeug, связанная с подделкой межсайтовых запросов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
ROS-20240703-09
Множественные уязвимости python-werkzeug
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-2g68-c3qc-8985 Werkzeug debugger vulnerable to remote execution when interacting with attacker controlled domain | CVSS3: 7.5 | 40% Средний | больше 1 года назад | |
CVE-2024-34069 Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3. | CVSS3: 7.5 | 40% Средний | больше 1 года назад | |
CVE-2024-34069 Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3. | CVSS3: 7.5 | 40% Средний | больше 1 года назад | |
CVE-2024-34069 Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3. | CVSS3: 7.5 | 40% Средний | больше 1 года назад | |
CVE-2024-34069 Werkzeug's improper usage of a pathname and improper CSRF protection results in the remote command execution | CVSS3: 7.5 | 40% Средний | больше 1 года назад | |
CVE-2024-34069 Werkzeug is a comprehensive WSGI web application library. The debugger ... | CVSS3: 7.5 | 40% Средний | больше 1 года назад | |
SUSE-SU-2024:1624-2 Security update for python-Werkzeug | 40% Средний | больше 1 года назад | ||
SUSE-SU-2024:1624-1 Security update for python-Werkzeug | 40% Средний | больше 1 года назад | ||
SUSE-SU-2024:1608-1 Security update for python-Werkzeug | 40% Средний | больше 1 года назад | ||
SUSE-SU-2024:1591-2 Security update for python-Werkzeug | 40% Средний | больше 1 года назад | ||
SUSE-SU-2024:1591-1 Security update for python-Werkzeug | 40% Средний | больше 1 года назад | ||
SUSE-SU-2024:1572-1 Security update for python-Werkzeug | 40% Средний | больше 1 года назад | ||
BDU:2025-03918 Уязвимость библиотеки для разработки веб-приложений Werkzeug, связанная с подделкой межсайтовых запросов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 7.5 | 40% Средний | больше 1 года назад | |
ROS-20240703-09 Множественные уязвимости python-werkzeug | CVSS3: 7.5 | больше 1 года назад |
Уязвимостей на страницу