Количество 14
Количество 14
GHSA-2g68-c3qc-8985
Werkzeug debugger vulnerable to remote execution when interacting with attacker controlled domain

CVE-2024-34069
Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVE-2024-34069
Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVE-2024-34069
Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVE-2024-34069
CVE-2024-34069
Werkzeug is a comprehensive WSGI web application library. The debugger ...

SUSE-SU-2024:1624-2
Security update for python-Werkzeug

SUSE-SU-2024:1624-1
Security update for python-Werkzeug

SUSE-SU-2024:1608-1
Security update for python-Werkzeug

SUSE-SU-2024:1591-2
Security update for python-Werkzeug

SUSE-SU-2024:1591-1
Security update for python-Werkzeug

SUSE-SU-2024:1572-1
Security update for python-Werkzeug

BDU:2025-03918
Уязвимость библиотеки для разработки веб-приложений Werkzeug, связанная с подделкой межсайтовых запросов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

ROS-20240703-09
Множественные уязвимости python-werkzeug
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-2g68-c3qc-8985 Werkzeug debugger vulnerable to remote execution when interacting with attacker controlled domain | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2024-34069 Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-34069 Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-34069 Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
CVE-2024-34069 Werkzeug is a comprehensive WSGI web application library. The debugger ... | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:1624-2 Security update for python-Werkzeug | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1624-1 Security update for python-Werkzeug | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:1608-1 Security update for python-Werkzeug | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:1591-2 Security update for python-Werkzeug | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1591-1 Security update for python-Werkzeug | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:1572-1 Security update for python-Werkzeug | 0% Низкий | больше 1 года назад | |
![]() | BDU:2025-03918 Уязвимость библиотеки для разработки веб-приложений Werkzeug, связанная с подделкой межсайтовых запросов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
![]() | ROS-20240703-09 Множественные уязвимости python-werkzeug | CVSS3: 7.5 | около 1 года назад |
Уязвимостей на страницу