Search Results (23077 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-29405 3 Fedoraproject, Golang, Redhat 5 Fedora, Go, Ceph Storage and 2 more 2025-01-06 9.8 Critical
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.
CVE-2023-29404 3 Fedoraproject, Golang, Redhat 5 Fedora, Go, Ceph Storage and 2 more 2025-01-06 9.8 Critical
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.
CVE-2023-29401 2 Gin-gonic, Redhat 4 Gin, Migration Toolkit Virtualization, Openshift and 1 more 2025-01-06 4.3 Medium
The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of "setup.bat";x=.txt" will be sent as a file named "setup.bat". If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.
CVE-2023-2455 3 Fedoraproject, Postgresql, Redhat 9 Fedora, Postgresql, Enterprise Linux and 6 more 2025-01-06 5.4 Medium
Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy.
CVE-2023-2121 2 Hashicorp, Redhat 2 Vault, Openshift Data Foundation 2025-01-06 4.3 Medium
Vault and Vault Enterprise's (Vault) key-value v2 (kv-v2) diff viewer allowed HTML injection into the Vault web UI through key values. This vulnerability, CVE-2023-2121, is fixed in Vault 1.14.0, 1.13.3, 1.12.7, and 1.11.11.
CVE-2024-26929 1 Redhat 2 Enterprise Linux, Rhel Eus 2025-01-06 5.5 Medium
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2023-5528 4 Fedoraproject, Kubernetes, Microsoft and 1 more 4 Fedora, Kubernetes, Windows and 1 more 2025-01-03 7.2 High
A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.
CVE-2024-45815 2 Linuxfoundation, Redhat 2 Backstage, Rhdh 2025-01-03 6.5 Medium
Backstage is an open framework for building developer portals. A malicious actor with authenticated access to a Backstage instance with the catalog backend plugin installed is able to interrupt the service using a specially crafted query to the catalog API. This has been fixed in the `1.26.0` release of the `@backstage/plugin-catalog-backend`. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-45816 2 Linuxfoundation, Redhat 2 Backstage, Rhdh 2025-01-03 6.5 Medium
Backstage is an open framework for building developer portals. When using the AWS S3 or GCS storage provider for TechDocs it is possible to access content in the entire storage bucket. This can leak contents of the bucket that are not intended to be accessible, as well as bypass permission checks in Backstage. This has been fixed in the 1.10.13 release of the `@backstage/plugin-techdocs-backend` package. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-46976 2 Linuxfoundation, Redhat 2 Backstage, Rhdh 2025-01-03 6.5 Medium
Backstage is an open framework for building developer portals. An attacker with control of the contents of the TechDocs storage buckets is able to inject executable scripts in the TechDocs content that will be executed in the victim's browser when browsing documentation or navigating to an attacker provided link. This has been fixed in the 1.10.13 release of the `@backstage/plugin-techdocs-backend` package. users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-12798 1 Redhat 1 Apache Camel Spring Boot 2025-01-03 5.5 Medium
ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.
CVE-2024-49767 2 Palletsprojects, Redhat 3 Quart, Werkzeug, Openshift Ai 2025-01-03 7.5 High
Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.
CVE-2017-18017 9 Arista, Canonical, Debian and 6 more 33 Eos, Ubuntu Linux, Debian Linux and 30 more 2025-01-03 9.8 Critical
The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.
CVE-2022-38023 5 Fedoraproject, Microsoft, Netapp and 2 more 15 Fedora, Windows Server 2008, Windows Server 2012 and 12 more 2025-01-02 8.1 High
Netlogon RPC Elevation of Privilege Vulnerability
CVE-2022-29145 3 Fedoraproject, Microsoft, Redhat 7 Fedora, .net, .net Core and 4 more 2025-01-02 7.5 High
.NET and Visual Studio Denial of Service Vulnerability
CVE-2022-29117 3 Fedoraproject, Microsoft, Redhat 7 Fedora, .net, .net Core and 4 more 2025-01-02 7.5 High
.NET and Visual Studio Denial of Service Vulnerability
CVE-2022-23267 3 Fedoraproject, Microsoft, Redhat 8 Fedora, .net, .net Core and 5 more 2025-01-02 7.5 High
.NET and Visual Studio Denial of Service Vulnerability
CVE-2022-21986 3 Fedoraproject, Microsoft, Redhat 6 Fedora, .net, Visual Studio 2019 and 3 more 2025-01-02 7.5 High
.NET Denial of Service Vulnerability
CVE-2023-35390 2 Microsoft, Redhat 5 .net, Visual Studio 2022, Enterprise Linux and 2 more 2025-01-01 7.8 High
.NET and Visual Studio Remote Code Execution Vulnerability
CVE-2023-33170 3 Fedoraproject, Microsoft, Redhat 6 Fedora, .net, Visual Studio 2022 and 3 more 2025-01-01 8.1 High
ASP.NET and Visual Studio Security Feature Bypass Vulnerability