Browse and filter security vulnerabilities across ecosystems
Browse and filter security vulnerabilities across ecosystems
Coturn: IPv4-mapped IPv6 (::ffff:0:0/96) bypasses denied-peer-ip ACL
An unintended proxy or intermediary in the AMD power management firmware (PMFW) could allow a privileged attacker to send malformed messages to the...
Improper Validation in Conduit-derived homeservers resulting in Unintended Proxy or Intermediary ('Confused Deputy')
Skipper Ingress Controller Allows Unauthorized Access to Internal Services via ExternalName
Nuvation Energy nCloud Client-to-Client Communication
Nuvation Energy Multi-Stack Controller Proxy service allows arbitrary BMS access
Gitea before 1
Conduit-derived homeservers are affected by a Confused Deputy and Improper Input Validation issue
Insights-runtimes-tech-preview/runtimes-inventory-rhel8-operator: improper proxy configuration allows unauthorized administrative commands
fastify-reply-from bypass of reply forwarding
Rack has Possible Information Disclosure Vulnerability
kro (Kube Resource Orchestrator) 0
code-server session cookie can be extracted by having user visit specially crafted proxy URL
Unintended proxy or intermediary ('Confused Deputy') issue exists in HMI ViewJet C-more series and HMI GC-A2 series, which may allow a remote unaut...
Misskey's Incomplete Patch of CVE-2024-52591 Leads to Forgery of Federated Notes
Unintended Proxy or Intermediary ('Confused Deputy') in GitLab
Mitmweb API Authentication Bypass Using Proxy Server
Server-side Request Forgery during remote file pull in Pterodactyl wings
Uncontrolled data used in content resolution
Metabase vulnerable to Remote Code Execution via H2
Showing 1 - 20 of 1,000+ results