Show filters
81 Total Results
Displaying 21-30 of 81
Sort by:
Attacker Value
Unknown
CVE-2023-28443
Disclosure Date: March 24, 2023 (last updated October 08, 2023)
Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 9.23.3, the `directus_refresh_token` is not redacted properly from the log outputs and can be used to impersonate users without their permission. This issue is patched in version 9.23.3.
0
Attacker Value
Unknown
CVE-2023-27481
Disclosure Date: March 07, 2023 (last updated December 22, 2024)
Directus is a real-time API and App dashboard for managing SQL database content. In versions prior to 9.16.0 users with read access to the `password` field in `directus_users` can extract the argon2 password hashes by brute forcing the export functionality combined with a `_starts_with` filter. This allows the user to enumerate the password hashes. Accounts cannot be taken over unless the hashes can be reversed which is unlikely with current hardware. This problem has been patched by preventing any hashed/concealed field to be filtered against with the `_starts_with` or other string operator in version 9.16.0. Users are advised to upgrade. Users unable to upgrade may mitigate this issue by ensuring that no user has `read` access to the `password` field in `directus_users`.
0
Attacker Value
Unknown
CVE-2023-26492
Disclosure Date: March 03, 2023 (last updated October 08, 2023)
Directus is a real-time API and App dashboard for managing SQL database content. Directus is vulnerable to Server-Side Request Forgery (SSRF) when importing a file from a remote web server (POST to `/files/import`). An attacker can bypass the security controls by performing a DNS rebinding attack and view sensitive data from internal servers or perform a local port scan. An attacker can exploit this vulnerability to access highly sensitive internal server(s) and steal sensitive information. This issue was fixed in version 9.23.0.
0
Attacker Value
Unknown
CVE-2023-26314
Disclosure Date: February 22, 2023 (last updated October 08, 2023)
The mono package before 6.8.0.105+dfsg-3.3 for Debian allows arbitrary code execution because the application/x-ms-dos-executable MIME type is associated with an un-sandboxed Mono CLR interpreter.
0
Attacker Value
Unknown
CVE-2022-26969
Disclosure Date: December 26, 2022 (last updated October 08, 2023)
In Directus before 9.7.0, the default settings of CORS_ORIGIN and CORS_ENABLED are true.
0
Attacker Value
Unknown
CVE-2022-36031
Disclosure Date: August 19, 2022 (last updated October 08, 2023)
Directus is a free and open-source data platform for headless content management. The Directus process can be aborted by having an authorized user update the `filename_disk` value to a folder and accessing that file through the `/assets` endpoint. This vulnerability has been patched and release v9.15.0 contains the fix. Users are advised to upgrade. Users unable to upgrade may prevent this problem by making sure no (untrusted) non-admin users have permissions to update the `filename_disk` field on `directus_files`.
0
Attacker Value
Unknown
CVE-2022-36155
Disclosure Date: August 16, 2022 (last updated October 08, 2023)
tifig v0.2.2 was discovered to contain a resource allocation issue via operator new(unsigned long) at asan_new_delete.cpp.
0
Attacker Value
Unknown
CVE-2022-36153
Disclosure Date: August 16, 2022 (last updated October 08, 2023)
tifig v0.2.2 was discovered to contain a segmentation violation via std::vector<unsigned int, std::allocator<unsigned int> >::size() const at /bits/stl_vector.h.
0
Attacker Value
Unknown
CVE-2022-36152
Disclosure Date: August 16, 2022 (last updated October 08, 2023)
tifig v0.2.2 was discovered to contain a memory leak via operator new[](unsigned long) at /asan/asan_new_delete.cpp.
0
Attacker Value
Unknown
CVE-2022-36151
Disclosure Date: August 16, 2022 (last updated October 08, 2023)
tifig v0.2.2 was discovered to contain a segmentation violation via getType() at /common/bbox.cpp.
0