Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-21577

Description: ComfyUI-Ace-Nodes is vulnerable to Code Injection. The ACE_ExpressionEval node contains an eval() in its entrypoint function that accepts arbitrary user-controlled data. A user can create a workflow that results in executing arbitrary code on the server.

CVSS: CRITICAL (10.0)

EPSS Score: 0.04%

Source: CVE
December 14th, 2024 (5 months ago)

CVE-2024-21576

Description: ComfyUI-Bmad-Nodes is vulnerable to Code Injection. The issue stems from a validation bypass in the BuildColorRangeHSVAdvanced, FilterContour and FindContour custom nodes. In the entrypoint function to each node, there’s a call to eval which can be triggered by generating a workflow that injects a crafted string into the node. This can result in executing arbitrary code on the server.

CVSS: CRITICAL (10.0)

EPSS Score: 0.04%

Source: CVE
December 14th, 2024 (5 months ago)

CVE-2024-11986

Description: Improper input handling in the 'Host Header' allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application's standard functionality, it enables the execution of the payload, resulting in Stored XSS or 'Cross-Site Scripting'.

CVSS: CRITICAL (9.6)

EPSS Score: 0.04%

Source: CVE
December 14th, 2024 (5 months ago)

CVE-2024-55879

Description: XWiki Platform is a generic wiki platform. Starting in version 2.3 and prior to versions 15.10.9, 16.3.0, any user with script rights can perform arbitrary remote code execution by adding instances of `XWiki.ConfigurableClass` to any page. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.10.9 and 16.3.0. No known workarounds are available except upgrading.

CVSS: CRITICAL (9.1)

EPSS Score: 0.05%

Source: CVE
December 13th, 2024 (5 months ago)

CVE-2024-55877

Description: XWiki Platform is a generic wiki platform. Starting in version 9.7-rc-1 and prior to versions 15.10.11, 16.4.1, and 16.5.0, any user with an account can perform arbitrary remote code execution by adding instances of `XWiki.WikiMacroClass` to any page. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been fixed in XWiki 15.10.11, 16.4.1 and 16.5.0. It is possible to manually apply the patch to the page `XWiki.XWikiSyntaxMacrosList` as a workaround.

CVSS: CRITICAL (10.0)

EPSS Score: 0.05%

Source: CVE
December 13th, 2024 (5 months ago)

CVE-2024-55875

Description: http4k is a functional toolkit for Kotlin HTTP applications. Prior to version 5.41.0.0, there is a potential XXE (XML External Entity Injection) vulnerability when http4k handling malicious XML contents within requests, which might allow attackers to read local sensitive information on server, trigger Server-side Request Forgery and even execute code under some circumstances. Version 5.41.0.0 contains a patch for the issue.

CVSS: CRITICAL (9.8)

EPSS Score: 0.07%

Source: CVE
December 13th, 2024 (5 months ago)

CVE-2024-55662

Description: XWiki Platform is a generic wiki platform. Starting in version 3.3-milestone-1 and prior to versions 15.10.9 and 16.3.0, on instances where `Extension Repository Application` is installed, any user can execute any code requiring `programming` rights on the server. This vulnerability has been fixed in XWiki 15.10.9 and 16.3.0. Since `Extension Repository Application` is not mandatory, it can be safely disabled on instances that do not use it as a workaround. It is also possible to manually apply the patches from commit 8659f17d500522bf33595e402391592a35a162e8 to the page `ExtensionCode.ExtensionSheet` and to the page `ExtensionCode.ExtensionAuthorsDisplayer`.

CVSS: CRITICAL (10.0)

EPSS Score: 0.05%

Source: CVE
December 13th, 2024 (5 months ago)

CVE-2024-27304

Description: pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size.

CVSS: CRITICAL (9.8)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (5 months ago)

CVE-2024-21575

Description: ComfyUI-Impact-Pack is vulnerable to Path Traversal. The issue stems from missing validation of the `image.filename` field in a POST request sent to the `/upload/temp` endpoint added by the extension to the server. This results in writing arbitrary files to the file system which may, under some conditions, result in remote code execution (RCE).

CVSS: CRITICAL (9.2)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (5 months ago)

CVE-2024-21574

Description: The issue stems from a missing validation of the pip field in a POST request sent to the /customnode/install endpoint used to install custom nodes which is added to the server by the extension. This allows an attacker to craft a request that triggers a pip install on a user controlled package or URL, resulting in remote code execution (RCE) on the server.

CVSS: CRITICAL (10.0)

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (5 months ago)