CVE-2024-49767
- EPSS 0.87%
- Veröffentlicht 25.10.2024 20:15:04
- Zuletzt bearbeitet 03.01.2025 12:15:26
Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) a...
CVE-2024-34069
- EPSS 0.21%
- Veröffentlicht 06.05.2024 15:15:23
- Zuletzt bearbeitet 21.02.2025 18:15:16
Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to intera...
CVE-2023-46136
- EPSS 0.41%
- Veröffentlicht 25.10.2023 18:17:36
- Zuletzt bearbeitet 21.11.2024 08:27:57
Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and ...
CVE-2023-23934
- EPSS 0.24%
- Veröffentlicht 14.02.2023 20:15:17
- Zuletzt bearbeitet 21.11.2024 07:47:07
Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a...
CVE-2023-25577
- EPSS 0.33%
- Veröffentlicht 14.02.2023 20:15:17
- Zuletzt bearbeitet 21.11.2024 07:49:45
Werkzeug is a comprehensive WSGI web application library. Prior to version 2.2.3, Werkzeug's multipart form data parser will parse an unlimited number of parts, including file parts. Parts can be a small amount of bytes, but each requires CPU time to...
CVE-2022-29361
- EPSS 29.88%
- Veröffentlicht 25.05.2022 01:15:07
- Zuletzt bearbeitet 21.11.2024 06:58:58
Improper parsing of HTTP requests in Pallets Werkzeug v2.1.0 and below allows attackers to perform HTTP Request Smuggling using a crafted HTTP request with multiple requests included inside the body. NOTE: the vendor's position is that this behavior ...
CVE-2020-28724
- EPSS 0.92%
- Veröffentlicht 18.11.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:23:09
Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL.
CVE-2019-14806
- EPSS 0.22%
- Veröffentlicht 09.08.2019 15:15:12
- Zuletzt bearbeitet 21.11.2024 04:27:23
Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id.
CVE-2019-14322
- EPSS 90.06%
- Veröffentlicht 28.07.2019 13:15:10
- Zuletzt bearbeitet 21.11.2024 04:26:29
In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames.
CVE-2016-10516
- EPSS 0.31%
- Veröffentlicht 23.10.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger in Pallets Werkzeug before 0.11.11 (as used in Pallets Flask and other products) allows remote attackers to inject arbitrary web script or HTML v...