Wings is the server control plane for Pterodactyl Panel. This vulnerability impacts anyone running the affected versions of Wings. The vulnerability can potentially be used to access files and directories on the host system. The full scope of impact is exactly unknown, but reading files outside of a server's base directory (sandbox root) is possible. In order to use this exploit, an attacker must have an existing "server" allocated and controlled by Wings. Details on the exploitation of this vulnerability are embargoed until March 27th, 2024 at 18:00 UTC. In order to mitigate this vulnerability, a full rewrite of the entire server filesystem was necessary. Because of this, the size of the patch is massive, however effort was made to reduce the amount of breaking changes. Users are advised to update to version 1.11.9. There are no known workarounds for this vulnerability.
Max CVSS
9.9
EPSS Score
0.04%
Published
2024-03-13
Updated
2024-03-14
BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.
Max CVSS
8.7
EPSS Score
0.07%
Published
2024-01-31
Updated
2024-02-09
OpenPMIx PMIx before 4.2.6 and 5.0.x before 5.0.1 allows attackers to obtain ownership of arbitrary files via a race condition during execution of library code with UID 0.
Max CVSS
8.1
EPSS Score
0.14%
Published
2023-09-09
Updated
2024-01-09
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.46%
Published
2023-10-10
Updated
2023-10-12
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.46%
Published
2023-10-10
Updated
2023-10-12
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.46%
Published
2023-10-10
Updated
2023-10-12
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.46%
Published
2023-10-10
Updated
2023-10-12
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.46%
Published
2023-10-10
Updated
2023-10-12
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.46%
Published
2023-10-10
Updated
2023-10-12
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.46%
Published
2023-10-10
Updated
2023-10-12
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.46%
Published
2023-10-10
Updated
2023-10-12
In multiple functions of MetaDataBase.cpp, there is a possible UAF write due to a race condition. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Max CVSS
8.1
EPSS Score
0.09%
Published
2023-12-04
Updated
2024-02-02
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.46%
Published
2023-10-10
Updated
2023-10-12
ASP.NET and Visual Studio Security Feature Bypass Vulnerability
Max CVSS
8.1
EPSS Score
0.09%
Published
2023-07-11
Updated
2023-07-31
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_LOGOFF and SMB2_CLOSE commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
Max CVSS
8.1
EPSS Score
0.24%
Published
2023-07-24
Updated
2023-11-17
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP and SMB2_LOGOFF commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
Max CVSS
8.1
EPSS Score
0.52%
Published
2023-07-24
Updated
2023-12-22
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
Max CVSS
9.8
EPSS Score
0.24%
Published
2023-07-10
Updated
2023-07-17
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
Max CVSS
9.0
EPSS Score
0.24%
Published
2023-07-10
Updated
2023-07-17
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.94%
Published
2023-05-09
Updated
2023-05-15
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.60%
Published
2023-03-14
Updated
2023-03-23
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.93%
Published
2023-04-27
Updated
2023-05-09
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.52%
Published
2023-01-10
Updated
2023-04-27
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.52%
Published
2023-01-10
Updated
2023-04-27
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.96%
Published
2023-01-10
Updated
2023-04-27
A race condition in System Management Mode (SMM) code may allow an attacker using a compromised user space to leverage CVE-2018-8897 potentially resulting in privilege escalation.
Max CVSS
8.1
EPSS Score
0.09%
Published
2023-11-14
Updated
2023-11-28
225 vulnerabilities found
1 2 3 4 5 6 7 8 9
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!