Show filters
92 Total Results
Displaying 11-20 of 92
Sort by:
Attacker Value
Unknown

CVE-2021-4315

Disclosure Date: January 28, 2023 (last updated February 24, 2025)
A vulnerability has been found in NYUCCL psiTurk up to 3.2.0 and classified as critical. This vulnerability affects unknown code of the file psiturk/experiment.py. The manipulation of the argument mode leads to improper neutralization of special elements used in a template engine. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2.1 is able to address this issue. The name of the patch is 47787e15cecd66f2aa87687bf852ae0194a4335f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-219676.
Attacker Value
Unknown

CVE-2022-27308

Disclosure Date: May 09, 2022 (last updated February 23, 2025)
A stored cross-site scripting (XSS) vulnerability in PHProjekt PhpSimplyGest v1.3.0 allows attackers to execute arbitrary web scripts or HTML via a project title.
Attacker Value
Unknown

CVE-2021-22817

Disclosure Date: February 09, 2022 (last updated February 23, 2025)
A CWE-276: Incorrect Default Permissions vulnerability exists that could cause unauthorized access to the base installation directory leading to local privilege escalation. Affected Product: Harmony/Magelis iPC Series (All Versions), Vijeo Designer (All Versions prior to V6.2 SP11 Multiple HotFix 4), Vijeo Designer Basic (All Versions prior to V1.2.1)
Attacker Value
Unknown

CVE-2021-3473

Disclosure Date: April 13, 2021 (last updated February 22, 2025)
An internal product security audit of Lenovo XClarity Controller (XCC) discovered that the XCC configuration backup/restore password may be written to an internal XCC log buffer if Lenovo XClarity Administrator (LXCA) is used to perform the backup/restore. The backup/restore password typically exists in this internal log buffer for less than 10 minutes before being overwritten. Generating an FFDC service log will include the log buffer contents, including the backup/restore password if present. The FFDC service log is only generated when requested by a privileged XCC user and it is only accessible to the privileged XCC user that requested the file. The backup/restore password is not captured if the backup/restore is initiated directly from XCC.
Attacker Value
Unknown

CVE-2020-15570

Disclosure Date: July 06, 2020 (last updated February 21, 2025)
The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denial of service via a malformed crash file.
Attacker Value
Unknown

CVE-2020-11937

Disclosure Date: June 11, 2020 (last updated February 21, 2025)
In whoopsie, parse_report() from whoopsie.c allows a local attacker to cause a denial of service via a crafted file. The DoS is caused by resource exhaustion due to a memory leak. Fixed in 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 and 0.2.69ubuntu0.1.
Attacker Value
Unknown

CVE-2020-12135

Disclosure Date: April 24, 2020 (last updated February 21, 2025)
bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.
Attacker Value
Unknown

CVE-2015-5215

Disclosure Date: February 17, 2020 (last updated February 21, 2025)
The default configuration of the Jinja templating engine used in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not enable auto-escaping, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via template variables. NOTE: This may be a duplicate of CVE-2015-5216. Moreover, the Jinja development team does not enable auto-escape by default for performance issues as explained in https://jinja.palletsprojects.com/en/master/faq/#why-is-autoescaping-not-the-default.
Attacker Value
Unknown

CVE-2015-5216

Disclosure Date: February 17, 2020 (last updated February 21, 2025)
The Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly escape certain characters in a Python exception-message template, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via an HTTP response.
Attacker Value
Unknown

CVE-2012-0945

Disclosure Date: January 15, 2020 (last updated February 21, 2025)
whoopsie-daisy before 0.1.26: Root user can remove arbitrary files