Show filters
42 Total Results
Displaying 21-30 of 42
Sort by:
Attacker Value
Unknown
CVE-2022-31504
Disclosure Date: July 11, 2022 (last updated October 07, 2023)
The ChangeWeDer/BaiduWenkuSpider_flaskWeb repository before 2021-11-29 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
0
Attacker Value
Unknown
CVE-2022-24880
Disclosure Date: April 25, 2022 (last updated October 07, 2023)
flask-session-captcha is a package which allows users to extend Flask by adding an image based captcha stored in a server side session. In versions prior to 1.2.1, he `captcha.validate()` function would return `None` if passed no value (e.g. by submitting an having an empty form). If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed. Version 1.2.1 fixes the issue. Users can workaround the issue by not explicitly checking that the value is False. Checking the return value less explicitly should still work.
0
Attacker Value
Unknown
CVE-2022-24776
Disclosure Date: March 24, 2022 (last updated October 07, 2023)
Flask-AppBuilder is an application development framework, built on top of the Flask web framework. Flask-AppBuilder contains an open redirect vulnerability when using database authentication login page on versions below 3.4.5. This issue is fixed in version 3.4.5. There are currently no known workarounds.
0
Attacker Value
Unknown
CVE-2022-21659
Disclosure Date: January 31, 2022 (last updated October 07, 2023)
Flask-AppBuilder is an application development framework, built on top of the Flask web framework. In affected versions there exists a user enumeration vulnerability. This vulnerability allows for a non authenticated user to enumerate existing accounts by timing the response time from the server when you are logging in. Users are advised to upgrade to version 3.4.4 as soon as possible. There are no known workarounds for this issue.
0
Attacker Value
Unknown
CVE-2021-41265
Disclosure Date: December 09, 2021 (last updated February 23, 2025)
Flask-AppBuilder is a development framework built on top of Flask. Verions prior to 3.3.4 contain an improper authentication vulnerability in the REST API. The issue allows for a malicious actor with a carefully crafted request to successfully authenticate and gain access to existing protected REST API endpoints. This only affects non database authentication types and new REST API endpoints. Users should upgrade to Flask-AppBuilder 3.3.4 to receive a patch.
0
Attacker Value
Unknown
CVE-2021-32838
Disclosure Date: September 20, 2021 (last updated February 23, 2025)
Flask-RESTX (pypi package flask-restx) is a community driven fork of Flask-RESTPlus. Flask-RESTX before version 0.5.1 is vulnerable to ReDoS (Regular Expression Denial of Service) in email_regex. This is fixed in version 0.5.1.
0
Attacker Value
Unknown
CVE-2021-32805
Disclosure Date: September 08, 2021 (last updated February 23, 2025)
Flask-AppBuilder is an application development framework, built on top of Flask. In affected versions if using Flask-AppBuilder OAuth, an attacker can share a carefully crafted URL with a trusted domain for an application built with Flask-AppBuilder, this URL can redirect a user to a malicious site. This is an open redirect vulnerability. To resolve this issue upgrade to Flask-AppBuilder 3.2.2 or above. If upgrading is infeasible users may filter HTTP traffic containing `?next={next-site}` where the `next-site` domain is different from the application you are protecting as a workaround.
0
Attacker Value
Unknown
CVE-2020-18701
Disclosure Date: August 16, 2021 (last updated February 23, 2025)
Incorrect Access Control in Lin-CMS-Flask v0.1.1 allows remote attackers to obtain sensitive information and/or gain privileges due to the application not invalidating a user's authentication token upon logout, which allows for replaying packets.
0
Attacker Value
Unknown
CVE-2020-18699
Disclosure Date: August 16, 2021 (last updated February 23, 2025)
Cross Site Scripting (XSS) in Lin-CMS-Flask v0.1.1 allows remote attackers to execute arbitrary code by entering scripts in the the 'Username' parameter of the in component 'app/api/cms/user.py'.
0
Attacker Value
Unknown
CVE-2020-18698
Disclosure Date: August 16, 2021 (last updated February 23, 2025)
Improper Authentication in Lin-CMS-Flask v0.1.1 allows remote attackers to launch brute force login attempts without restriction via the 'login' function in the component 'app/api/cms/user.py'.
0