Show filters
31 Total Results
Displaying 21-30 of 31
Sort by:
Attacker Value
Unknown
CVE-2021-23771
Disclosure Date: March 17, 2022 (last updated October 07, 2023)
This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. **Note:** This vulnerability derives from an incomplete fix in [SNYK-JS-NOTEVIL-608878](https://security.snyk.io/vuln/SNYK-JS-NOTEVIL-608878).
0
Attacker Value
Unknown
CVE-2021-24749
Disclosure Date: November 29, 2021 (last updated February 23, 2025)
The URL Shortify WordPress plugin before 1.5.1 does not have CSRF check in place when bulk-deleting links or groups, which could allow attackers to make a logged in admin delete arbitrary link and group via a CSRF attack.
0
Attacker Value
Unknown
CVE-2021-40839
Disclosure Date: September 10, 2021 (last updated February 23, 2025)
The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory.
0
Attacker Value
Unknown
CVE-2021-36770
Disclosure Date: August 11, 2021 (last updated February 23, 2025)
Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.
0
Attacker Value
Unknown
CVE-2020-25626
Disclosure Date: September 30, 2020 (last updated February 22, 2025)
A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability.
0
Attacker Value
Unknown
CVE-2020-7694
Disclosure Date: July 27, 2020 (last updated February 21, 2025)
This affects all versions of package uvicorn. The request logger provided by the package is vulnerable to ASNI escape sequence injection. Whenever any HTTP request is received, the default behaviour of uvicorn is to log its details to either the console or a log file. When attackers request crafted URLs with percent-encoded escape sequences, the logging component will log the URL after it's been processed with urllib.parse.unquote, therefore converting any percent-encoded characters into their single-character equivalent, which can have special meaning in terminal emulators. By requesting URLs with crafted paths, attackers can: * Pollute uvicorn's access logs, therefore jeopardising the integrity of such files. * Use ANSI sequence codes to attempt to interact with the terminal emulator that's displaying the logs (either in real time or from a file).
0
Attacker Value
Unknown
CVE-2020-7695
Disclosure Date: July 27, 2020 (last updated February 21, 2025)
Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.
0
Attacker Value
Unknown
CVE-2019-15833
Disclosure Date: August 30, 2019 (last updated November 27, 2024)
The simple-mail-address-encoder plugin before 1.7 for WordPress has reflected XSS.
0
Attacker Value
Unknown
CVE-2018-14944
Disclosure Date: August 05, 2018 (last updated November 27, 2024)
An issue has been found in jpeg_encoder through 2015-11-27. It is a SEGV in the function readFromBMP in jpeg_encoder.cpp. The signal is caused by an out-of-bounds write.
0
Attacker Value
Unknown
CVE-2018-14945
Disclosure Date: August 05, 2018 (last updated November 27, 2024)
An issue has been found in jpeg_encoder through 2015-11-27. It is a heap-based buffer overflow in the function readFromBMP in jpeg_encoder.cpp.
0