Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown
CVE-2024-5436
Disclosure Date: May 31, 2024 (last updated May 31, 2024)
Type confusion in Snapchat LensCore could lead to denial of service or arbitrary code execution prior to version 12.88. We recommend upgrading to version 12.88 or above.
0
Attacker Value
Unknown
CVE-2024-29890
Disclosure Date: March 29, 2024 (last updated January 05, 2025)
DataLens is a business intelligence and data visualization system. A specifically crafted request allowed the creation of a special chart type with the ability to pass custom javascript code that would later be executed in an unprotected sandbox on subsequent requests to that chart. The problem was fixed in the datalens-ui version `0.1449.0`. Restricting access to the API for creating or modifying charts (`/charts/api/charts/v1/`) would mitigate the issue.
0
Attacker Value
Unknown
CVE-2023-4468
Disclosure Date: December 29, 2023 (last updated January 09, 2024)
A vulnerability was found in Poly Trio 8500, Trio 8800 and Trio C60. It has been classified as problematic. This affects an unknown part of the component Poly Lens Management Cloud Registration. The manipulation leads to missing authorization. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The identifier VDB-249261 was assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2023-46944
Disclosure Date: November 28, 2023 (last updated December 05, 2023)
An issue in GitKraken GitLens before v.14.0.0 allows an attacker to execute arbitrary code via a crafted file to the Visual Studio Codes workspace trust component.
0
Attacker Value
Unknown
CVE-2023-26106
Disclosure Date: March 06, 2023 (last updated November 08, 2023)
All versions of the package dot-lens are vulnerable to Prototype Pollution via the set() function in index.js file.
0
Attacker Value
Unknown
CVE-2022-0484
Disclosure Date: February 03, 2022 (last updated February 23, 2025)
Lack of validation of URLs causes Mirantis Container Cloud Lens Extension before v3.1.1 to open external programs other than the default browser to perform sign on to a new cluster. An attacker could host a webserver which serves a malicious Mirantis Container Cloud configuration file and induce the victim to add a new cluster via its URL. This issue affects: Mirantis Mirantis Container Cloud Lens Extension v3 versions prior to v3.1.1.
0
Attacker Value
Unknown
CVE-2021-44458
Disclosure Date: January 10, 2022 (last updated February 23, 2025)
Linux users running Lens 5.2.6 and earlier could be compromised by visiting a malicious website. The malicious website could make websocket connections from the victim's browser to Lens and so operate the local terminal feature. This would allow the attacker to execute arbitrary commands as the Lens user.
0
Attacker Value
Unknown
CVE-2021-23154
Disclosure Date: January 10, 2022 (last updated February 23, 2025)
In Lens prior to 5.3.4, custom helm chart configuration creates helm commands from string concatenation of provided arguments which are then executed in the user's shell. Arguments can be provided which cause arbitrary shell commands to run on the system.
0