Show filters
19 Total Results
Displaying 1-10 of 19
Sort by:
Attacker Value
Unknown
CVE-2024-9301
Disclosure Date: September 27, 2024 (last updated October 08, 2024)
A path traversal issue in E2Nest prior to commit 8a41948e553c89c56b14410c6ed395e9cfb9250a
0
Attacker Value
Unknown
CVE-2024-7093
Disclosure Date: August 01, 2024 (last updated August 02, 2024)
Dispatch's notification service uses Jinja templates to generate messages to users. Jinja permits code execution within blocks, which were neither properly sanitized nor sandboxed. This vulnerability enables users to construct command line scripts in their custom message templates, which are then executed whenever these notifications are rendered and sent out.
0
Attacker Value
Unknown
CVE-2024-5023
Disclosure Date: May 16, 2024 (last updated May 17, 2024)
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Netflix ConsoleMe allows Command Injection.This issue affects ConsoleMe: before 1.4.0.
0
Attacker Value
Unknown
CVE-2024-4701
Disclosure Date: May 14, 2024 (last updated May 15, 2024)
A path traversal issue potentially leading to remote code execution in Genie for all versions prior to 4.3.18
0
Attacker Value
Unknown
CVE-2023-40171
Disclosure Date: August 17, 2023 (last updated October 08, 2023)
Dispatch is an open source security incident management tool. The server response includes the JWT Secret Key used for signing JWT tokens in error message when the `Dispatch Plugin - Basic Authentication Provider` plugin encounters an error when attempting to decode a JWT token. Any Dispatch users who own their instance and rely on the `Dispatch Plugin - Basic Authentication Provider` plugin for authentication may be impacted, allowing for any account to be taken over within their own instance. This could be done by using the secret to sign attacker crafted JWTs. If you think that you may be impacted, we strongly suggest you to rotate the secret stored in the `DISPATCH_JWT_SECRET` envvar in the `.env` file. This issue has been addressed in commit `b1942a4319` which has been included in the `20230817` release. users are advised to upgrade. There are no known workarounds for this vulnerability.
0
Attacker Value
Unknown
CVE-2023-30797
Disclosure Date: April 19, 2023 (last updated October 08, 2023)
Netflix Lemur before version 1.3.2 used insufficiently random values when generating default credentials. The insufficiently random values may allow an attacker to guess the credentials and gain access to resources managed by Lemur.
0
Attacker Value
Unknown
CVE-2022-4297
Disclosure Date: January 02, 2023 (last updated October 08, 2023)
The WP AutoComplete Search WordPress plugin through 1.0.4 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX available to unauthenticated users, leading to an unauthenticated SQL injection
0
Attacker Value
Unknown
CVE-2022-27177
Disclosure Date: April 01, 2022 (last updated February 23, 2025)
A Python format string issue leading to information disclosure and potentially remote code execution in ConsoleMe for all versions prior to 1.2.2
0
Attacker Value
Unknown
CVE-2021-28099
Disclosure Date: March 23, 2021 (last updated February 22, 2025)
In Netflix OSS Hollow, since the Files.exists(parent) is run before creating the directories, an attacker can pre-create these directories with wide permissions. Additionally, since an insecure source of randomness is used, the file names to be created can be deterministically calculated.
0
Attacker Value
Unknown
CVE-2021-28100
Disclosure Date: March 23, 2021 (last updated November 28, 2024)
Priam uses File.createTempFile, which gives the permissions on that file -rw-r--r--. An attacker with read access to the local filesystem can read anything written there by the Priam process.
0