Show filters
259 Total Results
Displaying 1-10 of 259
Sort by:
Attacker Value
Unknown

CVE-2022-41905

Disclosure Date: November 11, 2022 (last updated December 22, 2024)
WsgiDAV is a generic and extendable WebDAV server based on WSGI. Implementations using this library with directory browsing enabled may be susceptible to Cross Site Scripting (XSS) attacks. This issue has been patched, users can upgrade to version 4.1.0. As a workaround, set `dir_browser.enable = False` in the configuration.
Attacker Value
Unknown

CVE-2022-2255

Disclosure Date: August 25, 2022 (last updated October 08, 2023)
A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.
Attacker Value
Unknown

CVE-2014-0242

Disclosure Date: December 09, 2019 (last updated November 27, 2024)
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
Attacker Value
Unknown

CVE-2018-11553

Disclosure Date: June 06, 2018 (last updated November 26, 2024)
SGIN.CN xiangyun platform V9.4.10 has XSS via the login_url parameter to /login.php.
0
Attacker Value
Unknown

CVE-2012-2150

Disclosure Date: August 25, 2015 (last updated October 05, 2023)
xfs_metadump in xfsprogs before 3.2.4 does not properly obfuscate file data, which allows remote attackers to obtain sensitive information by reading a generated image.
0
Attacker Value
Unknown

CVE-2014-8583

Disclosure Date: December 16, 2014 (last updated October 05, 2023)
mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.
0
Attacker Value
Unknown

CVE-2014-0240

Disclosure Date: May 27, 2014 (last updated October 05, 2023)
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
0
Attacker Value
Unknown

CVE-2012-5530

Disclosure Date: November 29, 2012 (last updated October 05, 2023)
The (1) pcmd and (2) pmlogger init scripts in Performance Co-Pilot (PCP) before 3.6.10 allow local users to overwrite arbitrary files via a symlink attack on a /var/tmp/##### temporary file.
0
Attacker Value
Unknown

CVE-2012-3421

Disclosure Date: August 27, 2012 (last updated October 05, 2023)
The pduread function in pdu.c in libpcp in Performance Co-Pilot (PCP) before 3.6.5 does not properly time out connections, which allows remote attackers to cause a denial of service (pmcd hang) by sending individual bytes of a PDU separately, related to an "event-driven programming flaw."
0
Attacker Value
Unknown

CVE-2012-3419

Disclosure Date: August 27, 2012 (last updated October 05, 2023)
Performance Co-Pilot (PCP) before 3.6.5 exports some of the /proc file system, which allows attackers to obtain sensitive information such as proc/pid/maps and command line arguments.
0