Lucene search

K
Ipsilon ProjectIpsilon

5 matches found

CVE
CVE
added 2017/07/12 1:29 p.m.64 views

CVE-2016-8638

A vulnerability in ipsilon 2.0 before 2.0.2, 1.2 before 1.2.1, 1.1 before 1.1.2, and 1.0 before 1.0.3 was found that allows attacker to log out active sessions of other users. This issue is related to how it tracks sessions, and allows an unauthenticated attacker to view and terminate active sessio...

9.1CVSS8.8AI score0.07142EPSS
CVE
CVE
added 2020/02/17 7:15 p.m.49 views

CVE-2015-5215

The default configuration of the Jinja templating engine used in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not enable auto-escaping, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via template variables. NOTE: This may be a dupli...

6.1CVSS5.8AI score0.00419EPSS
CVE
CVE
added 2020/02/17 7:15 p.m.39 views

CVE-2015-5216

The Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly escape certain characters in a Python exception-message template, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via an HTTP response.

6.1CVSS5.8AI score0.00419EPSS
CVE
CVE
added 2015/11/17 3:59 p.m.39 views

CVE-2015-5217

providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.

4CVSS5.8AI score0.00388EPSS
CVE
CVE
added 2015/11/17 3:59 p.m.35 views

CVE-2015-5301

providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.2 and 1.1.x before 1.1.1 does not properly check permissions, which allows remote authenticated users to cause a denial of service by deleting a SAML2 Service Provider (SP).

5.5CVSS5.8AI score0.00718EPSS