Jinja sandbox breakout allows arbitrary Python code execution via indirect reference to format method.
Reporter | Title | Published | Views | Family All 29 |
---|---|---|---|---|
OpenVAS | openSUSE: Security Advisory for python (SUSE-SU-2025:0029-1) | 8 Jan 202500:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2025:0029-1) | 8 Jan 202500:00 | – | openvas |
OpenVAS | openSUSE: Security Advisory for python (SUSE-SU-2025:0006-1) | 7 Jan 202500:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2025:0006-1) | 3 Jan 202500:00 | – | openvas |
OSV | CGA-8r3m-hvvj-88ff | 10 Jan 202522:22 | – | osv |
OSV | Jinja has a sandbox breakout through indirect reference to format method | 23 Dec 202417:56 | – | osv |
OSV | UBUNTU-CVE-2024-56326 | 23 Dec 202416:15 | – | osv |
OSV | CGA-w2xv-8gr2-xp8m | 9 Jan 202518:08 | – | osv |
OSV | CGA-v3rh-g84v-9h7h | 10 Jan 202516:22 | – | osv |
OSV | CGA-h3v9-xgx5-mrgr | 27 Dec 202406:23 | – | osv |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo