Lucene search

K

CVE-2024-56326 Jinja has a sandbox breakout through indirect reference to format method

🗓️ 23 Dec 2024 15:49:43Reported by GitHub_MType 
vulnrichment
 vulnrichment
🔗 github.com👁 4 Views

Jinja sandbox breakout allows arbitrary Python code execution via indirect reference to format method.

Show more
Related
Refs
ReporterTitlePublishedViews
Family
OpenVAS
openSUSE: Security Advisory for python (SUSE-SU-2025:0029-1)
8 Jan 202500:00
openvas
OpenVAS
SUSE: Security Advisory (SUSE-SU-2025:0029-1)
8 Jan 202500:00
openvas
OpenVAS
openSUSE: Security Advisory for python (SUSE-SU-2025:0006-1)
7 Jan 202500:00
openvas
OpenVAS
SUSE: Security Advisory (SUSE-SU-2025:0006-1)
3 Jan 202500:00
openvas
OSV
CGA-8r3m-hvvj-88ff
10 Jan 202522:22
osv
OSV
Jinja has a sandbox breakout through indirect reference to format method
23 Dec 202417:56
osv
OSV
UBUNTU-CVE-2024-56326
23 Dec 202416:15
osv
OSV
CGA-w2xv-8gr2-xp8m
9 Jan 202518:08
osv
OSV
CGA-v3rh-g84v-9h7h
10 Jan 202516:22
osv
OSV
CGA-h3v9-xgx5-mrgr
27 Dec 202406:23
osv
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
23 Dec 2024 15:43Current
7.6High risk
Vulners AI Score7.6
CVSS45.4
EPSS0.001
SSVC
4
.json
Report