Show filters
42 Total Results
Displaying 1-10 of 42
Sort by:
Attacker Value
Unknown

CVE-2023-22898

Disclosure Date: January 10, 2023 (last updated February 24, 2025)
workers/extractor.py in Pandora (aka pandora-analysis/pandora) 1.3.0 allows a denial of service when an attacker submits a deeply nested ZIP archive (aka ZIP bomb).
Attacker Value
Unknown

CVE-2021-45470

Disclosure Date: December 23, 2021 (last updated February 23, 2025)
lib/DatabaseLayer.py in cve-search before 4.1.0 allows regular expression injection, which can lead to ReDoS (regular expression denial of service) or other impacts.
Attacker Value
Unknown

CVE-2021-24402

Disclosure Date: September 20, 2021 (last updated February 23, 2025)
The Orders functionality in the WP iCommerce WordPress plugin through 1.1.1 has an `order_id` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. The feature is available to low privilege users such as contributors
Attacker Value
Unknown

CVE-2020-8545

Disclosure Date: February 03, 2020 (last updated February 21, 2025)
Global.py in AIL framework 2.8 allows path traversal.
Attacker Value
Unknown

CVE-2018-19830

Disclosure Date: December 31, 2019 (last updated November 08, 2023)
The UBSexToken() function of a smart contract implementation for Business Alliance Financial Circle (BAFC), an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function is public (by default) and does not check the caller's identity.
Attacker Value
Unknown

CVE-2019-5916

Disclosure Date: February 13, 2019 (last updated November 27, 2024)
Input validation issue in POWER EGG(Ver 2.0.1, Ver 2.02 Patch 3 and earlier, Ver 2.1 Patch 4 and earlier, Ver 2.2 Patch 7 and earlier, Ver 2.3 Patch 9 and earlier, Ver 2.4 Patch 13 and earlier, Ver 2.5 Patch 12 and earlier, Ver 2.6 Patch 8 and earlier, Ver 2.7 Patch 6 and earlier, Ver 2.7 Government Edition Patch 7 and earlier, Ver 2.8 Patch 6 and earlier, Ver 2.8c Patch 5 and earlier, Ver 2.9 Patch 4 and earlier) allows remote attackers to execute EL expression on the server via unspecified vectors.
Attacker Value
Unknown

CVE-2017-12095

Disclosure Date: April 05, 2018 (last updated November 26, 2024)
An exploitable vulnerability exists in the WiFi Access Point feature of Circle with Disney running firmware 2.0.1. A series of WiFi packets can force Circle to setup an Access Point with default credentials. An attacker needs to send a series of spoofed "de-auth" packets to trigger this vulnerability.
0
Attacker Value
Unknown

CVE-2017-12094

Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the WiFi Channel parsing of Circle with Disney running firmware 2.0.1. A specially crafted SSID can cause the device to execute arbitrary sed commands. An attacker needs to setup an access point reachable by the device to trigger this vulnerability.
0
Attacker Value
Unknown

CVE-2017-2913

Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the filtering functionality of Circle with Disney. SSL certificates for specific domain names can cause the Bluecoat library to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-2890

Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the /api/CONFIG/restore functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request trigger this vulnerability.