Show filters
33 Total Results
Displaying 11-20 of 33
Sort by:
Attacker Value
Unknown

CVE-2022-3417

Disclosure Date: January 09, 2023 (last updated October 08, 2023)
The WPtouch WordPress plugin before 4.3.45 unserialises the content of an imported settings file, which could lead to PHP object injections issues when an user import (intentionally or not) a malicious settings file and a suitable gadget chain is present on the blog.
Attacker Value
Unknown

CVE-2022-3416

Disclosure Date: January 09, 2023 (last updated October 08, 2023)
The WPtouch WordPress plugin before 4.3.45 does not properly validate images to be uploaded, allowing high privilege users such as admin to upload arbitrary files on the server even when they should not be allowed to (for example in multisite setup)
Attacker Value
Unknown

CVE-2022-47934

Disclosure Date: December 24, 2022 (last updated October 08, 2023)
Brave Browser before 1.43.88 allowed a remote attacker to cause a denial of service in private and guest windows via a crafted HTML file that mentions an ipfs:// or ipns:// URL. This is caused by an incomplete fix for CVE-2022-47932 and CVE-2022-47934.
Attacker Value
Unknown

CVE-2022-47933

Disclosure Date: December 24, 2022 (last updated October 08, 2023)
Brave Browser before 1.42.51 allowed a remote attacker to cause a denial of service via a crafted HTML file that references the IPFS scheme. This vulnerability is caused by an uncaught exception in the function ipfs::OnBeforeURLRequest_IPFSRedirectWork() in ipfs_redirect_network_delegate_helper.cc.
Attacker Value
Unknown

CVE-2022-47932

Disclosure Date: December 24, 2022 (last updated October 08, 2023)
Brave Browser before 1.43.34 allowed a remote attacker to cause a denial of service via a crafted HTML file that mentions an ipfs:// or ipns:// URL. This vulnerability is caused by an incomplete fix for CVE-2022-47933.
Attacker Value
Unknown

CVE-2022-30334

Disclosure Date: May 07, 2022 (last updated October 07, 2023)
Brave before 1.34, when a Private Window with Tor Connectivity is used, leaks .onion URLs in Referer and Origin headers. NOTE: although this was fixed by Brave, the Brave documentation still advises "Note that Private Windows with Tor Connectivity in Brave are just regular private windows that use Tor as a proxy. Brave does NOT implement most of the privacy protections from Tor Browser."
Attacker Value
Unknown

CVE-2021-45884

Disclosure Date: December 27, 2021 (last updated October 07, 2023)
In Brave Desktop 1.17 through 1.33 before 1.33.106, when CNAME-based adblocking and a proxying extension with a SOCKS fallback are enabled, additional DNS requests are issued outside of the proxying extension using the system's DNS settings, resulting in information disclosure. NOTE: this issue exists because of an incomplete fix for CVE-2021-21323 and CVE-2021-22916.
Attacker Value
Unknown

CVE-2021-22929

Disclosure Date: August 31, 2021 (last updated February 23, 2025)
An information disclosure exists in Brave Browser Desktop prior to version 1.28.62, where logged warning messages that included timestamps of connections to V2 onion domains in tor.log.
Attacker Value
Unknown

CVE-2021-22916

Disclosure Date: July 12, 2021 (last updated February 23, 2025)
In Brave Desktop between versions 1.17 and 1.26.60, when adblocking is enabled and a proxy browser extension is installed, the CNAME adblocking feature issues DNS requests that used the system DNS settings instead of the extension's proxy settings, resulting in possible information disclosure.
Attacker Value
Unknown

CVE-2021-22917

Disclosure Date: July 12, 2021 (last updated February 23, 2025)
Brave Browser Desktop between versions 1.17 and 1.20 is vulnerable to information disclosure by way of DNS requests in Tor windows not flowing through Tor if adblocking was enabled.