Show filters
341 Total Results
Displaying 71-80 of 341
Sort by:
Attacker Value
Unknown
CVE-2022-25396
Disclosure Date: March 02, 2022 (last updated February 23, 2025)
Cosmetics and Beauty Product Online Store v1.0 was discovered to contain a SQL injection vulnerability via the search parameter.
0
Attacker Value
Unknown
CVE-2022-25395
Disclosure Date: March 02, 2022 (last updated February 23, 2025)
Cosmetics and Beauty Product Online Store v1.0 was discovered to contain multiple reflected cross-site scripting (XSS) attacks via the search parameter under the /cbpos/ app.
0
Attacker Value
Unknown
CVE-2022-23639
Disclosure Date: February 15, 2022 (last updated February 23, 2025)
crossbeam-utils provides atomics, synchronization primitives, scoped threads, and other utilities for concurrent programming in Rust. crossbeam-utils prior to version 0.8.7 incorrectly assumed that the alignment of `{i,u}64` was always the same as `Atomic{I,U}64`. However, the alignment of `{i,u}64` on a 32-bit target can be smaller than `Atomic{I,U}64`. This can cause unaligned memory accesses and data race. Crates using `fetch_*` methods with `AtomicCell<{i,u}64>` are affected by this issue. 32-bit targets without `Atomic{I,U}64` and 64-bit targets are not affected by this issue. This has been fixed in crossbeam-utils 0.8.7. There are currently no known workarounds.
0
Attacker Value
Unknown
CVE-2022-0176
Disclosure Date: February 14, 2022 (last updated February 23, 2025)
The PowerPack Lite for Beaver Builder WordPress plugin before 1.2.9.3 does not sanitise and escape the tab parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting
0
Attacker Value
Unknown
CVE-2022-0539
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
Cross-site Scripting (XSS) - Stored in Packagist ptrofimov/beanstalk_console prior to 1.7.14.
0
Attacker Value
Unknown
CVE-2022-0501
Disclosure Date: February 05, 2022 (last updated February 23, 2025)
Cross-site Scripting (XSS) - Reflected in Packagist ptrofimov/beanstalk_console prior to 1.7.12.
0
Attacker Value
Unknown
CVE-2021-3836
Disclosure Date: December 14, 2021 (last updated February 23, 2025)
dbeaver is vulnerable to Improper Restriction of XML External Entity Reference
0
Attacker Value
Unknown
CVE-2021-32810
Disclosure Date: August 02, 2021 (last updated February 23, 2025)
crossbeam-deque is a package of work-stealing deques for building task schedulers when programming in Rust. In versions prior to 0.7.4 and 0.8.0, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug. Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue. This has been fixed in crossbeam-deque 0.8.1 and 0.7.4.
0
Attacker Value
Unknown
CVE-2021-24384
Disclosure Date: July 06, 2021 (last updated February 22, 2025)
The joomsport_md_load AJAX action of the JoomSport WordPress plugin before 5.1.8, registered for both unauthenticated and unauthenticated users, unserialised user input from the shattr POST parameter, leading to a PHP Object Injection issue. Even though the plugin does not have a suitable gadget chain to exploit this, other installed plugins could, which might lead to more severe issues such as RCE
0
Attacker Value
Unknown
CVE-2021-21364
Disclosure Date: March 11, 2021 (last updated February 22, 2025)
swagger-codegen is an open-source project which contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. In swagger-codegen before version 2.4.19, on Unix-Like systems, the system temporary directory is shared between all local users. When files/directories are created, the default `umask` settings for the process are respected. As a result, by default, most processes/apis will create files/directories with the permissions `-rw-r--r--` and `drwxr-xr-x` respectively, unless an API that explicitly sets safe file permissions is used. Because this vulnerability impacts generated code, the generated code will remain vulnerable until fixed manually! This vulnerability is fixed in version 2.4.19. Note this is a distinct vulnerability from CVE-2021-21363.
0