Show filters
42 Total Results
Displaying 1-10 of 42
Sort by:
Attacker Value
Unknown
CVE-2023-22898
Disclosure Date: January 10, 2023 (last updated October 08, 2023)
workers/extractor.py in Pandora (aka pandora-analysis/pandora) 1.3.0 allows a denial of service when an attacker submits a deeply nested ZIP archive (aka ZIP bomb).
0
Attacker Value
Unknown
CVE-2021-45470
Disclosure Date: December 23, 2021 (last updated February 23, 2025)
lib/DatabaseLayer.py in cve-search before 4.1.0 allows regular expression injection, which can lead to ReDoS (regular expression denial of service) or other impacts.
0
Attacker Value
Unknown
CVE-2021-24402
Disclosure Date: September 20, 2021 (last updated February 23, 2025)
The Orders functionality in the WP iCommerce WordPress plugin through 1.1.1 has an `order_id` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. The feature is available to low privilege users such as contributors
0
Attacker Value
Unknown
CVE-2020-8545
Disclosure Date: February 03, 2020 (last updated February 21, 2025)
Global.py in AIL framework 2.8 allows path traversal.
0
Attacker Value
Unknown
CVE-2018-19830
Disclosure Date: December 31, 2019 (last updated November 08, 2023)
The UBSexToken() function of a smart contract implementation for Business Alliance Financial Circle (BAFC), an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function is public (by default) and does not check the caller's identity.
0
Attacker Value
Unknown
CVE-2019-5916
Disclosure Date: February 13, 2019 (last updated November 27, 2024)
Input validation issue in POWER EGG(Ver 2.0.1, Ver 2.02 Patch 3 and earlier, Ver 2.1 Patch 4 and earlier, Ver 2.2 Patch 7 and earlier, Ver 2.3 Patch 9 and earlier, Ver 2.4 Patch 13 and earlier, Ver 2.5 Patch 12 and earlier, Ver 2.6 Patch 8 and earlier, Ver 2.7 Patch 6 and earlier, Ver 2.7 Government Edition Patch 7 and earlier, Ver 2.8 Patch 6 and earlier, Ver 2.8c Patch 5 and earlier, Ver 2.9 Patch 4 and earlier) allows remote attackers to execute EL expression on the server via unspecified vectors.
0
Attacker Value
Unknown
CVE-2017-12095
Disclosure Date: April 05, 2018 (last updated November 26, 2024)
An exploitable vulnerability exists in the WiFi Access Point feature of Circle with Disney running firmware 2.0.1. A series of WiFi packets can force Circle to setup an Access Point with default credentials. An attacker needs to send a series of spoofed "de-auth" packets to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-12094
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the WiFi Channel parsing of Circle with Disney running firmware 2.0.1. A specially crafted SSID can cause the device to execute arbitrary sed commands. An attacker needs to setup an access point reachable by the device to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2913
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the filtering functionality of Circle with Disney. SSL certificates for specific domain names can cause the Bluecoat library to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2890
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the /api/CONFIG/restore functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request trigger this vulnerability.
0