Total
13 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-8991 | 2025-08-15 | N/A | 4.3 MEDIUM | ||
A vulnerability was identified in linlinjava litemall up to 1.8.0. Affected by this vulnerability is an unknown functionality of the file /admin/config/express of the component Business Logic Handler. The manipulation of the argument litemall_express_freight_min leads to business logic errors. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-2938 | 1 Gitlab | 1 Gitlab | 2025-08-12 | N/A | 8.8 HIGH |
An issue has been discovered in GitLab CE/EE affecting all versions from 17.3 before 17.11.5, 18.0 before 18.0.3, and 18.1 before 18.1.1 that could have allowed authenticated users to gain elevated project privileges by requesting access to projects where role modifications during the approval process resulted in unintended permission grants. | |||||
CVE-2025-1908 | 1 Gitlab | 1 Gitlab | 2025-08-08 | N/A | N/A |
An issue has been discovered in GitLab EE/CE that could allow an attacker to track users' browsing activities, potentially leading to full account take-over, affecting all versions from 16.6 before 17.9.7, 17.10 before 17.10.5, and 17.11 before 17.11.1. | |||||
CVE-2024-6844 | 1 Flask-cors Project | 1 Flask-cors | 2025-08-01 | N/A | N/A |
A vulnerability in corydolphin/flask-cors version 4.0.1 allows for inconsistent CORS matching due to the handling of the '+' character in URL paths. The request.path is passed through the unquote_plus function, which converts the '+' character to a space ' '. This behavior leads to incorrect path normalization, causing potential mismatches in CORS configuration. As a result, endpoints may not be matched correctly to their CORS settings, leading to unexpected CORS policy application. This can cause unauthorized cross-origin access or block valid requests, creating security vulnerabilities and usability issues. | |||||
CVE-2024-6577 | 2025-03-20 | N/A | N/A | ||
In the latest version of pytorch/serve, the script 'upload_results_to_s3.sh' references the S3 bucket 'benchmarkai-metrics-prod' without ensuring its ownership or confirming its accessibility. This could lead to potential security vulnerabilities or unauthorized access to the bucket if it is not properly secured or claimed by the appropriate entity. The issue may result in data breaches, exposure of proprietary information, or unauthorized modifications to stored data. | |||||
CVE-2025-2323 | 2025-03-15 | N/A | 4.3 MEDIUM | ||
A vulnerability was found in 274056675 springboot-openai-chatgpt e84f6f5. It has been declared as problematic. This vulnerability affects the function updateQuestionCou of the file /api/mjkj-chat/chat/mng/update/questionCou of the component Number of Question Handler. The manipulation leads to enforcement of behavioral workflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. | |||||
CVE-2025-2321 | 2025-03-15 | N/A | 6.3 MEDIUM | ||
A vulnerability was found in 274056675 springboot-openai-chatgpt e84f6f5 and classified as critical. Affected by this issue is some unknown functionality of the file /api/mjkj-chat/cgform-api/addData/. The manipulation of the argument chatUserID leads to business logic errors. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. | |||||
CVE-2024-1682 | 2024-11-18 | N/A | N/A | ||
An unclaimed Amazon S3 bucket, 'codeconf', is referenced in an audio file link within the .rst documentation file. This bucket has been claimed by an external party. The use of this unclaimed S3 bucket could lead to data integrity issues, data leakage, availability problems, loss of trustworthiness, and potential further attacks if the bucket is used to host malicious content or as a pivot point for further attacks. | |||||
CVE-2023-6832 | 1 Microweber | 1 Microweber | 2023-12-21 | N/A | 4.3 MEDIUM |
Business Logic Errors in GitHub repository microweber/microweber prior to 2.0. | |||||
CVE-2023-0565 | 1 Froxlor | 1 Froxlor | 2023-12-18 | N/A | 4.9 MEDIUM |
Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.10. | |||||
CVE-2023-3229 | 1 Fossbilling | 1 Fossbilling | 2023-06-17 | N/A | 6.5 MEDIUM |
Business Logic Errors in GitHub repository fossbilling/fossbilling prior to 0.5.0. | |||||
CVE-2023-1887 | 1 Phpmyfaq | 1 Phpmyfaq | 2023-04-12 | N/A | 4.3 MEDIUM |
Business Logic Errors in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | |||||
CVE-2022-0524 | 1 Publify Project | 1 Publify | 2022-02-11 | 5.0 MEDIUM | 7.5 HIGH |
Business Logic Errors in GitHub repository publify/publify prior to 9.2.7. |