CVE-2025-5134 |
Description: A vulnerability classified as problematic was found in Tmall Demo up to 20250505. Affected by this vulnerability is an unknown functionality of the component Buy Item Page. The manipulation of the argument Detailed Address leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way. In Tmall Demo bis 20250505 wurde eine problematische Schwachstelle entdeckt. Dabei geht es um eine nicht genauer bekannte Funktion der Komponente Buy Item Page. Mit der Manipulation des Arguments Detailed Address mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. Dieses Produkt setzt Rolling Releases ein. Aus diesem Grund sind Details zu betroffenen oder zu aktualisierende Versionen nicht verfügbar.
CVSS: LOW (3.5) EPSS Score: 0.04%
May 24th, 2025 (13 days ago)
|
CVE-2025-5127 |
Description: A vulnerability, which was classified as problematic, has been found in FLIR AX8 up to 1.46.16. This issue affects some unknown processing of the file /prod.php. The manipulation of the argument cmd leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Eine Schwachstelle wurde in FLIR AX8 bis 1.46.16 entdeckt. Sie wurde als problematisch eingestuft. Davon betroffen ist unbekannter Code der Datei /prod.php. Mittels dem Manipulieren des Arguments cmd mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
CVSS: LOW (3.5) EPSS Score: 0.03%
May 24th, 2025 (13 days ago)
|
CVE-2025-48756 |
Description: In group_number in the scsir crate 0.2.0 for Rust, there can be an overflow because a hardware device may expect a small number of bits (e.g., 5 bits) for group number.
CVSS: LOW (2.9) EPSS Score: 0.02%
May 24th, 2025 (14 days ago)
|
CVE-2025-48755 |
Description: In the spiral-rs crate 0.2.0 for Rust, allocation can be attempted for a ZST (zero-sized type).
CVSS: LOW (2.9) EPSS Score: 0.02%
May 24th, 2025 (14 days ago)
|
CVE-2025-48754 |
Description: In the memory_pages crate 0.1.0 for Rust, division by zero can occur.
CVSS: LOW (2.9) EPSS Score: 0.02%
May 24th, 2025 (14 days ago)
|
CVE-2025-48753 |
Description: In the anode crate 0.1.0 for Rust, data races can occur in unlock in SpinLock.
CVSS: LOW (2.9) EPSS Score: 0.02%
May 24th, 2025 (14 days ago)
|
CVE-2025-48752 |
Description: In the process-sync crate 0.2.2 for Rust, the drop function lacks a check for whether the pthread_mutex is unlocked.
CVSS: LOW (2.9) EPSS Score: 0.02%
May 24th, 2025 (14 days ago)
|
CVE-2025-48751 |
Description: The process_lock crate 0.1.0 for Rust allows data races in unlock.
CVSS: LOW (2.9) EPSS Score: 0.02%
May 24th, 2025 (14 days ago)
|
CVE-2025-48376 |
Description: DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to version 9.13.9, a malicious SuperUser (Host) could craft a request to use an external url for a site export to then be imported. Version 9.13.9 fixes the issue.
CVSS: LOW (3.5) EPSS Score: 0.03% SSVC Exploitation: none
May 23rd, 2025 (14 days ago)
|
CVE-2024-9163 |
Description: A business logic error in GitLab CE/EE affecting all versions starting from 12.1 prior to 17.10.7, 17.11 prior to 17.11.3 and 18.0 prior to 18.0.1 where an attacker can cause a branch name confusion in confidential MRs.
CVSS: LOW (3.5) EPSS Score: 0.01%
May 23rd, 2025 (15 days ago)
|