Categoria: CVE

CVE-2025-0577 | GNU glibc up to 2.40 arc4random random values

A vulnerability was found in GNU glibc up to 2.40. It has been rated as problematic. This issue affects the function arc4random. The manipulation leads to insufficiently random values. The identification of this vulnerability is CVE-2025-0577. The attack needs to be approached within the local network. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più

CVE-2025-0411 | 7-zip up to 24.07 Mark-of-the-Web protection mechanism

A vulnerability was found in 7-zip. It has been classified as problematic. This affects an unknown part of the component Mark-of-the-Web. The manipulation leads to protection mechanism failure. This vulnerability is uniquely identified as CVE-2025-0411. The attack needs to be approached locally. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più

CVE-2025-0582 | itsourcecode Farm Management System up to 1.0 /add-pig.php pigphoto unrestricted upload

A vulnerability classified as critical was found in itsourcecode Farm Management System up to 1.0. This vulnerability affects unknown code of the file /add-pig.php. The manipulation of the argument pigphoto leads to unrestricted upload. This vulnerability was named CVE-2025-0582. The attack can be initiated remotely. There is no exploit...

Per saperne di più

CVE-2025-0581 | CampCodes School Management Software 1.0 Chat History /chat/group/send message cross site scripting

A vulnerability classified as problematic has been found in CampCodes School Management Software 1.0. This affects an unknown part of the file /chat/group/send of the component Chat History. The manipulation of the argument message leads to cross site scripting. This vulnerability is uniquely identified as CVE-2025-0581. It is possible to initiate the attack remotely. Furthermore, there is an exploit...

Per saperne di più

CVE-2025-0580 | Shiprocket Module 3 on OpenCart REST API Module rest_api&action=getOrders contentHash authorization

A vulnerability was found in Shiprocket Module 3 on OpenCart. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php?route=extension/module/rest_api&action=getOrders of the component REST API Module. The manipulation of the argument contentHash leads to incorrect authorization. This vulnerability is handled as CVE-2025-0580. The attack may be launched remotely. Furthermore, there is an exploit available. The vendor was contacted early about this disclosure but did not respond in any way. It is recommended to apply restrictive firewalling. The vendor was contacted early about this disclosure but did not respond in any...

Per saperne di più

CVE-2025-0579 | Shiprocket Module 3/4 on OpenCart REST API Module restapi x-username sql injection

A vulnerability was found in Shiprocket Module 3/4 on OpenCart. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php?route=extension/shiprocket/module/restapi of the component REST API Module. The manipulation of the argument x-username leads to sql injection. This vulnerability is known as CVE-2025-0579. The attack can be launched remotely. Furthermore, there is an exploit available. The vendor was contacted early about this disclosure but did not respond in any way. The vendor was contacted early about this disclosure but did not respond in any...

Per saperne di più

CVE-2025-0578 | Facile Sistemas Cloud Apps up to 20250107 Password Reset /account/forgotpassword reterros cross site scripting

A vulnerability was found in Facile Sistemas Cloud Apps up to 20250107. It has been classified as problematic. Affected is an unknown function of the file /account/forgotpassword of the component Password Reset Handler. The manipulation of the argument reterros leads to cross site scripting. This vulnerability is traded as CVE-2025-0578. It is possible to launch the attack remotely. Furthermore, there is an exploit available. The vendor was contacted early about this disclosure but did not respond in any way. It is recommended to apply restrictive firewalling. The vendor was contacted early about this disclosure but did not respond in any...

Per saperne di più
Caricamento