Total
63 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-3363 | 1 Ikus-soft | 1 Rdiffweb | 2025-05-07 | 9.8 Critical |
Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.0a7. | ||||
CVE-2022-32208 | 7 Apple, Debian, Fedoraproject and 4 more | 21 Macos, Debian Linux, Fedora and 18 more | 2025-05-05 | 5.9 Medium |
When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client. | ||||
CVE-2025-4037 | 1 Fabianros | 1 Atm Banking | 2025-04-30 | 4.4 Medium |
A vulnerability was found in code-projects ATM Banking 1.0. It has been classified as critical. Affected is the function moneyDeposit/moneyWithdraw. The manipulation leads to business logic errors. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. | ||||
CVE-2025-1908 | 1 Gitlab | 1 Gitlab | 2025-04-29 | 7.7 High |
An issue has been discovered in GitLab EE/CE that could allow an attacker to track users' browsing activities, potentially leading to full account take-over, affecting all versions from 16.6 before 17.9.7, 17.10 before 17.10.5, and 17.11 before 17.11.1. | ||||
CVE-2022-32207 | 7 Apple, Debian, Fedoraproject and 4 more | 21 Macos, Debian Linux, Fedora and 18 more | 2025-04-23 | 9.8 Critical |
When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended. | ||||
CVE-2022-4719 | 1 Ikus-soft | 1 Rdiffweb | 2025-04-09 | 9.8 Critical |
Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.5. | ||||
CVE-2023-0565 | 1 Froxlor | 1 Froxlor | 2025-03-28 | 5.5 Medium |
Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.10. | ||||
CVE-2024-6577 | 2025-03-20 | N/A | ||
In the latest version of pytorch/serve, the script 'upload_results_to_s3.sh' references the S3 bucket 'benchmarkai-metrics-prod' without ensuring its ownership or confirming its accessibility. This could lead to potential security vulnerabilities or unauthorized access to the bucket if it is not properly secured or claimed by the appropriate entity. The issue may result in data breaches, exposure of proprietary information, or unauthorized modifications to stored data. | ||||
CVE-2024-6844 | 2025-03-20 | N/A | ||
A vulnerability in corydolphin/flask-cors version 4.0.1 allows for inconsistent CORS matching due to the handling of the '+' character in URL paths. The request.path is passed through the unquote_plus function, which converts the '+' character to a space ' '. This behavior leads to incorrect path normalization, causing potential mismatches in CORS configuration. As a result, endpoints may not be matched correctly to their CORS settings, leading to unexpected CORS policy application. This can cause unauthorized cross-origin access or block valid requests, creating security vulnerabilities and usability issues. | ||||
CVE-2025-2321 | 2025-03-18 | 6.3 Medium | ||
A vulnerability was found in 274056675 springboot-openai-chatgpt e84f6f5 and classified as critical. Affected by this issue is some unknown functionality of the file /api/mjkj-chat/cgform-api/addData/. The manipulation of the argument chatUserID leads to business logic errors. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. | ||||
CVE-2025-2323 | 2025-03-17 | 4.3 Medium | ||
A vulnerability was found in 274056675 springboot-openai-chatgpt e84f6f5. It has been declared as problematic. This vulnerability affects the function updateQuestionCou of the file /api/mjkj-chat/chat/mng/update/questionCou of the component Number of Question Handler. The manipulation leads to enforcement of behavioral workflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. | ||||
CVE-2024-2267 | 1 Keerti1924 | 1 Online Bookstore Website | 2025-03-11 | 4.3 Medium |
A vulnerability was found in keerti1924 Online-Book-Store-Website 1.0 and classified as problematic. This issue affects some unknown processing of the file /shop.php. The manipulation of the argument product_price leads to business logic errors. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256037 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | ||||
CVE-2023-29294 | 1 Adobe | 2 Commerce, Magento | 2025-03-05 | 4.3 Medium |
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by a Business Logic Errors vulnerability that could result in a security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass a minor functionality. Exploitation of this issue does not require user interaction. | ||||
CVE-2024-58043 | 2025-03-04 | 7.3 High | ||
Permission bypass vulnerability in the window module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | ||||
CVE-2025-24425 | 2025-02-27 | 5.3 Medium | ||
Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a Business Logic Error vulnerability that could result in a security feature bypass. An attacker could exploit this vulnerability to circumvent intended security mechanisms by manipulating the logic of the application's operations causing limited data modification. Exploitation of this issue does not require user interaction. | ||||
CVE-2023-1541 | 1 Answer | 1 Answer | 2025-02-27 | 3.8 Low |
Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6. | ||||
CVE-2023-1542 | 1 Answer | 1 Answer | 2025-02-26 | 5.4 Medium |
Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6. | ||||
CVE-2024-45424 | 2025-02-25 | 5.3 Medium | ||
Business logic error in some Zoom Workplace Apps may allow an unauthenticated user to conduct a disclosure of information via network access. | ||||
CVE-2023-1887 | 1 Phpmyfaq | 1 Phpmyfaq | 2025-02-10 | 4.3 Medium |
Business Logic Errors in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | ||||
CVE-2024-56449 | 1 Huawei | 2 Emui, Harmonyos | 2025-01-13 | 6.6 Medium |
Privilege escalation vulnerability in the Account module Impact: Successful exploitation of this vulnerability may affect service confidentiality. |