8.1

CVSS3.1

CVE-2025-65029 - Rallly Has an IDOR Vulnerability in Participant Deletion Endpoint Allows Unauthorized Removal of Po…

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an insecure direct object reference (IDOR) vulnerability allows any authenticated user to delete arbitrary participants from polls without ownership verification. The endpoint relies solely on a participant ID to au…

📅 Published: Nov. 19, 2025, 5:24 p.m. 🔄 Last Modified: Nov. 25, 2025, 3:33 p.m.

9.1

CVSS3.1

CVE-2025-65021 - Rallly Has Unauthorized Poll Finalization via Insecure Direct Object Reference (IDOR)

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability exists in the poll finalization feature of the application. Any authenticated user can finalize a poll they do not own by manipulating the pollId parameter in…

📅 Published: Nov. 19, 2025, 5:24 p.m. 🔄 Last Modified: Nov. 25, 2025, 3:32 p.m.

6.5

CVSS3.1

CVE-2025-65020 - Rallly Has Unauthorized Poll Duplication via Insecure Direct Object Reference (IDOR)

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability in the poll duplication endpoint (/api/trpc/polls.duplicate) allows any authenticated user to duplicate polls they do not own by modifying the pollId paramete…

📅 Published: Nov. 19, 2025, 5:24 p.m. 🔄 Last Modified: Nov. 25, 2025, 3:33 p.m.

6.5

CVSS3.1

CVE-2025-65028 - Rallly Has an IDOR Vulnerability in Vote Update Endpoint Allows Unauthorized Manipulation of Partic…

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an insecure direct object reference (IDOR) vulnerability allows any authenticated user to modify other participants’ votes in polls without authorization. The backend relies solely on the participantId parameter to …

📅 Published: Nov. 19, 2025, 5:23 p.m. 🔄 Last Modified: Nov. 25, 2025, 3:32 p.m.

5.8

CVSS3.1

CVE-2025-64708 - authentik invitation expiry is delayed by at least 5 minutes

authentik is an open-source Identity Provider. Prior to versions 2025.8.5 and 2025.10.2, in previous authentik versions, invitations were considered valid regardless if they are expired or not, thus relying on background tasks to clean up expired ones. In a normal scenario this can take up to 5 min…

📅 Published: Nov. 19, 2025, 5:03 p.m. 🔄 Last Modified: Nov. 20, 2025, 6:56 p.m.

4.8

CVSS3.1

CVE-2025-64521 - authentik deactivated service accounts can authenticate to OAuth

authentik is an open-source Identity Provider. Prior to versions 2025.8.5 and 2025.10.2, when authenticating with client_id and client_secret to an OAuth provider, authentik creates a service account for the provider. In previous authentik versions, authentication for this account was possible even…

📅 Published: Nov. 19, 2025, 5:03 p.m. 🔄 Last Modified: Nov. 20, 2025, 6:56 p.m.

8.7

CVSS4.0

CVE-2025-13400 - Tenda CH22 WrlExtraGet formWrlExtraGet buffer overflow

A vulnerability was detected in Tenda CH22 1.0.0.1. Affected is the function formWrlExtraGet of the file /goform/WrlExtraGet. Performing a manipulation of the argument chkHz results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.

📅 Published: Nov. 19, 2025, 5:02 p.m. 🔄 Last Modified: Feb. 24, 2026, 7:16 a.m.

6

CVSS4.0

CVE-2025-12743 - SQL Injection in Looker Project Generation Endpoint Allows Access to Internal MySQL Database

The Looker endpoint for generating new projects from database connections allows users to specify "looker" as a connection name, which is a reserved internal name for Looker's internal MySQL database. The schemas parameter is vulnerable to SQL injection, enabling attackers to manipulate SELECT quer…

📅 Published: Nov. 19, 2025, 4:41 p.m. 🔄 Last Modified: Nov. 24, 2025, 9:10 a.m.

6.9

CVSS4.0

CVE-2025-64765 - Astro middleware authentication checks based on url.pathname can be bypassed via url encoded values

Astro is a web framework. Prior to version 5.15.8, a mismatch exists between how Astro normalizes request paths for routing/rendering and how the application’s middleware reads the path for validation checks. Astro internally applies decodeURI() to determine which route to render, while the middlew…

📅 Published: Nov. 19, 2025, 4:41 p.m. 🔄 Last Modified: Nov. 25, 2025, 3:11 p.m.

7.1

CVSS3.1

CVE-2025-64764 - Astro is vulnerable to Reflected XSS via the server islands feature

Astro is a web framework. Prior to version 5.15.8, a reflected XSS vulnerability is present when the server islands feature is used in the targeted application, regardless of what was intended by the component template(s). This issue has been patched in version 5.15.8.

📅 Published: Nov. 19, 2025, 4:41 p.m. 🔄 Last Modified: Nov. 20, 2025, 5:54 p.m.
Total resulsts: 342363
Page 2279 of 34,237
« previous page » next page
Filters