8.2

CVSS3.1

CVE-2024-56143 - Strapi Allows Unauthorized Access to Private Fields via parms.lookup

Strapi is an open-source headless content management system. In versions from 5.0.0 to before 5.5.2, the lookup operator provided by the document service does not properly sanitize query parameters for private fields. An attacker can access private fields, including admin passwords and reset tokensโ€ฆ

๐Ÿ“… Published: Oct. 16, 2025, 4:07 p.m. ๐Ÿ”„ Last Modified: Dec. 31, 2025, 1:05 a.m.

5.1

CVSS4.0

CVE-2025-11851 - Apeman ID71 set_alias.cgi cross site scripting

A vulnerability has been found in Apeman ID71 EN75.8.53.20. The affected element is an unknown function of the file /set_alias.cgi. Such manipulation of the argument alias leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed to the public and may be useโ€ฆ

๐Ÿ“… Published: Oct. 16, 2025, 4:02 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.1

CVSS4.0

CVE-2025-62496 - Integer overflow in js_bigint_from_string in QuickJS

A vulnerability exists in the QuickJS engine's BigInt string parsing logic (js_bigint_from_string) when attempting to create a BigInt from a string with an excessively large number of digits. The function calculates the necessary number of bits (n_bits) required to store the BigInt using the formuโ€ฆ

๐Ÿ“… Published: Oct. 16, 2025, 3:52 p.m. ๐Ÿ”„ Last Modified: Oct. 28, 2025, 6:17 p.m.

7.1

CVSS4.0

CVE-2025-62495 - Type confusion in string addition in QuickJS

An integer overflow vulnerability exists in the QuickJS regular expression engine (libregexp) due to an inconsistent representation of the bytecode buffer size. * The regular expression bytecode is stored in a DynBuf structure, which correctly uses a $\text{size}\_\text{t}$ (an unsigned type, tโ€ฆ

๐Ÿ“… Published: Oct. 16, 2025, 3:51 p.m. ๐Ÿ”„ Last Modified: Oct. 29, 2025, 6:56 p.m.

7.1

CVSS4.0

CVE-2025-62494 - Type confusion in string addition in QuickJS

A type confusion vulnerability exists in the handling of the string addition (+) operation within the QuickJS engine. * The code first checks if the left-hand operand is a string. * It then attempts to convert the right-hand operand to a primitive value using JS_ToPrimitiveFree. This conveโ€ฆ

๐Ÿ“… Published: Oct. 16, 2025, 3:51 p.m. ๐Ÿ”„ Last Modified: Oct. 29, 2025, 6:58 p.m.

5.9

CVSS4.0

CVE-2025-62493 - Heap out-of-bounds read in js_bigint_to_string1 in QuickJS

A vulnerability exists in the QuickJS engine's BigInt string conversion logic (js_bigint_to_string1) due to an incorrect calculation of the required number of digits, which in turn leads to reading memory past the allocated BigInt structure. * The function determines the number of characters (nโ€ฆ

๐Ÿ“… Published: Oct. 16, 2025, 3:51 p.m. ๐Ÿ”„ Last Modified: Oct. 29, 2025, 6:59 p.m.

5.9

CVSS4.0

CVE-2025-62492 - Heap out-of-bounds read in js_typed_array_indexOf in QuickJS

A vulnerability stemming from floating-point arithmetic precision errors exists in the QuickJS engine's implementation of TypedArray.prototype.indexOf() when a negative fromIndex argument is supplied. * The fromIndex argument (read as a double variable, $d$) is used to calculate the starting poโ€ฆ

๐Ÿ“… Published: Oct. 16, 2025, 3:51 p.m. ๐Ÿ”„ Last Modified: Oct. 30, 2025, 4:21 p.m.

8.8

CVSS4.0

CVE-2025-62491 - Use-after-free in js_std_promise_rejection_check in QuickJS

A Use-After-Free (UAF) vulnerability exists in the QuickJS engine's standard library when iterating over the global list of unhandled rejected promises (ts->rejected_promise_list). * The function js_std_promise_rejection_check attempts to iterate over the rejected_promise_list to report unhandlโ€ฆ

๐Ÿ“… Published: Oct. 16, 2025, 3:51 p.m. ๐Ÿ”„ Last Modified: Oct. 30, 2025, 4:27 p.m.

8.8

CVSS4.0

CVE-2025-62490 - Use-after-free in js_print_object in QuickJS

In quickjs, in js_print_object, when printing an array, the function first fetches the array length and then loops over it.ย The issue is, printing a value is not side-effect free. An attacker-defined callback could run during js_print_value, during which the array could get resized and len1ย become โ€ฆ

๐Ÿ“… Published: Oct. 16, 2025, 3:51 p.m. ๐Ÿ”„ Last Modified: Oct. 30, 2025, 4:29 p.m.

5.3

CVSS4.0

CVE-2025-11842 - Shazwazza Smidge Bundle path traversal

A security vulnerability has been detected in Shazwazza Smidge up to 4.5.1. The impacted element is an unknown function of the component Bundle Handler. The manipulation of the argument Version leads to path traversal. Remote exploitation of the attack is possible. Upgrading to version 4.6.0 is sufโ€ฆ

๐Ÿ“… Published: Oct. 16, 2025, 3:32 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 349182
Page 3390 of 34,919
ยซ previous page ยป next page
Filters