๐จ CVE-2022-28423
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/posts.php&action=delete.
๐@cveNotify
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/posts.php&action=delete.
๐@cveNotify
GitHub
bug_report/vendors/janobe/baby-care-system/SQLi-4.md at main ยท k0xx11/bug_report
Contribute to k0xx11/bug_report development by creating an account on GitHub.
๐จ CVE-2022-28424
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/posts.php&find=.
๐@cveNotify
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/posts.php&find=.
๐@cveNotify
GitHub
bug_report/vendors/janobe/baby-care-system/SQLi-5.md at main ยท k0xx11/bug_report
Contribute to k0xx11/bug_report development by creating an account on GitHub.
๐จ CVE-2022-28425
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/pagerole.php&action=display&value=1&roleid=.
๐@cveNotify
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/pagerole.php&action=display&value=1&roleid=.
๐@cveNotify
GitHub
bug_report/vendors/janobe/baby-care-system/SQLi-6.md at main ยท k0xx11/bug_report
Contribute to k0xx11/bug_report development by creating an account on GitHub.
๐จ CVE-2022-28426
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/pagerole.php&action=edit&roleid=.
๐@cveNotify
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/pagerole.php&action=edit&roleid=.
๐@cveNotify
GitHub
bug_report/vendors/janobe/baby-care-system/SQLi-7.md at main ยท k0xx11/bug_report
Contribute to k0xx11/bug_report development by creating an account on GitHub.
๐จ CVE-2022-28427
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/inbox.php&action=read&msgid=.
๐@cveNotify
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/inbox.php&action=read&msgid=.
๐@cveNotify
GitHub
bug_report/vendors/janobe/baby-care-system/SQLi-9.md at main ยท k0xx11/bug_report
Contribute to k0xx11/bug_report development by creating an account on GitHub.
๐จ CVE-2022-28429
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/inbox.php&action=delete&msgid=.
๐@cveNotify
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/inbox.php&action=delete&msgid=.
๐@cveNotify
GitHub
bug_report/vendors/janobe/baby-care-system/SQLi-10.md at main ยท k0xx11/bug_report
Contribute to k0xx11/bug_report development by creating an account on GitHub.
๐จ CVE-2022-28431
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/siteoptions.php&social=remove&sid=2.
๐@cveNotify
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/siteoptions.php&social=remove&sid=2.
๐@cveNotify
GitHub
bug_report/vendors/janobe/baby-care-system/SQLi-12.md at main ยท k0xx11/bug_report
Contribute to k0xx11/bug_report development by creating an account on GitHub.
๐จ CVE-2022-28432
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin.php?id=siteoptions&social=display&value=0&sid=2.
๐@cveNotify
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin.php?id=siteoptions&social=display&value=0&sid=2.
๐@cveNotify
GitHub
bug_report/vendors/janobe/baby-care-system/SQLi-13.md at main ยท k0xx11/bug_report
Contribute to k0xx11/bug_report development by creating an account on GitHub.
๐จ CVE-2022-28433
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=display&value=Show&userid=.
๐@cveNotify
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=display&value=Show&userid=.
๐@cveNotify
GitHub
bug_report/vendors/janobe/baby-care-system/SQLi-16.md at main ยท k0xx11/bug_report
Contribute to k0xx11/bug_report development by creating an account on GitHub.
๐จ CVE-2022-28434
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin.php?id=siteoptions&social=edit&sid=2.
๐@cveNotify
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin.php?id=siteoptions&social=edit&sid=2.
๐@cveNotify
GitHub
k0xx11 - Overview
k0xx11 has 12 repositories available. Follow their code on GitHub.
๐จ CVE-2022-28435
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/siteoptions.php&action=displaygoal&value=1&roleid=1.
๐@cveNotify
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/siteoptions.php&action=displaygoal&value=1&roleid=1.
๐@cveNotify
GitHub
bug_report/vendors/janobe/baby-care-system/SQLi-15.md at main ยท k0xx11/bug_report
Contribute to k0xx11/bug_report development by creating an account on GitHub.
๐จ CVE-2022-28436
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=display&value=Hide&userid=.
๐@cveNotify
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=display&value=Hide&userid=.
๐@cveNotify
GitHub
bug_report/vendors/janobe/baby-care-system/SQLi-17.md at main ยท k0xx11/bug_report
Contribute to k0xx11/bug_report development by creating an account on GitHub.
๐จ CVE-2022-28437
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=type&userrole=Admin&userid=3.
๐@cveNotify
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=type&userrole=Admin&userid=3.
๐@cveNotify
GitHub
bug_report/vendors/janobe/baby-care-system/SQLi-18.md at main ยท k0xx11/bug_report
Contribute to k0xx11/bug_report development by creating an account on GitHub.
๐จ CVE-2022-28438
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=type&userrole=User&userid=.
๐@cveNotify
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=type&userrole=User&userid=.
๐@cveNotify
GitHub
bug_report/vendors/janobe/baby-care-system/SQLi-20.md at main ยท k0xx11/bug_report
Contribute to k0xx11/bug_report development by creating an account on GitHub.
๐จ CVE-2025-38306
In the Linux kernel, the following vulnerability has been resolved:
fs/fhandle.c: fix a race in call of has_locked_children()
may_decode_fh() is calling has_locked_children() while holding no locks.
That's an oopsable race...
The rest of the callers are safe since they are holding namespace_sem and
are guaranteed a positive refcount on the mount in question.
Rename the current has_locked_children() to __has_locked_children(), make
it static and switch the fs/namespace.c users to it.
Make has_locked_children() a wrapper for __has_locked_children(), calling
the latter under read_seqlock_excl(&mount_lock).
๐@cveNotify
In the Linux kernel, the following vulnerability has been resolved:
fs/fhandle.c: fix a race in call of has_locked_children()
may_decode_fh() is calling has_locked_children() while holding no locks.
That's an oopsable race...
The rest of the callers are safe since they are holding namespace_sem and
are guaranteed a positive refcount on the mount in question.
Rename the current has_locked_children() to __has_locked_children(), make
it static and switch the fs/namespace.c users to it.
Make has_locked_children() a wrapper for __has_locked_children(), calling
the latter under read_seqlock_excl(&mount_lock).
๐@cveNotify
๐จ CVE-2022-50160
In the Linux kernel, the following vulnerability has been resolved:
mtd: maps: Fix refcount leak in ap_flash_init
of_find_matching_node() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
๐@cveNotify
In the Linux kernel, the following vulnerability has been resolved:
mtd: maps: Fix refcount leak in ap_flash_init
of_find_matching_node() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
๐@cveNotify
๐จ CVE-2022-50161
In the Linux kernel, the following vulnerability has been resolved:
mtd: maps: Fix refcount leak in of_flash_probe_versatile
of_find_matching_node_and_match() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
๐@cveNotify
In the Linux kernel, the following vulnerability has been resolved:
mtd: maps: Fix refcount leak in of_flash_probe_versatile
of_find_matching_node_and_match() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
๐@cveNotify
๐จ CVE-2022-50162
In the Linux kernel, the following vulnerability has been resolved:
wifi: libertas: Fix possible refcount leak in if_usb_probe()
usb_get_dev will be called before lbs_get_firmware_async which means that
usb_put_dev need to be called when lbs_get_firmware_async fails.
๐@cveNotify
In the Linux kernel, the following vulnerability has been resolved:
wifi: libertas: Fix possible refcount leak in if_usb_probe()
usb_get_dev will be called before lbs_get_firmware_async which means that
usb_put_dev need to be called when lbs_get_firmware_async fails.
๐@cveNotify
๐จ CVE-2024-54151
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 11.0.0 and prior to version 11.3.0, when setting `WEBSOCKETS_GRAPHQL_AUTH` or `WEBSOCKETS_REST_AUTH` to "public", an unauthenticated user is able to do any of the supported operations (CRUD, subscriptions) with full admin privileges. This impacts any Directus instance that has either `WEBSOCKETS_GRAPHQL_AUTH` or `WEBSOCKETS_REST_AUTH` set to `public` allowing unauthenticated users to subscribe for changes on any collection or do REST CRUD operations on user defined collections ignoring permissions. Version 11.3.0 fixes the issue.
๐@cveNotify
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 11.0.0 and prior to version 11.3.0, when setting `WEBSOCKETS_GRAPHQL_AUTH` or `WEBSOCKETS_REST_AUTH` to "public", an unauthenticated user is able to do any of the supported operations (CRUD, subscriptions) with full admin privileges. This impacts any Directus instance that has either `WEBSOCKETS_GRAPHQL_AUTH` or `WEBSOCKETS_REST_AUTH` set to `public` allowing unauthenticated users to subscribe for changes on any collection or do REST CRUD operations on user defined collections ignoring permissions. Version 11.3.0 fixes the issue.
๐@cveNotify
GitHub
Merge commit from fork (#24108) ยท directus/directus@ce0397d
* set default accountability for all unauthenticated connections
* Added changeset
* Added changeset
๐จ CVE-2025-24353
Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 11.2.0, when sharing an item, a typical user can specify an arbitrary role. It allows the user to use a higher-privileged role to see fields that otherwise the user should not be able to see. Instances that are impacted are those that use the share feature and have specific roles hierarchy and fields that are not visible for certain roles. Version 11.2.0 contains a patch the issue.
๐@cveNotify
Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 11.2.0, when sharing an item, a typical user can specify an arbitrary role. It allows the user to use a higher-privileged role to see fields that otherwise the user should not be able to see. Instances that are impacted are those that use the share feature and have specific roles hierarchy and fields that are not visible for certain roles. Version 11.2.0 contains a patch the issue.
๐@cveNotify
GitHub
Fix permission generation for Shares ๐ฐ (#23716) ยท directus/directus@e288a43
* Start work on share permissions
* implement fix for shares
* only allow shares on read
* clean up
* more cleanup
* cleanup
* account for undefined action and collections array
...
* implement fix for shares
* only allow shares on read
* clean up
* more cleanup
* cleanup
* account for undefined action and collections array
...
๐จ CVE-2024-45712
SolarWinds Serv-U is vulnerable to a client-side cross-site scripting (XSS) vulnerability. The vulnerability can only be performed by an authenticated account, on the local machine, from the local browser session. Therefore the risk is very low.
๐@cveNotify
SolarWinds Serv-U is vulnerable to a client-side cross-site scripting (XSS) vulnerability. The vulnerability can only be performed by an authenticated account, on the local machine, from the local browser session. Therefore the risk is very low.
๐@cveNotify
Solarwinds
Serv-U 15.5.1 release notes
Learn about the new features and improvements for Serv-U. The release notes list issues fixed in the release, open issues, and important installation hints. Release notes also include deprecation, end-of-life, and end-of-support notices.