radar

ONE Sentinel

shield

CVE Tracker

159,430 total CVEs

Live vulnerability feed from the National Vulnerability Database

8.6

curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not restrict requests to internal IP ranges, and follows redirects automatically via the underlying libcurl. Because of this, an attacker-controlled URL can redirect requests to internal services such as cloud metadata endpoints. In addition, curl_cffi’s TLS impersonation feature can make these requests appear as legitimate browser traffic, which may bypass certain network controls. This vulnerability is fixed in 0.15.0.

6.4

Pi-hole is a Linux network-level advertisement and Internet tracker blocking application. Version 6.4 has a local privilege-escalation vulnerability allows code execution as root from the low-privilege pihole account. Important context: the pihole account uses nologin, so this is not a direct interactive-login issue. However, nologin does not prevent code from running as UID pihole if a Pi-hole component is compromised. In that realistic post-compromise scenario, attacker-controlled content in /etc/pihole/versions is sourced by root-run Pi-hole scripts, leading to root code execution. This vulnerability is fixed in 6.4.1.

3.1

Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. From 6.0 to before 6.5, the formatInfo() function in queries.js renders data.upstream, data.client.ip, and data.ede.text into HTML without escaping when a user expands a query row in the Query Log, enabling stored HTML injection. JavaScript execution is blocked by the server's CSP (script-src 'self'). The same fields are properly escaped in the table view (rowCallback), confirming the omission was an oversight. This vulnerability is fixed in 6.5.

5.4

Multiple authenticated stored cross-site scripting (XSS) vulnerabilities in the Permissions module of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Group, Category or Description parameters.

5.4

An authenticated stored cross-site scripting (XSS) vulnerability in the Category module of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name parameter.

5.4

An authenticated stored cross-site scripting (XSS) vulnerability in the Role Management module of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Role Name parameter.

4.8

An authenticated stored cross-site scripting (XSS) vulnerability in the creation/editing module of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Title parameter.

5.4

An authenticated stored cross-site scripting (XSS) vulnerability in Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Page Sign parameter.

7.8

Memory Corruption when handling power management requests with improperly sized input/output buffers.

7.6

Transient DOS when receiving a service data frame with excessive length during device matching over a neighborhood awareness network protocol connection.

7.8

Memory Corruption when using deprecated DMABUF IOCTL calls to manage video memory.

7.8

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

7.8

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

7.8

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.

7.8

Memory Corruption when processing auxiliary sensor input/output control commands with insufficient buffer size validation.

7.8

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.

7.8

Memory Corruption when sending IOCTL requests with invalid buffer sizes during memcpy operations.

7.8

Memory Corruption when retrieving output buffer with insufficient size validation.

7.6

Transient DOS when processing nonstandard FILS Discovery Frames with out-of-range action sizes during initial scans.

7.1

Cryptographic issue while copying data to a destination buffer without validating its size.

8.8

Memory corruption when decoding corrupted satellite data files with invalid signature offsets.

7.8

Memory corruption while processing a frame request from user.

7.8

Memory corruption while preprocessing IOCTL request in JPEG driver.

7.8

Memory corruption when buffer copy operation fails due to integer overflow during attestation report generation.

6.5

Memory Corruption when accessing freed memory due to concurrent fence deregistration and signal handling.

Showing 8251-8275 of 159,430 CVEs