CVE-2025-14016
- EPSS 0.07%
- Veröffentlicht 04.12.2025 18:32:07
- Zuletzt bearbeitet 15.12.2025 15:44:52
A security vulnerability has been detected in macrozheng mall-swarm up to 1.0.3. Affected is the function delete of the file /member/readHistory/delete. Such manipulation of the argument ids leads to improper authorization. The attack can be executed...
CVE-2025-13118
- EPSS 0.05%
- Veröffentlicht 13.11.2025 15:02:05
- Zuletzt bearbeitet 25.11.2025 16:23:03
A vulnerability was detected in macrozheng mall-swarm and mall up to 1.0.3. Affected by this issue is the function paySuccess of the file /order/paySuccess. The manipulation of the argument orderID results in improper authorization. The attack can be...
CVE-2025-13117
- EPSS 0.05%
- Veröffentlicht 13.11.2025 14:32:06
- Zuletzt bearbeitet 25.11.2025 16:17:29
A security vulnerability has been detected in macrozheng mall-swarm and mall up to 1.0.3. Affected by this vulnerability is the function cancelOrder of the file /order/cancelOrder. The manipulation of the argument orderId leads to improper authorizat...
CVE-2025-13116
- EPSS 0.05%
- Veröffentlicht 13.11.2025 14:15:48
- Zuletzt bearbeitet 25.11.2025 16:37:53
A weakness has been identified in macrozheng mall-swarm and mall up to 1.0.3. Affected is the function cancelUserOrder of the file /order/cancelUserOrder. Executing manipulation of the argument orderId can lead to improper authorization. It is possib...
CVE-2025-13115
- EPSS 0.05%
- Veröffentlicht 13.11.2025 13:32:09
- Zuletzt bearbeitet 25.11.2025 16:40:57
A security flaw has been discovered in macrozheng mall-swarm and mall up to 1.0.3. This impacts the function detail of the file /order/detail/ of the component Order Details Handler. Performing manipulation of the argument orderId results in improper...
CVE-2025-13114
- EPSS 0.04%
- Veröffentlicht 13.11.2025 13:32:06
- Zuletzt bearbeitet 25.11.2025 17:33:19
A vulnerability was identified in macrozheng mall-swarm up to 1.0.3. This affects the function updateAttr of the file /cart/update/attr. Such manipulation leads to improper authorization. The attack may be performed from remote. The exploit is public...