Vulnerabilidades CVE
Base de datos de vulnerabilidades CVE enriquecida con datos de CISA KEV y NVD
| CVE ID | CVSS | Severidad | KEV | Avistamientos |
|---|---|---|---|---|
| CVE-2024-56040 Incorrect Privilege Assignment vulnerability in VibeThemes VibeBP vibebp allows Privilege Escalation.This issue affects VibeBP: from n/a through <= 1.9.9.4.1. | 9.8 | CRITICAL | — | 0 |
| CVE-2026-34018 An SQL injection vulnerability exists in CubeCart prior to 6.6.0, which may allow an attacker to execute an arbitrary SQL statement on the product. | 9.8 | CRITICAL | — | 0 |
| CVE-2026-4622 OS Command Injection vulnerability in NEC Platforms, Ltd. Aterm Series allows a attacker to execute arbitrary OS commands via network. | 9.8 | CRITICAL | — | 0 |
| CVE-2026-4620 OS Command Injection vulnerability in NEC Platforms, Ltd. Aterm Series allows a attacker to execute arbitrary OS commands via network. | 9.8 | CRITICAL | — | 0 |
| CVE-2026-4619 Path Traversal vulnerability in NEC Platforms, Ltd. Aterm Series allows a attacker to wtite over any file via network. | 9.8 | CRITICAL | — | 0 |
| CVE-2026-29649 NEMU contains an implementation flaw in its RISC-V Hypervisor CSR handling where henvcfg[7:4] (CBIE/CBCFE/CBZE-related fields) is incorrectly masked/updated based on menvcfg[7:4], so a machine-mode wr... | 9.8 | CRITICAL | — | 0 |
| CVE-2013-6671 The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary ... | 9.8 | CRITICAL | — | 0 |
| CVE-2013-5609 Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to ca... | 9.8 | CRITICAL | — | 0 |
| CVE-2026-5963 EasyFlow .NET developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents. | 9.8 | CRITICAL | — | 0 |
| CVE-2026-35546 Anviz CX2 Lite and CX7 are vulnerable to unauthenticated firmware uploads. This causes crafted archives to be accepted, enabling attackers to plant and execute code and obtain a reverse shell. | 9.8 | CRITICAL | — | 0 |
| CVE-2012-6068 The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener serv... | 9.8 | CRITICAL | — | 0 |
| CVE-2013-5618 Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderb... | 9.8 | CRITICAL | — | 0 |
| CVE-2026-5964 EasyFlow .NET developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents. | 9.8 | CRITICAL | — | 0 |
| CVE-2026-39918 Vvveb prior to 1.0.8.1 contains a code injection vulnerability in the installation endpoint where the subdir POST parameter is written unsanitized into the env.php configuration file without escaping ... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-14495 webadmin.c in 3proxy before 0.8.13 has an out-of-bounds write in the admin interface. | 9.8 | CRITICAL | — | 0 |
| CVE-2017-18514 The simple-login-log plugin before 1.1.2 for WordPress has SQL injection. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-15780 The formidable plugin before 4.02.01 for WordPress has unsafe deserialization. | 9.8 | CRITICAL | — | 0 |
| CVE-2017-8410 An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The binary rtspd in /sbin folder of the device handles all the rtsp connections received by the device. It seems that the binary perfor... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-15151 AdPlug 2.3.1 has a double free in the Cu6mPlayer class in u6m.h. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-13585 The remote admin webserver on FANUC Robotics Virtual Robot Controller 8.23 has a Buffer Overflow via a forged HTTP request. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-13572 The Adenion Blog2Social plugin through 5.5.0 for WordPress allows SQL Injection. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-7269 Linear eMerge 50P/5000P devices allow Authenticated Command Injection with root Code Execution. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-4483 IBM Contract Management 10.1.0 through 10.1.3 and IBM Emptoris Spend Analysis 10.1.0 through 10.1.3 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-11710 Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of ... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-13578 A SQL injection vulnerability exists in the Impress GiveWP Give plugin through 2.5.0 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-14313 A SQL injection vulnerability exists in the 10Web Photo Gallery plugin before 1.5.31 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-11705 A flaw in Thunderbird's implementation of iCal causes a stack buffer overflow in icalrecur_add_bydayrules when processing certain email messages, resulting in a potentially exploitable crash. This vul... | 9.8 | CRITICAL | — | 0 |
| CVE-2015-9298 The events-manager plugin before 5.6 for WordPress has code injection. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-16644 App\Home\Controller\ZhuantiController.class.php in TuziCMS 2.0.6 has SQL injection via the index.php/Zhuanti/group?id= substring. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-12797 A clone version of an ELM327 OBD2 Bluetooth device has a hardcoded PIN, leading to arbitrary commands to an OBD-II bus of a vehicle. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-10989 In WebAccess/SCADA Versions 8.3.5 and prior, multiple heap-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vu... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-5454 SQL Injection in the Nextcloud Android app prior to version 3.0.0 allows to destroy a local cache when a harmful query is executed requiring to resetup the account. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-10991 In WebAccess/SCADA, Versions 8.3.5 and prior, multiple stack-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these ... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-11704 A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in icalmemory_strdup_and_dequote when processing certain email messages, resulting in a potentially exploitable crash. This... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-7667 Prima Systems FlexAir, Versions 2.3.38 and prior. The application generates database backup files with a predictable name, and an attacker can use brute force to identify the database backup file name... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-11703 A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in parser_get_next_char when processing certain email messages, resulting in a potentially exploitable crash. This vulnerab... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-5608 In FreeBSD 12.0-STABLE before r350648, 12.0-RELEASE before 12.0-RELEASE-p9, 11.3-STABLE before r350650, 11.3-RELEASE before 11.3-RELEASE-p2, and 11.2-RELEASE before 11.2-RELEASE-p13, the ICMPv6 input ... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-10993 In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulnerabilities may allow a remote attacker to execute arbitrary code. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-4481 IBM Contract Management 10.1.0 through 10.1.3 and IBM Emptoris Spend Analysis 10.1.0 through 10.1.3 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-13372 /web/Lib/Action/IndexAction.class.php in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 allows remote attackers to execute arbitrary PHP code via a cookie because a cookie's username fie... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-3793 Pivotal Apps Manager Release, versions 665.0.x prior to 665.0.28, versions 666.0.x prior to 666.0.21, versions 667.0.x prior to 667.0.7, contain an invitation service that accepts HTTP. A remote unaut... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-7265 Linear eMerge E3-Series devices allow Remote Code Execution (root access over SSH). | 9.8 | CRITICAL | — | 0 |
| CVE-2019-7267 Linear eMerge 50P/5000P devices allow Cookie Path Traversal. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-7266 Linear eMerge 50P/5000P devices allow Authentication Bypass. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-13144 myTinyTodo 1.3.3 through 1.4.3 allows CSV Injection. This is fixed in 1.5. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-11064 A vulnerability of remote credential disclosure was discovered in Advan VD-1 firmware versions up to 230. An attacker can export system configuration which is not encrypted to get the administrator’s ... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-4336 IBM Robotic Process Automation with Automation Anywhere 11 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 161411. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-13107 Multiple integer overflows exist in MATIO before 1.5.16, related to mat.c, mat4.c, mat5.c, mat73.c, and matvar_struct.c | 9.8 | CRITICAL | — | 0 |
| CVE-2019-3899 It was found that default configuration of Heketi does not require any authentication potentially exposing the management interface to misuse. This isue only affects heketi as shipped with Openshift C... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-13575 A SQL injection vulnerability exists in WPEverest Everest Forms plugin for WordPress through 1.4.9. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL... | 9.8 | CRITICAL | — | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.