Vulnerabilidades CVE
Base de datos de vulnerabilidades CVE enriquecida con datos de CISA KEV y NVD
| CVE ID | CVSS | Severidad | KEV | Avistamientos |
|---|---|---|---|---|
| CVE-2024-10547 The WP Membership plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the user_profile_image_upload() function in all versions up to, and including, 1.6... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-10589 The Leopard - WordPress Offload Media plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the import_sett... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-10801 The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_manage_file_chunk_upload() function in all versions up to, ... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-10871 The Category Ajax Filter plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.8.2 via the 'params[caf-post-layout]' parameter. This makes it possible for ... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-30764 OS command injection vulnerability exists in KB-AHR series and KB-IRIP series. If this vulnerability is exploited, an arbitrary OS command may be executed on the product or the device settings may be ... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-30762 Improper authentication vulnerability exists in KB-AHR series and KB-IRIP series. If this vulnerability is exploited, an arbitrary OS command may be executed on the product or the device settings may ... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-32674 Certain versions of HP PC Hardware Diagnostics Windows are potentially vulnerable to buffer overflow. | 9.8 | CRITICAL | β | 0 |
| CVE-2023-32673 Certain versions of HP PC Hardware Diagnostics Windows, HP Image Assistant, and HP Thunderbolt Dock G2 Firmware are potentially vulnerable to elevation of privilege. | 9.8 | CRITICAL | β | 0 |
| CVE-2023-26295 Previous versions of HP Device Manager (prior to HPDM 5.0.10) could potentially allow command injection and/or elevation of privileges. | 9.8 | CRITICAL | β | 0 |
| CVE-2023-27837 TP-Link TL-WPA8630P (US)_ V2_ Version 171011 was discovered to contain a command injection vulnerability via the key parameter in the function sub_ 40A774. | 9.8 | CRITICAL | β | 0 |
| CVE-2023-27716 An issue was discovered in freakchicken kafkaUI-lite 1.2.11 allows attackers on the same network to gain escalated privileges for the nodes running on it. | 9.8 | CRITICAL | β | 0 |
| CVE-2023-35034 Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8 and Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8 allow remote code execution by unauthenticated users, aka OSFOURK-24... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-34364 A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-29405 The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This ... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-29404 The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This ... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-29402 The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted modu... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-34754 bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerability via the pid parameter at admin/index.php?mode=settings&page=plugins&action=edit. | 9.8 | CRITICAL | β | 0 |
| CVE-2024-55875 http4k is a functional toolkit for Kotlin HTTP applications. Prior to version 5.41.0.0, there is a potential XXE (XML External Entity Injection) vulnerability when http4k handling malicious XML conten... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-10124 The Vayu Blocks β Gutenberg Blocks for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation due to a missing capability check on the ... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-9290 The Super Backup & Clone - Migrate for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation and a missing capability check on the ibk_restore_migr... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-11015 The Sign In With Google plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.8.0. This is due to the 'authenticate_user' user function not implementing s... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-44299 The issue was addressed with improved bounds checks. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker may be able to cause unexpected system termination or arbitrary code execution in DCP ... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-44242 The issue was addressed with improved bounds checks. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker may be able to cause unexpected system termination or arbitrary code execution in DCP ... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-44241 The issue was addressed with improved bounds checks. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker may be able to cause unexpected system termination or arbitrary code execution in DCP ... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-11948 GFI Archiver Telerik Web UI Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Authentication is not r... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-11737 CWE-20: Improper Input Validation vulnerability exists that could lead to a denial of service and a loss of confidentiality, integrity of the controller when an unauthenticated crafted Modbus packet i... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-28582 Memory corruption in Data Modem while verifying hello-verify message during the DTLS handshake. | 9.8 | CRITICAL | β | 0 |
| CVE-2024-1981 The Migration, Backup, Staging β WPvivid plugin for WordPress is vulnerable to SQL Injection via the 'table_prefix' parameter in version 0.9.68 due to insufficient escaping on the user supplied parame... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-25833 F-logic DataCube3 v1.0 is vulnerable to unauthenticated SQL injection, which could allow an unauthenticated malicious actor to execute arbitrary SQL queries in database. | 9.8 | CRITICAL | β | 0 |
| CVE-2024-23807 The Apache Xerces C++ XML parser on versions 3.0.0 before 3.2.5 contains a use-after-free error triggered during the scanning of external DTDs. Users are recommended to upgrade to version 3.2.5 which... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-23052 An issue in WuKongOpenSource WukongCRM v.72crm_9.0.1_20191202 allows a remote attacker to execute arbitrary code via the parseObject() function in the fastjson component. | 9.8 | CRITICAL | β | 0 |
| CVE-2023-51653 Hertzbeat is a real-time monitoring system. In the implementation of `JmxCollectImpl.java`, `JMXConnectorFactory.connect` is vulnerable to JNDI injection. The corresponding interface is `/api/monitor/... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-51389 Hertzbeat is a real-time monitoring system. At the interface of `/define/yml`, SnakeYAML is used as a parser to parse yml content, but no security configuration is used, resulting in a YAML deserializ... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-51388 Hertzbeat is a real-time monitoring system. In `CalculateAlarm.java`, `AviatorEvaluator` is used to directly execute the expression function, and no security policy is configured, resulting in Aviator... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-27195 Trimble TM4Web 22.2.0 allows unauthenticated attackers to access /inc/tm_ajax.msw?func=UserfromUUID&uuid= to retrieve the last registration access code and use this access code to register a valid acc... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-27823 An authentication bypass in Optoma 1080PSTX C02 allows an attacker to access the administration console without valid credentials. | 9.8 | CRITICAL | β | 0 |
| CVE-2023-31985 A Command Injection vulnerability in Edimax Wireless Router N300 Firmware BR-6428NS_v4 allows attacker to execute arbitrary code via the formAccept function in /bin/webs without any limitations. | 9.8 | CRITICAL | β | 0 |
| CVE-2023-30246 SQL injection vulnerability found in Judging Management System v.1.0 allows a remote attacker to execute arbitrary code via the contestant_id parameter. | 9.8 | CRITICAL | β | 0 |
| CVE-2023-29809 SQL injection vulnerability found in Maximilian Vogt companymaps (cmaps) v.8.0 allows a remote attacker to execute arbitrary code via a crafted script in the request. | 9.8 | CRITICAL | β | 0 |
| CVE-2024-21652 Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.8.13, 2.9.9, and 2.10.4, an attacker can exploit a chain of vulnerabilities, including a Denial of Service... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-29876 SQL injection vulnerability in Sentrifugo 3.2, throughΒ /sentrifugo/index.php/reports/activitylogreport, 'sortby' parameter. The exploitation of this vulnerability could allow a remote user to send ... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-30330 SoftExpert (SE) Excellence Suite 2.x versions before 2.1.3 is vulnerable to Local File Inclusion in the function /se/v42300/generic/gn_defaultframe/2.0/defaultframe_filter.php. | 9.8 | CRITICAL | β | 0 |
| CVE-2024-46613 WeeChat before 4.4.2 has an integer overflow and resultant buffer overflow at core/core-string.c when there are more than two billion items in a list. This affects string_free_split_shared , string_fr... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-24540 Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript conte... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-1967 Keysight N8844A Data Analytics Web Service deserializes untrusted data without sufficiently verifying the resulting data will be valid. | 9.8 | CRITICAL | β | 0 |
| CVE-2022-46732 Even if the authentication fails for local service authentication, the requested command could still execute regardless of authentication status. | 9.8 | CRITICAL | β | 0 |
| CVE-2024-27565 A Server-Side Request Forgery (SSRF) in weixin.php of ChatGPT-wechat-personal commit a0857f6 allows attackers to force the application to make arbitrary requests. | 9.8 | CRITICAL | β | 0 |
| CVE-2022-30136 Windows Network File System Remote Code Execution Vulnerability | 9.8 | CRITICAL | β | 0 |
| CVE-2022-29130 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | 9.8 | CRITICAL | β | 0 |
| CVE-2022-26937 Windows Network File System Remote Code Execution Vulnerability | 9.8 | CRITICAL | β | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.