Vulnerabilidades CVE
Base de datos de vulnerabilidades CVE enriquecida con datos de CISA KEV y NVD
| CVE ID | CVSS | Severidad | KEV | Avistamientos |
|---|---|---|---|---|
| CVE-2023-21478 Improper input validation vulnerability in TIGERF trustlet prior to SMR Apr-2023 Release 1 allows local attackers to access protected data. | 6.0 | MEDIUM | — | 0 |
| CVE-2008-6748 Eval injection vulnerability in Megacubo 5.0.7 allows remote attackers to inject and execute arbitrary PHP code via the play action in a mega:// URI. | N/A | NONE | — | 0 |
| CVE-2008-6749 Multiple SQL injection vulnerabilities in admin/usercheck.php in FlexPHPDirectory 0.0.1, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) checkus... | N/A | NONE | — | 0 |
| CVE-2008-6750 Unrestricted file upload vulnerability in add.php in FlexPHPDirectory 0.0.1 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a ... | N/A | NONE | — | 0 |
| CVE-2008-6751 Unrestricted file upload vulnerability in index.php in the Twitter Clone (TClone) plugin for ReVou Micro Blogging allows remote attackers to execute arbitrary code by uploading a file with an executab... | N/A | NONE | — | 0 |
| CVE-2025-53560 Deserialization of Untrusted Data vulnerability in rascals Noisa noisa allows Object Injection.This issue affects Noisa: from n/a through <= 2.6.0. | 8.8 | HIGH | — | 0 |
| CVE-2026-2171 A vulnerability was found in code-projects Online Student Management System 1.0. Affected is an unknown function of the file accounts.php of the component Login. Performing a manipulation of the argum... | 7.3 | HIGH | — | 0 |
| CVE-2024-39954 CWE-918 Server-Side Request Forgery (SSRF) in eventmesh-runtime module in WebhookUtil.java on windows\linux\mac os e.g. allows the attacker can abuse functionality on the server to read or update inte... | 6.3 | MEDIUM | — | 0 |
| CVE-2025-5260 Server-Side Request Forgery (SSRF) vulnerability in Pik Online Yazılım Çözümleri A.Ş. Pik Online allows Server Side Request Forgery.This issue affects Pik Online: before 3.1.5. | 8.6 | HIGH | — | 0 |
| CVE-2025-5261 Authorization Bypass Through User-Controlled Key vulnerability in Pik Online Yazılım Çözümleri A.Ş. Pik Online allows Exploitation of Trusted Identifiers.This issue affects Pik Online: before 3.1.5. | 7.5 | HIGH | — | 0 |
| CVE-2025-57727 In JetBrains IntelliJ IDEA before 2025.2 credentials disclosure was possible via remote reference | 4.7 | MEDIUM | — | 0 |
| CVE-2025-57728 In JetBrains IntelliJ IDEA before 2025.2 improper access control allowed Code With Me guest to discover hidden files | 6.5 | MEDIUM | — | 0 |
| CVE-2025-57729 In JetBrains IntelliJ IDEA before 2025.2 unexpected plugin startup was possible due to automatic LSP server start | 6.5 | MEDIUM | — | 0 |
| CVE-2025-57731 In JetBrains YouTrack before 2025.2.92387 stored XSS was possible via Mermaid diagram content | 8.7 | HIGH | — | 0 |
| CVE-2025-57732 In JetBrains TeamCity before 2025.07.1 privilege escalation was possible due to incorrect directory ownership | 7.5 | HIGH | — | 0 |
| CVE-2025-57733 In JetBrains TeamCity before 2025.07.1 sMTP injection was possible allowing modification of email content | 5.5 | MEDIUM | — | 0 |
| CVE-2025-57734 In JetBrains TeamCity before 2025.07.1 aWS credentials were exposed in Docker script files | 4.3 | MEDIUM | — | 0 |
| CVE-2025-7777 The mirror-registry doesn't properly sanitize the host header HTTP header in HTTP request received, allowing an attacker to perform malicious redirects to attacker-controlled domains or phishing campa... | 6.5 | MEDIUM | — | 0 |
| CVE-2025-54927 CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause unauthorized access to sensitive files when an authenticated attackers uses... | 4.9 | MEDIUM | — | 0 |
| CVE-2025-8102 The Easy Digital Downloads plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.5.0. This is due to missing nonce validations in the edd_sendwp_disc... | 5.4 | MEDIUM | — | 0 |
| CVE-2025-4437 There's a vulnerability in the CRI-O application where when container is launched with securityContext.runAsUser specifying a non-existent user, CRI-O attempts to create the user, reading the containe... | 5.7 | MEDIUM | — | 0 |
| CVE-2025-4877 There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() functi... | 4.5 | MEDIUM | — | 0 |
| CVE-2025-8453 CWE-269: Improper Privilege Management vulnerability exists that could cause privilege escalation and arbitrary code execution when a privileged engineer user with console access modifies a configurat... | 6.7 | MEDIUM | — | 0 |
| CVE-2025-50503 A vulnerability in the password reset workflow of the Touch Lebanon Mobile App 2.20.2 allows an attacker to bypass the OTP reset password mechanism. By manipulating the reset process, an unauthorized ... | 8.8 | HIGH | — | 0 |
| CVE-2025-54923 CWE-502: Deserialization of Untrusted Data vulnerability exists that could cause remote code execution and compromise of system integrity when authenticated users send crafted data to a network-expose... | N/A | NONE | — | 0 |
| CVE-2025-54924 CWE-918: Server-Side Request Forgery (SSRF) vulnerability exists that could cause unauthorized access to sensitive data when an attacker sends a specially crafted document to a vulnerable endpoint. | 7.5 | HIGH | — | 0 |
| CVE-2025-54925 CWE-918: Server-Side Request Forgery (SSRF) vulnerability exists that could cause unauthorized access to sensitive data when an attacker configures the application to access a malicious url. | 7.5 | HIGH | — | 0 |
| CVE-2025-54926 CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause remote code execution when an authenticated attacker with admin privileges ... | 7.2 | HIGH | — | 0 |
| CVE-2025-55483 Tenda AC6 V15.03.06.23_multi is vulnerable to Buffer Overflow in the function formSetMacFilterCfg via the parameters macFilterType and deviceList. | 7.5 | HIGH | — | 0 |
| CVE-2025-55499 Tenda AC6 V15.03.06.23_multi was discovered to contain a buffer overflow via the ntpServer parameter in the fromSetSysTime function. | 6.5 | MEDIUM | — | 0 |
| CVE-2025-55503 Tenda AC6 V15.03.06.23_multi has a stack overflow vulnerability via the deviceName parameter in the saveParentControlInfo function. | 7.3 | HIGH | — | 0 |
| CVE-2025-8449 CWE-400: Uncontrolled Resource Consumption vulnerability exists that could cause a denial of service when an authenticated user sends a specially crafted request to a specific endpoint from within the... | N/A | NONE | — | 0 |
| CVE-2024-57491 Authentication Bypass vulnerability in jobx up to v1.0.1-RELEASE allows an attacker can exploit this vulnerability to access sensitive API without any token via the preHandle function. | 8.8 | HIGH | — | 0 |
| CVE-2009-10005 ContentKeeper Web Appliance (now maintained by Impero Software) versions prior to 125.10 expose the mimencode binary via a CGI endpoint, allowing unauthenticated attackers to retrieve arbitrary files ... | N/A | NONE | — | 0 |
| CVE-2010-10014 Odin Secure FTP <= 4.1 is vulnerable to a stack-based buffer overflow when parsing directory listings received in response to an FTP LIST command. A malicious FTP server can send an overly long filena... | N/A | NONE | — | 0 |
| CVE-2010-20042 Xion Audio Player versions prior to 1.0.126 are vulnerable to a Unicode-based stack buffer overflow triggered by opening a specially crafted .m3u playlist file. The file contains an overly long string... | N/A | NONE | — | 0 |
| CVE-2010-20045 FileWrangler <= 5.30 suffers from a stack-based buffer overflow vulnerability when parsing directory listings from an FTP server. A malicious server can send an overlong folder name in response to a L... | N/A | NONE | — | 0 |
| CVE-2010-20049 LeapFTP < 3.1.x contains a stack-based buffer overflow vulnerability in its FTP client parser. When the client receives a directory listing containing a filename longer than 528 bytes, the application... | N/A | NONE | — | 0 |
| CVE-2010-20059 FreeNAS 0.7.2 prior to revision 5543 includes an unauthenticated command‐execution backdoor in its web interface. The exec_raw.php script exposes a cmd parameter that is passed directly to the underly... | N/A | NONE | — | 0 |
| CVE-2011-10020 Kaillera Server version 0.86 is vulnerable to a denial-of-service condition triggered by sending a malformed UDP packet after the initial handshake. Once a client sends a valid HELLO0.83 packet and re... | N/A | NONE | — | 0 |
| CVE-2011-10021 Magix Musik Maker 16 is vulnerable to a stack-based buffer overflow due to improper handling of .mmm arrangement files. The vulnerability arises from an unsafe strcpy() operation that fails to validat... | N/A | NONE | — | 0 |
| CVE-2025-8309 There is an improper privilege management vulnerability identified in ManageEngine's Asset Explorer, ServiceDesk Plus, ServiceDesk Plus MSP, and SupportCenter Plus products by Zohocorp. This vulnera... | 8.1 | HIGH | — | 0 |
| CVE-2011-10022 SPlayer version 3.7 and earlier is vulnerable to a stack-based buffer overflow when processing HTTP responses containing an overly long Content-Type header. The vulnerability occurs due to improper bo... | N/A | NONE | — | 0 |
| CVE-2011-10023 MJM QuickPlayer (likely now referred to as MJM Player) version 2010 contains a stack-based buffer overflow vulnerability triggered by opening a malicious .s3m music file. The flaw occurs due to improp... | N/A | NONE | — | 0 |
| CVE-2011-10024 MJM Core Player (likely now referred to as MJM Player) 2011 is vulnerable to a stack-based buffer overflow when parsing specially crafted .s3m music files. The vulnerability arises from improper bound... | N/A | NONE | — | 0 |
| CVE-2011-10025 Subtitle Processor 7.7.1 contains a buffer overflow vulnerability in its .m3u file parser. When a crafted playlist file is opened, the application converts input to Unicode and copies it to a fixed-si... | N/A | NONE | — | 0 |
| CVE-2011-10027 AOL Desktop 9.6 contains a buffer overflow vulnerability in its Tool\rich.rct component when parsing .rtx files. By embedding an overly long string in a hyperlink tag, an attacker can trigger a stack-... | N/A | NONE | — | 0 |
| CVE-2025-27714 An attacker could exploit this vulnerability by uploading arbitrary files via the a specific endpoint, leading to unauthorized remote code execution or system compromise. | 6.3 | MEDIUM | — | 0 |
| CVE-2011-10028 The RealNetworks RealArcade platform includes an ActiveX control (InstallerDlg.dll, version 2.6.0.445) that exposes a method named Exec via the StubbyUtil.ProcessMgr COM object. This method allows rem... | N/A | NONE | — | 0 |
| CVE-2011-10029 Solar FTP Server fails to properly handle format strings passed to the USER command. When a specially crafted string containing format specifiers is sent, the server crashes due to a read access viola... | N/A | NONE | — | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.