CVE Schwachstellen
CVE-Datenbank angereichert mit CISA KEV und NVD Daten
| CVE ID | CVSS | Schweregrad | KEV | Sichtungen |
|---|---|---|---|---|
| CVE-2026-22910 The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This represents a high risk to the integrity of the sy... | 7.5 | HIGH | — | 0 |
| CVE-2026-22911 Firmware update files may expose password hashes for system accounts, which could allow a remote attacker to recover credentials and gain unauthorized access to the device. | 5.3 | MEDIUM | — | 0 |
| CVE-2026-22912 Improper validation of a login parameter may allow attackers to redirect users to malicious websites after authentication. This can lead to various risk including stealing credentials from unsuspectin... | 4.3 | MEDIUM | — | 0 |
| CVE-2026-22913 Improper handling of a URL parameter may allow attackers to execute code in a user's browser after login. This can lead to the extraction of sensitive data. | 4.3 | MEDIUM | — | 0 |
| CVE-2026-22914 An attacker with limited permissions may still be able to write files to specific locations on the device, potentially leading to system manipulation. | 4.3 | MEDIUM | — | 0 |
| CVE-2026-22915 An attacker with low privileges may be able to read files from specific directories on the device, potentially exposing sensitive information. | 4.3 | MEDIUM | — | 0 |
| CVE-2025-70744 Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the cloneType parameter of the sub_65B5C function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a cra... | 7.5 | HIGH | — | 0 |
| CVE-2026-22916 An attacker with low privileges may be able to trigger critical system functions such as reboot or factory reset without proper restrictions, potentially leading to service disruption or loss of confi... | 4.3 | MEDIUM | — | 0 |
| CVE-2026-22917 Improper input handling in a system endpoint may allow attackers to overload resources, causing a denial of service. | 4.3 | MEDIUM | — | 0 |
| CVE-2026-22918 An attacker may exploit missing protection against clickjacking by tricking users into performing unintended actions through maliciously crafted web pages, leading to the extraction of sensitive data. | 4.3 | MEDIUM | — | 0 |
| CVE-2026-22919 An attacker with administrative access may inject malicious content into the login page, potentially enabling cross-site scripting (XSS) attacks, leading to the extraction of sensitive data. | 3.8 | LOW | — | 0 |
| CVE-2026-22920 The device's passwords have not been adequately salted, making them vulnerable to password extraction attacks. | 3.7 | LOW | — | 0 |
| CVE-2026-0897 Allocation of Resources Without Limits or Throttling in the HDF5 weight loading component in Google Keras 3.0.0 through 3.13.0 on all platforms allows a remote attacker to cause a Denial of Service (D... | 7.5 | HIGH | — | 0 |
| CVE-2026-22644 Certain requests pass the authentication token in the URL as string query parameter, making it vulnerable to theft through server logs, proxy logs and Referer headers, which could allow an attacker to... | 5.3 | MEDIUM | — | 0 |
| CVE-2026-22645 The application discloses all used components, versions and license information to unauthenticated actors, giving attackers the opportunity to target known security vulnerabilities of used components. | 5.3 | MEDIUM | — | 0 |
| CVE-2026-22646 Certain error messages returned by the application expose internal system details that should not be visible to end users, providing attackers with valuable reconnaissance information (like file paths... | 4.3 | MEDIUM | — | 0 |
| CVE-2025-67081 An SQL injection vulnerability in Itflow through 25.06 has been identified in the "role_id" parameter when editing a profile. An attacker with admin account can exploit this issue via blind SQL inject... | 4.9 | MEDIUM | — | 0 |
| CVE-2025-67082 An SQL injection vulnerability in InvoicePlane through 1.6.3 has been identified in "maxQuantity" and "minQuantity" parameters when generating a report. An authenticated attacker can exploit this issu... | 6.5 | MEDIUM | — | 0 |
| CVE-2025-67083 Directory traversal vulnerability in InvoicePlane through 1.6.3 allows unauthenticated attackers to read files from the server. The ability to read files and the file type depends on the web server an... | 5.3 | MEDIUM | — | 0 |
| CVE-2025-67084 File upload vulnerability in InvoicePlane through 1.6.3 allows authenticated attackers to upload arbitrary PHP files into attachments, which can later be executed remotely, leading to Remote Code Exec... | 9.9 | CRITICAL | — | 0 |
| CVE-2021-47752 AWebServer GhostBuilding 18 contains a denial of service vulnerability that allows remote attackers to overwhelm the server by sending multiple concurrent HTTP requests. Attackers can generate high-vo... | 7.5 | HIGH | — | 0 |
| CVE-2021-47753 phpKF CMS 3.00 Beta y6 contains an unauthenticated file upload vulnerability that allows remote attackers to execute arbitrary code by bypassing file extension checks. Attackers can upload a PHP file ... | 9.8 | CRITICAL | — | 0 |
| CVE-2021-47754 Arunna 1.0.0 contains a cross-site request forgery vulnerability that allows attackers to manipulate user profile settings without authentication. Attackers can craft a malicious form to change user d... | 6.5 | MEDIUM | — | 0 |
| CVE-2021-47755 Oliver Library Server v5 contains a file download vulnerability that allows unauthenticated attackers to access arbitrary system files through unsanitized input in the FileServlet endpoint. Attackers ... | 7.5 | HIGH | — | 0 |
| CVE-2021-47757 Chikitsa Patient Management System 2.0.2 contains an authenticated remote code execution vulnerability in the backup restoration functionality. Authenticated attackers can upload a modified backup zip... | 8.8 | HIGH | — | 0 |
| CVE-2021-47758 Chikitsa Patient Management System 2.0.2 contains an authenticated remote code execution vulnerability that allows attackers to upload malicious PHP plugins through the module upload functionality. Au... | 8.8 | HIGH | — | 0 |
| CVE-2021-47760 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority as a duplicate. | N/A | NONE | — | 0 |
| CVE-2025-47500 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Benjamin Intal Stackable stackable-ultimate-gutenberg-blocks allows Stored XSS.This issue affects ... | 5.4 | MEDIUM | — | 0 |
| CVE-2021-47764 AbsoluteTelnet 11.24 contains a denial of service vulnerability that allows local attackers to crash the application by manipulating DialUp connection and license name fields. Attackers can generate a... | 5.5 | MEDIUM | — | 0 |
| CVE-2021-47765 AbsoluteTelnet 11.24 contains a denial of service vulnerability that allows local attackers to crash the application by manipulating username and error report fields. Attackers can trigger the crash b... | 5.5 | MEDIUM | — | 0 |
| CVE-2021-47767 10-Strike Network Inventory Explorer Pro 9.31 contains an unquoted service path vulnerability in the srvInventoryWebServer service running with LocalSystem privileges. Attackers can exploit the unquot... | 7.8 | HIGH | — | 0 |
| CVE-2021-47768 ImportExportTools NG 10.0.4 contains a persistent HTML injection vulnerability in the email export module that allows remote attackers to inject malicious HTML payloads. Attackers can send emails with... | 6.1 | MEDIUM | — | 0 |
| CVE-2021-47769 Isshue Shopping Cart 3.5 contains a persistent cross-site scripting vulnerability in title input fields across stock, customer, and invoice modules. Attackers with privileged user accounts can inject ... | 4.8 | MEDIUM | — | 0 |
| CVE-2021-47771 RDP Manager 4.9.9.3 contains a denial of service vulnerability in connection input fields that allows local attackers to crash the application. Attackers can add oversized entries in Verbindungsname a... | 5.5 | MEDIUM | — | 0 |
| CVE-2021-47772 10-Strike Network Inventory Explorer Pro 9.31 contains a buffer overflow vulnerability in the text file import functionality that allows remote code execution. Attackers can craft a malicious text fil... | 9.8 | CRITICAL | — | 0 |
| CVE-2021-47773 Dynojet Power Core 2.3.0 contains an unquoted service path vulnerability in the DJ.UpdateService that allows local authenticated users to potentially execute code with elevated privileges. Attackers c... | 7.8 | HIGH | — | 0 |
| CVE-2021-47776 Umbraco CMS v8.14.1 contains a server-side request forgery vulnerability that allows attackers to manipulate baseUrl parameters in multiple dashboard and help controller endpoints. Attackers can craft... | 5.3 | MEDIUM | — | 0 |
| CVE-2021-47843 Tagstoo 2.0.1 contains a stored cross-site scripting vulnerability that allows attackers to inject malicious payloads through files or custom tags. Attackers can execute arbitrary JavaScript code to s... | 5.4 | MEDIUM | — | 0 |
| CVE-2025-64516 GLPI is a free asset and IT management software package. Prior to 10.0.21 and 11.0.3, an unauthorized user can access GLPI documents attached to any item (ticket, asset, ...). If the public FAQ is ena... | 7.5 | HIGH | — | 0 |
| CVE-2025-67076 Directory traversal vulnerability in Omnispace Agora Project before 25.10 allowing unauthenticated attackers to read files on the system via the misc controller and the ExternalGetFile action. Only fi... | 7.5 | HIGH | — | 0 |
| CVE-2025-67077 File upload vulnerability in Omnispace Agora Project before 25.10 allowing authenticated, or under certain conditions also guest users, via the UploadTmpFile action. | 8.8 | HIGH | — | 0 |
| CVE-2025-67079 File upload vulnerability in Omnispace Agora Project before 25.10 allowing attackers to execute code through the MSL engine of the Imagick library via crafted PDF file to the file upload and thumbnail... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-36396 IBM Application Gateway 23.10 through 25.09 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the in... | 5.4 | MEDIUM | — | 0 |
| CVE-2025-67246 A local information disclosure vulnerability exists in the Ludashi driver before 5.1025 due to a lack of access control in the IOCTL handler. This driver exposes a device interface accessible to a nor... | 7.3 | HIGH | — | 0 |
| CVE-2025-66417 GLPI is a free asset and IT management software package. From 11.0.0, < 11.0.3, an unauthenticated user can perform a SQL injection through the inventory endpoint. This vulnerability is fixed in 11.0.... | 7.5 | HIGH | — | 0 |
| CVE-2025-70298 GPAC v2.4.0 was discovered to contain an out-of-bounds read in the oggdmx_parse_tags function. | 8.2 | HIGH | — | 0 |
| CVE-2025-70304 A buffer overflow in the vobsub_get_subpic_duration() function of GPAC v2.4.0 allows attackers to cause a Denial of Service (DoS) via a crafted packet. | 7.5 | HIGH | — | 0 |
| CVE-2025-70305 A stack overflow in the dmx_saf function of GPAC v2.4.0 allows attackers to cause a Denial of Service (DoS) via a crafted .saf file. | 5.5 | MEDIUM | — | 0 |
| CVE-2025-70308 An out-of-bounds read in the GSF demuxer filter component of GPAC v2.4.0 allows attackers to cause a Denial of Service (DoS) via a crafted .gsf file. | 7.5 | HIGH | — | 0 |
| CVE-2025-70309 A stack overflow in the pcmreframe_flush_packet function of GPAC v2.4.0 allows attackers to cause a Denial of Service (DoS) via a crafted WAV file. | 5.5 | MEDIUM | — | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.