CVE Vulnerabilities
CVE vulnerability database enriched with CISA KEV and NVD data
| CVE ID | CVSS | Severity | KEV | Sightings |
|---|---|---|---|---|
| CVE-2024-6981 OMNTEC Proteus Tank Monitoring OEL8000III Series could allow an attacker to perform administrative actions without proper authentication. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-8310 OPW Fuel Management Systems SiteSentinel could allow an attacker to bypass authentication to the server and obtain full admin privileges. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-46957 Mellium mellium.im/xmpp 0.0.1 through 0.21.4 allows response spoofing if the implementation uses predictable IDs because the stanza type is not checked. This is fixed in 0.22.0. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-42507 Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point mana... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-42506 Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point mana... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-42505 Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point mana... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-8791 The Donation Forms by Charitable – Donations Plugin & Fundraising Platform for WordPress plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.8.1.14. This... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-8456 Certain switch models from PLANET Technology lack proper access control in firmware upload and download functionality, allowing unauthenticated remote attackers to download and upload firmware and sys... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-45489 Arc before 2024-08-26 allows remote code execution in JavaScript boosts. Boosts that run JavaScript cannot be shared by default; however (because of misconfigured Firebase ACLs), it is possible to cre... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-9043 Secure Email Gateway from Cellopoint has Buffer Overflow Vulnerability in authentication process. Remote unauthenticated attackers can send crafted packets to crash the process, thereby bypassing auth... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-8853 The Webo-facto plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.40 due to insufficient restriction on the 'doSsoAuthentification' function. This makes it ... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-46983 sofa-hessian is an internal improved version of Hessian3/4 powered by Ant Group CO., Ltd. The SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous clas... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-45410 Traefik is a golang, Cloud Native Application Proxy. When a HTTP request is processed by Traefik, certain HTTP headers such as X-Forwarded-Host or X-Forwarded-Port are added by Traefik before the requ... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-9106 The Wechat Social login plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.3.0. This is due to insufficient verification on the user being supplied during ... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-9108 The Wechat Social login plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'convert_remoteimage_to_local' function in versions up to, and incl... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-40125 An arbitrary file upload vulnerability in the Media Manager function of Closed-Loop Technology CLESS Server v4.5.2 allows attackers to execute arbitrary code via uploading a crafted PHP file to the up... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-31570 libfreeimage in FreeImage 3.4.0 through 3.18.0 has a stack-based buffer overflow in the PluginXPM.cpp Load function via an XPM file. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-47088 This vulnerability exists in Apex Softcell LD Geo due to missing restrictions for excessive failed authentication attempts on its API based login. A remote attacker could exploit this vulnerability by... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-9265 The Echo RSS Feed Post Generator plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.4.6. This is due to the plugin not properly restricting the roles th... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-9289 The WordPress & WooCommerce Affiliate Program plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 8.4.1. This is due to the rtwwwap_login_request_callback... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-35515 Insecure deserialization in sqlitedict up to v2.1.0 allows attackers to execute arbitrary code. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-41276 A vulnerability in Kaiten version 57.131.12 and earlier allows attackers to bypass the PIN code authentication mechanism. The application requires users to input a 6-digit PIN code sent to their email... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-47608 Logicytics is designed to harvest and collect data for forensic analysis. Logicytics has a basic vuln affecting compromised devices from shell injections. This vulnerability is fixed in 2.3.2. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-45186 FileSender before 2.49 allows server-side template injection (SSTI) for retrieving credentials. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-40568 Buffer Overflow vulnerability in btstack mesh commit before v.864e2f2b6b7878c8fab3cf5ee84ae566e3380c58 allows a remote attacker to execute arbitrary code via the pb_adv_handle_tranaction_cont function... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-45415 The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in check_data_integrity function. This function is responsible for validating the checksum of data in post requ... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-45414 The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in webPrivateDecrypt function. This function is responsible for decrypting RSA encrypted ciphertext, the encryp... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-9441 The Linear eMerge e3-Series through version 1.00-07 is vulnerable to an OS command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary OS commands via the login_id par... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-44623 An issue in TuomoKu SPx-GC v.1.3.0 and before allows a remote attacker to execute arbitrary code via the child_process.js function. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-7104 Improper Control of Generation of Code ('Code Injection') vulnerability in SFS Consulting ww.Winsure allows Code Injection.This issue affects ww.Winsure: before 4.6.2. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-7098 Improper Restriction of XML External Entity Reference vulnerability in SFS Consulting ww.Winsure allows XML Injection.This issue affects ww.Winsure: before 4.6.2. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-6401 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SFS Consulting InsureE GL allows SQL Injection.This issue affects InsureE GL: before 4.6.2. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-46419 TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the setWizardCfg function via the ssid5g parameter. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-46451 TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the setWiFiAclRules function via the desc parameter. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-41925 The web service for ONS-S8 - Spectra Aggregation Switch includes functions which do not properly validate user input, allowing an attacker to traverse directories, bypass authentication, and execute r... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-43699 Delta Electronics DIAEnergie is vulnerable to an SQL injection in the script AM_RegReport.aspx. An unauthenticated attacker may be able to exploit this issue to obtain records contained in the targete... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-45697 Certain models of D-Link wireless routers have a hidden functionality where the telnet service is enabled when the WAN port is plugged in. Unauthorized remote attackers can log in and execute OS comma... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-45695 The web service of certain models of D-Link wireless routers contains a Stack-based Buffer Overflow vulnerability, which allows unauthenticated remote attackers to exploit this vulnerability to execut... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-45694 The web service of certain models of D-Link wireless routers contains a Stack-based Buffer Overflow vulnerability, which allows unauthenticated remote attackers to exploit this vulnerability to execut... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-44430 SQL Injection vulnerability in Best Free Law Office Management Software-v1.0 allows an attacker to execute arbitrary code and obtain sensitive information via a crafted payload to the kortex_lite/cont... | 9.8 | CRITICAL | — | 0 |
| CVE-2018-6180 A flaw in the profile section of Online Voting System 1.0 allows an unauthenticated user to set an arbitrary password for other accounts. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-47656 This vulnerability exists in Shilpi Client Dashboard due to missing restrictions for incorrect login attempts on its API based login. A remote attacker could exploit this vulnerability by conducting a... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-46049 Tenda O6 V3.0 firmware V1.0.0.7(2054) contains a stack overflow vulnerability in the formexeCommand function. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-46048 Tenda FH451 v1.0.0.9 has a command injection vulnerability in the formexeCommand function i | 9.8 | CRITICAL | — | 0 |
| CVE-2024-46044 CH22 V1.0.0.6(468) has a stack overflow vulnerability located in the fromqossetting function. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-47849 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in The Wikimedia Foundation Mediawiki - Cargo allows SQL Injection.This issue affects Mediawiki - Car... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-6656 Use of Hard-coded Credentials vulnerability in TNB Mobile Solutions Cockpit Software allows Read Sensitive Strings Within an Executable.This issue affects Cockpit Software: before v2.13. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-46046 Tenda FH451 v1.0.0.9 has a stack overflow vulnerability located in the RouteStatic function. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-45251 Elsight – CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | 9.8 | CRITICAL | — | 0 |
| CVE-2024-45252 Elsight – CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | 9.8 | CRITICAL | — | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.