CVE Vulnerabilities
CVE vulnerability database enriched with CISA KEV and NVD data
| CVE ID | CVSS | Severity | KEV | Sightings |
|---|---|---|---|---|
| CVE-2023-38036 A security vulnerability within Ivanti Avalanche Manager before version 6.4.1 may allow an unauthenticated attacker to create a buffer overflow that could result in service disruption or arbitrary cod... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-5288 The REST API | Custom API Generator For Cross Platform And Import Export In WP plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the process_handler() fun... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-6058 The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versi... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-30065 Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code Users are recommended to upgrade to version 1.15.1, which fixes t... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-2244 A vulnerability in theΒ sendMailFromRemoteSourceΒ method in Emails.phpΒ as used in Bitdefender GravityZone Console unsafely uses php unserialize()Β on user-supplied input without validation. By crafting ... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-22941 A command injection vulnerability in the web interface of Adtran 411 ONT L80.00.0011.M2 allows attackers to escalate privileges to root and execute arbitrary commands. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-22939 A command injection vulnerability in the telnet service of Adtran 411 ONT L80.00.0011.M2 allows attackers to escalate privileges to root and execute arbitrary commands. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-22938 Adtran 411 ONT L80.00.0011.M2 was discovered to contain weak default passwords. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-22937 An issue in Adtran 411 ONT vL80.00.0011.M2 allows attackers to escalate privileges via unspecified vectors. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-46060 Buffer Overflow vulnerability in TOTOLINK N600R v4.3.0cu.7866_B2022506 allows a remote attacker to execute arbitrary code via the UPLOAD_FILENAME component | 9.8 | CRITICAL | β | 0 |
| CVE-2025-28386 A remote code execution (RCE) vulnerability in the Plugin Management component of OpenC3 COSMOS v6.0.0 allows attackers to execute arbitrary code via uploading a crafted .txt file. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-28389 Weak password requirements in OpenC3 COSMOS v6.0.0 allow attackers to bypass authentication via a brute force attack. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-4828 The Support Board plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the sb_file_delete function in all versions up to, and including, 3.8.0. Thi... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-25610 A buffer underwrite ('buffer underflow') vulnerability in the administrative interface of Fortinet FortiOS version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.6, version 6.4.0 through 6.4.11 and ve... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-12909 A vulnerability in the FinanceChatLlamaPack of the run-llama/llama_index repository, versions up to v0.12.3, allows for SQL injection in the `run_sql_query` function of the `database_agent`. This vuln... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-4855 The Support Board plugin for WordPress is vulnerable to unauthorized access/modification/deletion of data due to use of hardcoded default secrets in the sb_encryption() function in all versions up to,... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-10264 HTTP Request Smuggling vulnerability in netease-youdao/qanything version 1.4.1 allows attackers to exploit inconsistencies in the interpretation of HTTP requests between a proxy and a server. This can... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-27782 Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file write in inference.py. This issue may lead to writing arbitrary files on the Applio server. It can a... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-27781 Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in inference.py. `model_file` in inference.py as well as `model_file` in tts.py take user-su... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-27780 Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in model_information.py. `model_name` in model_information.py takes user-supplied input (e.g... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-27779 Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in `model_blender.py` lines 20 and 21. `model_fusion_a` and `model_fusion_b` from voice_blen... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-27778 Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in `infer.py`. The issue can lead to remote code execution. As of time of publication, a fix... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-21619 GLPI is a free asset and IT management software package. An administrator user can perfom a SQL injection through the rules configuration forms. This vulnerability is fixed in 10.0.18. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-52688 Successful exploitation of the vulnerability could allow an attacker to inject commands with root privileges on the access point, potentially leading to the loss of confidentiality, integrity, availab... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-40731 SQL injection vulnerability in Daily Expense Manager v1.0. This vulnerability allows an attacker to retrieve, create, update and delete databases through the pname, pprice and id parameters in /update... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-2000 A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0 thr... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-54449 Unrestricted Upload of File with Dangerous Type vulnerability in Samsung Electronics MagicINFO 9 Server allows Code Injection.This issue affects MagicINFO 9 Server: less than 21.1080.0. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-52689 Successful exploitation of the vulnerability could allow an unauthenticated attacker to obtain a valid session ID with administrator privileges by spoofing the login request, potentially allowing the ... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-9342 In Eclipse GlassFish version 7.0.16 or earlier it is possible to perform Login Brute Force attacks as there is no limitation in the number of failed login attempts. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-5396 The Bears Backup plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.0.0. This is due to the bbackup_ajax_handle() function not having a capability chec... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-51630 TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a buffer overflow via the ePort parameter in the function setIpPortFilterRules. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-6169 The WIMP website co-construction management platform from HAMASTAR Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, mod... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-6172 Permission vulnerability in the mobile application (com.afmobi.boomplayer) may lead to the risk of unauthorized operation. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-47868 Out-of-bounds Write resulting in possible Heap-based Buffer Overflow vulnerability was discovered in tools/bdf-converter font conversion utility that is part of Apache NuttX RTOS repository. This stan... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-47869 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability was discovered in Apache NuttX RTOS apps/exapmles/xmlrpc application. In this example application device stats str... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-53076 Improper Input Validation vulnerability in Samsung Open Source rLottie allows Overread Buffers.This issue affects rLottie: V0.2. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-6121 A vulnerability, which was classified as critical, has been found in D-Link DIR-632 FW103B08. Affected by this issue is the function get_pure_content of the component HTTP POST Request Handler. The ma... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-47539 An improper access control vulnerability in FortiMail version 7.4.0 configured with RADIUS authentication and remote_wildcard enabled may allow a remote unauthenticated attacker to bypass admin login ... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-54448 Unrestricted Upload of File with Dangerous Type vulnerability in Samsung Electronics MagicINFO 9 Server allows Code Injection.This issue affects MagicINFO 9 Server: less than 21.1080.0. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-1550 The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the ar... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-6222 The WooCommerce Refund And Exchange with RMA - Warranty Management, Refund Policy, Manage User Wallet theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-26854 A SQL injection in Articles Good Search extension 1.0.0 - 1.2.4.0011 for Joomla allows attackers to execute arbitrary SQL commands. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-26855 A SQL injection in Articles Calendar extension 1.0.0 - 1.0.1.0007 for Joomla allows attackers to execute arbitrary SQL commands. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-7444 The LoginPress Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.0.1. This is due to insufficient verification on the user being returned by the s... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-0838 There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argu... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-0896 Orthanc server prior to version 1.5.8 does not enable basic authentication by default when remote access is enabled. This could result in unauthorized access by an attacker. | 9.8 | CRITICAL | β | 0 |
| CVE-2025-7696 The Integration for Pipedrive and Contact Form 7, WPForms, Elementor, Ninja Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.3 via deserializa... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-22992 A SQL Injection vulnerability exists in the /feed/insert.json endpoint of the Emoncms project >= 11.6.9. The vulnerability is caused by improper handling of user-supplied input in the data query param... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-7697 The Integration for Google Sheets and Contact Form 7, WPForms, Elementor, Ninja Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.1.1 via deseria... | 9.8 | CRITICAL | β | 0 |
| CVE-2025-54446 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Samsung Electronics MagicINFO 9 Server allows Upload a Web Shell to a Web Server.This issue affects Magi... | 9.8 | CRITICAL | β | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.