Vulnerabilites CVE
Base de donnees CVE enrichie avec CISA KEV et NVD
| CVE ID | CVSS | Severite | KEV | Observations |
|---|---|---|---|---|
| CVE-2024-20401 A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying oper... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-20681 In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-27781 Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in inference.py. `model_file` in inference.py as well as `model_file` in tts.py take user-su... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-54438 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Samsung Electronics MagicINFO 9 Server allows Upload a Web Shell to a Web Server.This issue affects Magi... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-27782 Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file write in inference.py. This issue may lead to writing arbitrary files on the Applio server. It can a... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-53484 User-controlled inputs are improperly escaped in: * VotePage.php (poll option input) * ResultPage::getPagesTab() and getErrorsTab() (user-controllable page names) This allow... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-30515 CyberData 011209 Intercom could allow an authenticated attacker to upload arbitrary files to multiple locations within the system. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-27540 A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'Authenticate' method. Th... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-25270 An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-4784 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Moderec Tourtella allows SQL Injection.This issue affects Tourtella: before 26.05.2025. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-6091 A vulnerability in significant-gravitas/autogpt version 0.5.1 allows an attacker to bypass the shell commands denylist settings. The issue arises when the denylist is configured to block specific comm... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-4822 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Bayraktar Solar Energies ScadaWatt Otopilot allows SQL Injection.This issue affects ScadaWatt Otop... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-21619 GLPI is a free asset and IT management software package. An administrator user can perfom a SQL injection through the rules configuration forms. This vulnerability is fixed in 10.0.18. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-43091 A flaw was found in GNOME Maps, which is vulnerable to a code injection attack via its service.json configuration file. If the configuration file is malicious, it may execute arbitrary code. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-54448 Unrestricted Upload of File with Dangerous Type vulnerability in Samsung Electronics MagicINFO 9 Server allows Code Injection.This issue affects MagicINFO 9 Server: less than 21.1080.0. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-44899 There is a stack overflow vulnerability in Tenda RX3 V1.0br_V16.03.13.11 In the fromSetWifiGusetBasic function of the web url /goform/ WifiGuestSet, the manipulation of the parameter shareSpeed leads ... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-27778 Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in `infer.py`. The issue can lead to remote code execution. As of time of publication, a fix... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-53633 Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the size of the decoded content is not checked, potentially l... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-27779 Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in `model_blender.py` lines 20 and 21. `model_fusion_a` and `model_fusion_b` from voice_blen... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-27780 Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in model_information.py. `model_name` in model_information.py takes user-supplied input (e.g... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-20684 In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-20683 In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-43845 Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to code injection. The ckpt_path2 variable takes user input (e.g. a pat... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-43844 Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables exp_dir1, among others, take user i... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-43843 Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables exp_dir1, np7 and f0method8 take us... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-43842 Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables exp_dir1, np7, trainset_dir4 and sr... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-44655 In TOTOLink A7100RU V7.4, A950RG V5.9, and T10 V5.9, the chroot_local_user option is enabled in the vsftpd.conf. This could lead to unauthorized access to system files, privilege escalation, or use of... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-31510 An issue in Open Quantum Safe liboqs v.10.0 allows a remote attacker to escalate privileges via the crypto_sign_signature parameter in the /pqcrystals-dilithium-standard_ml-dsa-44-ipd_avx2/sign.c comp... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-44658 In Netgear RAX30 V1.0.10.94, a PHP-FPM misconfiguration vulnerability is caused by not following the specification to only limit FPM to .php extensions. An attacker may exploit this by uploading malic... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-46052 An error-based SQL Injection (SQLi) vulnerability in WebERP v4.15.2 allows attackers to execute arbitrary SQL command and extract sensitive data by injecting a crafted payload into the DEL form field ... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-49839 GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in bsroformer.py. The model_choose variable takes us... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-4267 A remote code execution (RCE) vulnerability exists in the parisneo/lollms-webui, specifically within the 'open_file' module, version 9.5. The vulnerability arises due to improper neutralization of spe... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-41652 The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to ... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-4052 Inappropriate implementation in DevTools in Google Chrome prior to 136.0.7103.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control... | 9.8 | CRITICAL | — | 0 |
| CVE-2015-0843 yubiserver before 0.6 is prone to buffer overflows due to misuse of sprintf. | 9.8 | CRITICAL | — | 0 |
| CVE-2015-0842 yubiserver before 0.6 is prone to SQL injection issues, potentially leading to an authentication bypass. | 9.8 | CRITICAL | — | 0 |
| CVE-2014-7210 pdns specific as packaged in Debian in version before 3.3.1-1 creates a too privileged MySQL user. It was discovered that the maintainer scripts of pdns-backend-mysql grant too wide database permissio... | 9.8 | CRITICAL | — | 0 |
| CVE-2014-0468 Vulnerability in fusionforge in the shipped Apache configuration, where the web server may execute scripts that the users would have uploaded in their raw SCM repositories (SVN, Git, Bzr...). This i... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-30184 CyberData 011209 Intercom could allow an unauthenticated user access to the Web Interface through an alternate path. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-53842 In cc_SendCcImsInfoIndMsg of cc_MmConManagement.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileg... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-34025 CyberPower PowerPanel business application code contains a hard-coded set of authentication credentials. This could result in an attacker bypassing authentication and gaining administrator privilege... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-33625 CyberPower PowerPanel business application code contains a hard-coded JWT signing key. This could result in an attacker forging JWT tokens to bypass authentication. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-49840 GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in inference_webui.py. The GPT_dropdown variable tak... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-32053 Hard-coded credentials are used by the CyberPower PowerPanel platform to authenticate to the database, other services, and the cloud. This could result in an attacker gaining access to services ... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-49841 GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in process_ckpt.py. The SoVITS_dropdown variable tak... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-32047 Hard-coded credentials for the CyberPower PowerPanel test server can be found in the production code. This might result in an attacker gaining access to the testing or production server. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-5309 The chat feature within Remote Support (RS) and Privileged Remote Access (PRA) is vulnerable to a Server-Side Template Injection vulnerability which can lead to remote code execution. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-22937 An issue in Adtran 411 ONT vL80.00.0011.M2 allows attackers to escalate privileges via unspecified vectors. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-32740 A vulnerability has been identified in SIMATIC CN 4100 (All versions < V3.0). The affected device contains undocumented users and credentials. An attacker could misuse the credentials to compromise th... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-22938 Adtran 411 ONT L80.00.0011.M2 was discovered to contain weak default passwords. | 9.8 | CRITICAL | — | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.