Vulnerabilites CVE
Base de donnees CVE enrichie avec CISA KEV et NVD
| CVE ID | CVSS | Severite | KEV | Observations |
|---|---|---|---|---|
| CVE-2024-48072 Weaver Ecology v9.* was discovered to contain a SQL injection vulnerability via the component /mobilemode/Action.jsp?invoker=com.weaver.formmodel.mobile.mec.servlet.MECAction&action=getFieldTriggerVal... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-50649 The user avatar upload function in python_book V1.0 has an arbitrary file upload vulnerability. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-50648 yshopmall V1.0 has an arbitrary file upload vulnerability, which can enable RCE or even take over the server when improperly configured to parse JSP files. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-52533 gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-10627 The WooCommerce Support Ticket System plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_manage_file_chunk_upload() function in all versions u... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-10625 The WooCommerce Support Ticket System plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_tmp_uploaded_file() function in all versions ... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-48061 langflow <=1.0.18 is vulnerable to Remote Code Execution (RCE) as any component provided the code functionality and the components run on the local machine rather than in a sandbox. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-42835 langflow v1.0.12 was discovered to contain a remote code execution (RCE) vulnerability via the PythonCodeTool component. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-48112 A deserialization vulnerability in the component \controller\Index.php of Thinkphp v6.1.3 to v8.0.4 allows attackers to execute arbitrary code. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-26770 TaskCafe 0.3.2 lacks validation in the Cookie value. Any unauthenticated attacker who knows a registered UserID can change the password of that user. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-46256 A Command injection vulnerability in requestLetsEncryptSsl in NginxProxyManager 2.11.3 allows an attacker to RCE via Add Let's Encrypt Certificate. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-37231 Loftware Spectrum before 4.6 HF14 uses a Hard-coded Password. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-37227 Loftware Spectrum before 4.6 HF13 Deserializes Untrusted Data. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-37226 Loftware Spectrum before 4.6 HF14 has Missing Authentication for a Critical Function. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-28000 Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache allows Privilege Escalation.This issue affects LiteSpeed Cache: from 1.9 through 6.3.0.1. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-42558 Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the book_id parameter at admin_modify_room.php. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-42556 Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the room_type parameter at admin_room_removed.php. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-6330 The GEO my WP WordPress plugin before 4.5.0.2 does not prevent unauthenticated attackers from including arbitrary files in PHP's execution context, which leads to Remote Code Execution. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-6459 The News Element Elementor Blog Magazine WordPress plugin before 1.0.6 is vulnerable to Local File Inclusion via the template parameter. This makes it possible for unauthenticated attacker to include ... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-8855 The WordPress Auction Plugin WordPress plugin through 3.7 does not sanitize and escape a parameter before using it in a SQL statement, allowing editors and above to perform SQL injection attacks | 9.8 | CRITICAL | — | 0 |
| CVE-2024-42850 An issue in the password change function of Silverpeas v6.4.2 and lower allows for the bypassing of password complexity requirements. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-42639 H3C GR1100-P v100R009 was discovered to use a hardcoded password in /etc/shadow, which allows attackers to log in as root. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-42637 H3C R3010 v100R002L02 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-20082 In Modem, there is a possible memory corruption due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed f... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-27730 Insecure Permissions vulnerability in Friendica v.2023.12 allows a remote attacker to obtain sensitive information and execute arbitrary code via the cid parameter of the calendar event feature. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-20083 In venc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-34257 TOTOLINK EX1800T V9.1.0cu.2112_B20220316 has a vulnerability in the apcliEncrypType parameter that allows unauthorized execution of arbitrary commands, allowing an attacker to obtain device administra... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-32370 An issue in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a remote attacker to obtain sensitive information via a crafted payload to the id parameter in the mliSystemUsers.php comp... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-38909 Studio 42 elFinder 2.1.64 is vulnerable to Incorrect Access Control. Copying files with an unauthorized extension between server directories allows an arbitrary attacker to expose secrets, perform RCE... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-33792 netis-systems MEX605 v2.00.06 allows attackers to execute arbitrary OS commands via a crafted payload to the tracert page. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-33789 Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability via the ipurl parameter at /API/info form endpoint. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-31673 Kliqqi-CMS 2.0.2 is vulnerable to SQL Injection in load_data.php via the userid parameter. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-34048 O-RAN RIC I-Release e2mgr lacks array size checks in E2nodeConfigUpdateNotificationHandler. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-31750 SQL injection vulnerability in f-logic datacube3 v.1.0 allows a remote attacker to obtain sensitive information via the req_id parameter. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-3701 The system application (com.transsion.kolun.aiservice) component does not perform an authentication check, which allows attackers to perform malicious exploitations and affect system services. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-31818 Directory Traversal vulnerability in DerbyNet v.9.0 allows a remote attacker to execute arbitrary code via the page parameter of the kiosk.php component. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-28718 An issue in OpenStack magnum yoga-eom version allows a remote attacker to execute arbitrary code via the cert_manager.py. component. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-25678 In LiteSpeed QUIC (LSQUIC) Library before 4.0.4, DCID validation is mishandled. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-25675 An issue was discovered in MISP before 2.4.184. A client does not need to use POST to start an export generation process. This is related to app/Controller/JobsController.php and app/View/Events/expor... | 9.8 | CRITICAL | — | 0 |
| CVE-2023-46350 SQL injection vulnerability in InnovaDeluxe "Manufacturer or supplier alphabetical search" (idxrmanufacturer) module for PrestaShop versions 2.0.4 and before, allows remote attackers to escalate privi... | 9.8 | CRITICAL | — | 0 |
| CVE-2023-47132 An issue discovered in N-able N-central before 2023.6 and earlier allows attackers to gain escalated privileges via API calls. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-22836 An OS command injection vulnerability exists in Akaunting v3.1.3 and earlier. An attacker can manipulate the company locale when installing an app to execute system commands on the hosting server. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-24321 An issue in Dlink DIR-816A2 v.1.10CNB05 allows a remote attacker to execute arbitrary code via the wizardstep4_ssid_2 parameter in the sub_42DA54 function. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-25191 php-jwt 1.0.0 uses strcmp (which is not constant time) to verify authentication, which makes it easier to bypass authentication via a timing side channel. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-24021 A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior. An attacker can pass specially crafted offset, limit, and sort parameters to perform SQL injection via /novel/userFeedback/list... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-22144 NamelessMC is a free, easy to use & powerful website software for Minecraft servers. A user with admincp.core.emails or admincp.users.edit permissions can validate users and an attacker can reset thei... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-24014 A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass crafted offset, limit, and sort parameters to perform SQL injection via /novel/author/list | 9.8 | CRITICAL | — | 0 |
| CVE-2024-24025 An arbitrary File upload vulnerability exists in Novel-Plus v4.3.0-RC1 and prior at com.java2nb.common.controller.FileController: upload(). An attacker can pass in specially crafted filename parameter... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-4094 The DIGITS: WordPress Mobile Number Signup and Login WordPress plugin before 8.4.6.1 does not rate limit OTP validation attempts, making it straightforward for attackers to bruteforce them. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-22968 An issue in D-Link DWR-M972V 1.05SSG allows a remote attacker to execute arbitrary code via SSH using root account without restrictions | 9.8 | CRITICAL | — | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.