Vulnerabilidades CVE
Base de dados CVE enriquecida com CISA KEV e NVD
| CVE ID | CVSS | Severidade | KEV | Avistamentos |
|---|---|---|---|---|
| CVE-2025-44083 An issue in D-Link DI-8100 16.07.26A1 allows a remote attacker to bypass administrator login authentication | 9.8 | CRITICAL | — | 0 |
| CVE-2025-24288 The Versa Director software exposes a number of services by default and allow attackers an easy foothold due to default credentials and multiple accounts (most with sudo access) that utilize the same ... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-1283 Heap buffer overflow in Skia in Google Chrome prior to 121.0.6167.160 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | 9.8 | CRITICAL | — | 0 |
| CVE-2024-22836 An OS command injection vulnerability exists in Akaunting v3.1.3 and earlier. An attacker can manipulate the company locale when installing an app to execute system commands on the hosting server. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-24019 A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass in crafted offset, limit, and sort parameters to perform SQL injection via /system/roleDataPerm/l... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-5622 A vulnerability was found in D-Link DIR-816 1.10CNB05 and classified as critical. Affected by this issue is the function wirelessApcli_5g of the file /goform/wirelessApcli_5g. The manipulation of the ... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-5623 A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been classified as critical. This affects the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument d... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-5624 A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been declared as critical. This vulnerability affects the function QoSPortSetup of the file /goform/QoSPortSetup. The manipulation of the ... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-3357 IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 19 could allow a remote attacker to execute arbitrary code due to improper validation of an index value of a dynamically allocated array. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-48481 FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, an attacker with an unactivated email invitation containing invite_hash, can exploit this vulnerability to self-... | 9.8 | CRITICAL | — | 0 |
| CVE-2023-47132 An issue discovered in N-able N-central before 2023.6 and earlier allows attackers to gain escalated privileges via API calls. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-41646 An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device | 9.8 | CRITICAL | — | 0 |
| CVE-2025-27531 Deserialization of Untrusted Data vulnerability in Apache InLong. This issue affects Apache InLong: from 1.13.0 before 2.1.0, this issue would allow an authenticated attacker to read arbitrary fil... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-4094 The DIGITS: WordPress Mobile Number Signup and Login WordPress plugin before 8.4.6.1 does not rate limit OTP validation attempts, making it straightforward for attackers to bruteforce them. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-8997 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Vestel EVC04 Configuration Interface allows SQL Injection.This issue affects EVC04 Configuration I... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-27520 BentoML is a Python library for building online serving systems optimized for AI apps and model inference. A Remote Code Execution (RCE) vulnerability caused by insecure deserialization has been ident... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-47966 Exposure of sensitive information to an unauthorized actor in Power Automate allows an unauthorized attacker to elevate privileges over a network. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-37096 A command injection remote code execution vulnerability exists in HPE StoreOnce Software. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-5392 The GB Forms DB plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.2 via the gbfdb_talk_to_front() function. This is due to the function accepting us... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-9342 In Eclipse GlassFish version 7.0.16 or earlier it is possible to perform Login Brute Force attacks as there is no limitation in the number of failed login attempts. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-24655 Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the name parameter under the Profile Update function. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-25567 SoftEther VPN 5.02.5187 is vulnerable to Buffer Overflow in Internat.c via the UniToStrForSingleChars function. NOTE: the Supplier disputes this because the behavior only enables a local user to attac... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-53075 Improper Input Validation vulnerability in Samsung Open Source rLottie allows Path Traversal.This issue affects rLottie: V0.2. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-49003 DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.11, a threat actor may take advantage of a feature in Java in which the character "ı" becomes "I" wh... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-16535 In all versions of ClickHouse before 19.14, an OOB read, OOB write and integer underflow in decompression algorithms can be used to achieve RCE or DoS via native protocol. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-53076 Improper Input Validation vulnerability in Samsung Open Source rLottie allows Overread Buffers.This issue affects rLottie: V0.2. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-4606 The Sala - Startup & SaaS WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.1.4. This is due to the theme not prope... | 9.8 | CRITICAL | — | 0 |
| CVE-2019-19790 Path traversal in RadChart in Telerik UI for ASP.NET AJAX allows a remote attacker to read and delete an image with extension .BMP, .EXIF, .GIF, .ICON, .JPEG, .PNG, .TIFF, or .WMF on the server throug... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-54092 A vulnerability has been identified in Industrial Edge Device Kit - arm64 V1.17 (All versions), Industrial Edge Device Kit - arm64 V1.18 (All versions), Industrial Edge Device Kit - arm64 V1.19 (All v... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-27690 Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability,... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-25565 SoftEther VPN 5.02.5187 is vulnerable to Buffer Overflow in the Command.c file via the PtMakeCert and PtMakeCert2048 functions. NOTE: the Supplier disputes this because the behavior only allows a user... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-37090 A server-side request forgery vulnerability exists in HPE StoreOnce Software. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-53890 pyload is an open-source Download Manager written in pure Python. An unsafe JavaScript evaluation vulnerability in pyLoad’s CAPTCHA processing code allows unauthenticated remote attackers to execute a... | 9.8 | CRITICAL | — | 0 |
| CVE-2022-40752 IBM InfoSphere DataStage 11.7 is vulnerable to a command injection vulnerability due to improper neutralization of special elements. IBM X-Force ID: 236687. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-53298 Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.0.1, contains a missing authorization vulnerability in the NFS export. An unauthenticated attacker with remote access could potentially exploit thi... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-7401 The Premium Age Verification / Restriction for WordPress plugin for WordPress is vulnerable to arbitrary file read and write due to the existence of an insufficiently protected remote support function... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-11284 The WP JobHunt plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 6.9. This is due to the plugin not properly validating a user's ide... | 9.8 | CRITICAL | — | 0 |
| CVE-2018-1000875 Berkeley Open Infrastructure for Network Computing BOINC Server and Website Code version 0.9-1.0.2 contains a CWE-302: Authentication Bypass by Assumed-Immutable Data vulnerability in Website Terms of... | 9.8 | CRITICAL | — | 0 |
| CVE-2022-39983 File upload vulnerability in Pro Gamma Instant Developer RD3 22.5 r23, r30, and possibly earlier versions, allows attackers to execute arbitrary code. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-11835 cJSON before 1.7.11 allows out-of-bounds access, related to multiline comments. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-6561 Certain hybrid DVR models ((HBF-09KD and HBF-16NK)) from Hunt Electronic have an Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to directly access a system ... | 9.8 | CRITICAL | — | 0 |
| CVE-2018-8327 A remote code execution vulnerability exists in PowerShell Editor Services, aka "PowerShell Editor Services Remote Code Execution Vulnerability." This affects PowerShell Editor, PowerShell Extension. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-5304 The PT Project Notebooks plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization in the wpnb_pto_new_users_add() function in versions 1.0.0 through 1.1.3. This makes it... | 9.8 | CRITICAL | — | 0 |
| CVE-2021-28967 The unofficial MATLAB extension before 2.0.1 for Visual Studio Code allows attackers to execute arbitrary code via a crafted workspace because of lint configuration settings. | 9.8 | CRITICAL | — | 0 |
| CVE-2025-6058 The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versi... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-45890 Directory Traversal vulnerability in novel plus before v.5.1.0 allows a remote attacker to execute arbitrary code via the filePath parameter | 9.8 | CRITICAL | — | 0 |
| CVE-2016-10749 parse_string in cJSON.c in cJSON before 2016-10-02 has a buffer over-read, as demonstrated by a string that begins with a " character and ends with a \ character. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-10835 In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/sql/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers ... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-7206 A vulnerability, which was classified as critical, has been found in D-Link DIR-825 2.10. This issue affects the function sub_410DDC of the file switch_language.cgi of the component httpd. The manipul... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-37089 A command injection remote code execution vulnerability exists in HPE StoreOnce Software. | 9.8 | CRITICAL | — | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.