Vulnerabilidades CVE
Base de dados CVE enriquecida com CISA KEV e NVD
| CVE ID | CVSS | Severidade | KEV | Avistamentos |
|---|---|---|---|---|
| CVE-2023-41264 Netwrix Usercube before 6.0.215, in certain misconfigured on-premises installations, allows authentication bypass on deployment endpoints, leading to privilege escalation. This only occurs if the conf... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-3816 Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to a blind SQL Injection executed using the search bar. Only a part of observed services is vulnerable, but since vendor has not inve... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-39017 agreejs shared v0.0.1 was discovered to contain a prototype pollution via the function mergeInternalComponents. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Servi... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-1393 An unauthenticated remote attacker can use hard-coded credentials to gain full administration privileges on the affected product. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-28747 An unauthenticated remote attacker can use the hard-coded credentials to access the SmartSPS devices with high privileges. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-39705 NLTK through 3.8.1 allows remote code execution if untrusted packages have pickled Python code, and the integrated data package download functionality is used. This affects, for example, averaged_perc... | 9.8 | CRITICAL | — | 0 |
| CVE-2023-23324 Zumtobel Netlink CCD Onboard 3.74 - Firmware 3.80 was discovered to contain hardcoded credentials for the Administrator account. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-5695 If an out-of-memory condition occurs at a specific point using allocations in the probabilistic heap checker, an assertion could have been triggered, and in rarer situations, memory corruption could h... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-36404 GeoTools is an open source Java library that provides tools for geospatial data. Prior to versions 31.2, 30.4, and 29.6, Remote Code Execution (RCE) is possible if an application uses certain GeoTools... | 9.8 | CRITICAL | — | 0 |
| CVE-2023-41999 An authentication bypass exists in Arcserve UDP prior to version 9.2. An unauthenticated, remote attacker can obtain a valid authentication identifier that allows them to authenticate to the managemen... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-4708 mySCADA myPRO uses a hard-coded password which could allow an attacker to remotely execute code on the affected device. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-48193 Insecure Permissions vulnerability in JumpServer GPLv3 v.3.8.0 allows a remote attacker to execute arbitrary code via bypassing the command filtering function. NOTE: this is disputed because command f... | 9.8 | CRITICAL | — | 0 |
| CVE-2023-41919 Hardcoded credentials are discovered within the application's source code, creating a potential security risk for unauthorized access. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-23325 Zumtobel Netlink CCD Onboard 3.74 - Firmware 3.80 was discovered to contain a command injection vulnerability via the NetHostname parameter. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-3912 Certain models of ASUS routers have an arbitrary firmware upload vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the device. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-47462 Insecure Permissions vulnerability in GL.iNet AX1800 v.3.215 and before allows a remote attacker to execute arbitrary code via the file sharing function. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-45479 Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the list parameter in the function sub_49E098. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-45480 Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the src parameter in the function sub_47D878. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-45482 Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the urls parameter in the function get_parentControl_list_Info. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-36072 Netwrix CoSoSys Endpoint Protector through 5.9.3 and CoSoSys Unify through 7.0.6 contain a remote code execution vulnerability in the logging component of the Endpoint Protector and Unify server appli... | 9.8 | CRITICAL | — | 0 |
| CVE-2023-45483 Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the time parameter in the function compare_parentcontrol_time. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-45484 Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the shareSpeed parameter in the function fromSetWifiGuestBasic. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-36480 Use of hard-coded credentials issue exists in Ricoh Streamline NX PC Client ver.3.7.2 and earlier. If this vulnerability is exploited, an attacker may obtain LocalSystem Account of the PC where the pr... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-29319 Volmarg Personal Management System 1.4.64 is vulnerable to SSRF (Server Side Request Forgery) via uploading a SVG file. The server can make unintended HTTP and DNS requests to a server that the attack... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-39223 An authentication bypass in the SSH service of gost v2.11.5 allows attackers to intercept communications via setting the HostKeyCallback function to ssh.InsecureIgnoreHostKey | 9.8 | CRITICAL | — | 0 |
| CVE-2024-39844 In ZNC before 1.9.1, remote code execution can occur in modtcl via a KICK. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-49654 Missing permission checks in Jenkins MATLAB Plugin 2.11.0 and earlier allow attackers to have Jenkins parse an XML file from the Jenkins controller file system. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-39028 An issue was discovered in SeaCMS <=12.9 which allows remote attackers to execute arbitrary code via admin_ping.php. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-49656 Jenkins MATLAB Plugin 2.11.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-5974 The WPB Show Core WordPress plugin through 2.2 is vulnerable to server-side request forgery (SSRF) via the `path` parameter. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-34994 In the module "Channable" (channable) up to version 3.2.1 from Channable for PrestaShop, a guest can perform SQL injection via `ChannableFeedModuleFrontController::postProcess()`. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-41921 A vulnerability allows attackers to download source code or an executable from a remote location and execute the code without sufficiently verifying the origin and integrity of the code. This vulnerab... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-45569 Memory corruption while parsing the ML IE due to invalid frame content. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-49042 Heap Overflow vulnerability in Tenda AX1803 v.1.0.0.1 allows a remote attacker to execute arbitrary code via the schedStartTime parameter or the schedEndTime parameter in the function setSchedWifi. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-37014 Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-27174 Remote Command program allows an attacker to get Remote Code Execution. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-27173 Remote Command program allows an attacker to get Remote Code Execution by overwriting existing Python files containing executable code. This vulnerability can be executed in combination with other vul... | 9.8 | CRITICAL | — | 0 |
| CVE-2022-42536 Remote code execution | 9.8 | CRITICAL | — | 0 |
| CVE-2022-42537 Remote code execution | 9.8 | CRITICAL | — | 0 |
| CVE-2022-42538 Elevation of privilege | 9.8 | CRITICAL | — | 0 |
| CVE-2018-14067 Green Packet WiMax DV-360 2.10.14-g1.0.6.1 devices allow Command Injection, with unauthenticated remote command execution, via a crafted payload to the HTTPS port, because lighttpd listens on all netw... | 9.8 | CRITICAL | — | 0 |
| CVE-2021-28173 The file upload function of Vangene deltaFlow E-platform does not perform access controlled properly. Remote attackers can upload and execute arbitrary files without login. | 9.8 | CRITICAL | — | 0 |
| CVE-2021-1795 An out-of-bounds write was addressed with improved input validation. This issue is fixed in iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. | 9.8 | CRITICAL | — | 0 |
| CVE-2020-29592 An issue was discovered in Orchard before 1.10. A broken access control issue in Orchard components that use the TinyMCE HTML editor's file upload allows an attacker to upload dangerous executables th... | 9.8 | CRITICAL | — | 0 |
| CVE-2021-21524 Dell SRM versions prior to 4.5.0.1 and Dell SMR versions prior to 4.5.0.1 contain an Untrusted Deserialization Vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerabili... | 9.8 | CRITICAL | — | 0 |
| CVE-2021-27135 xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence. | 9.8 | CRITICAL | — | 0 |
| CVE-2020-27237 An exploitable SQL injection vulnerability exists in ‘getAssets.jsp’ page of OpenClinic GA 5.173.3. The code parameter in the The nomenclature parameter in the getAssets.jsp page is vulnerable to unau... | 9.8 | CRITICAL | — | 0 |
| CVE-2021-30164 Redmine before 4.0.8 and 4.1.x before 4.1.2 allows attackers to bypass the add_issue_notes permission requirement by leveraging the Issues API. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-25002 An issue was discovered in the sodiumoxide crate before 0.2.5 for Rust. generichash::Digest::eq compares itself to itself and thus has degenerate security properties. | 9.8 | CRITICAL | — | 0 |
| CVE-2021-27850 A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have f... | 9.8 | CRITICAL | — | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.