Vulnerabilidades CVE
Base de datos de vulnerabilidades CVE enriquecida con datos de CISA KEV y NVD
| CVE ID | CVSS | Severidad | KEV | Avistamientos |
|---|---|---|---|---|
| CVE-2018-11922 Wrong configuration in Touch Pal application can collect user behavior data without awareness by the user. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-29862 An issue found in Agasio-Camera device version not specified allows a remote attacker to execute arbitrary code via the check and authLevel parameters. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-29974 ** UNSUPPORTED WHEN ASSIGNED ** The remote code execution vulnerability in the CGI program “file_upload-cgi” in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions befo... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-21652 Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.8.13, 2.9.9, and 2.10.4, an attacker can exploit a chain of vulnerabilities, including a Denial of Service... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-29876 SQL injection vulnerability in Sentrifugo 3.2, through /sentrifugo/index.php/reports/activitylogreport, 'sortby' parameter. The exploitation of this vulnerability could allow a remote user to send ... | 9.8 | CRITICAL | — | 0 |
| CVE-2020-20718 File Upload vulnerability in PluckCMS v.4.7.10 dev versions allows a remote attacker to execute arbitrary code via a crafted image file to the the save_file() parameter. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-54661 readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-52759 D-LINK DI-8003 v16.07.26A1 was discovered to contain a buffer overflow via the ip parameter in the ip_position_asp function. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-0917 remote code execution in paddlepaddle/paddle 2.6.0 | 9.8 | CRITICAL | — | 0 |
| CVE-2024-28222 In Veritas NetBackup before 8.1.2 and NetBackup Appliance before 3.1.2, the BPCD process inadequately validates the file path, allowing an unauthenticated attacker to upload and execute a custom file. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-29872 SQL injection vulnerability in Sentrifugo 3.2, through /sentrifugo/index.php/empscreening/add, 'agencyids' parameter. The exploitation of this vulnerability could allow a remote user to send a specia... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-52714 Tenda AC6 v2.0 v15.03.06.50 was discovered to contain a buffer overflow in the function 'fromSetSysTime. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-48694 File Upload vulnerability in Xi'an Daxi Information technology OfficeWeb365 v.8.6.1.0 and v7.18.23.0 allows a remote attacker to execute arbitrary code via the pw/savedraw component. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-27764 An issue in Jeewms v.3.7 and before allows a remote attacker to escalate privileges via the AuthInterceptor component. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-9511 The FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and includi... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-0138 NVIDIA Base Command Manager contains a missing authentication vulnerability in the CMDaemon component. A successful exploit of this vulnerability might lead to code execution, denial of service, escal... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-29871 SQL injection vulnerability in Sentrifugo 3.2, through /sentrifugo/index.php/index/getdepartments/sentrifugo/index.php/index/updatecontactnumber, 'id' parameter. The exploitation of this vulnerability... | 9.8 | CRITICAL | — | 0 |
| CVE-2015-9452 The nex-forms-express-wp-form-builder plugin before 4.6.1 for WordPress has SQL injection via the wp-admin/admin.php?page=nex-forms-main nex_forms_Id parameter. | 9.8 | CRITICAL | — | 0 |
| CVE-2019-10891 An issue was discovered in D-Link DIR-806 devices. There is a command injection in function hnap_main, which calls system() without checking the parameter that can be controlled by user, and finally a... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-29874 SQL injection vulnerability in Sentrifugo 3.2, through /sentrifugo/index.php/default/reports/activeuserrptpdf, 'sort_name' parameter. The exploitation of this vulnerability could allow a remote user ... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-9290 The Super Backup & Clone - Migrate for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation and a missing capability check on the ibk_restore_migr... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-11015 The Sign In With Google plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.8.0. This is due to the 'authenticate_user' user function not implementing s... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-49112 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | 9.8 | CRITICAL | — | 0 |
| CVE-2023-51638 Allegra Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Allegra. Authentication is not requ... | 9.8 | CRITICAL | — | 0 |
| CVE-2023-29809 SQL injection vulnerability found in Maximilian Vogt companymaps (cmaps) v.8.0 allows a remote attacker to execute arbitrary code via a crafted script in the request. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-29870 SQL injection vulnerability in Sentrifugo 3.2, through /sentrifugo/index.php/index/getdepartments/format/html, 'business_id' parameter./sentrifugo/index.php/index/getdepartments/format/html, 'business... | 9.8 | CRITICAL | — | 0 |
| CVE-2022-46732 Even if the authentication fails for local service authentication, the requested command could still execute regardless of authentication status. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-29972 ** UNSUPPORTED WHEN ASSIGNED ** The command injection vulnerability in the CGI program "remote_help-cgi" in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-11948 GFI Archiver Telerik Web UI Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Authentication is not r... | 9.8 | CRITICAL | — | 0 |
| CVE-2023-51639 Allegra downloadExportedChart Directory Traversal Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Allegra. Authent... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-11737 CWE-20: Improper Input Validation vulnerability exists that could lead to a denial of service and a loss of confidentiality, integrity of the controller when an unauthenticated crafted Modbus packet i... | 9.8 | CRITICAL | — | 0 |
| CVE-2020-3318 Multiple vulnerabilities in Cisco Firepower Management Center (FMC) Software and Cisco Firepower User Agent Software could allow an attacker to access a sensitive part of an affected system with a hig... | 9.8 | CRITICAL | — | 0 |
| CVE-2017-18017 The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-11281 The WooCommerce Point of Sale plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 6.1.0. This is due to insufficient validation on the 'logged_in_user_id' ... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-10244 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ISDO Software Web Software allows SQL Injection.This issue affects Web Software: before 3.6. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-24540 Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript conte... | 9.8 | CRITICAL | — | 0 |
| CVE-2023-30330 SoftExpert (SE) Excellence Suite 2.x versions before 2.1.3 is vulnerable to Local File Inclusion in the function /se/v42300/generic/gn_defaultframe/2.0/defaultframe_filter.php. | 9.8 | CRITICAL | — | 0 |
| CVE-2022-26937 Windows Network File System Remote Code Execution Vulnerability | 9.8 | CRITICAL | — | 0 |
| CVE-2022-22012 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | 9.8 | CRITICAL | — | 0 |
| CVE-2024-1610 In OPPO Store APP, there's a possible escalation of privilege due to improper input validation. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-12287 The Biagiotti Membership plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.0.2. This is due to the plugin not properly verifying a user's identity pri... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-40762 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in the SonicOS SSLVPN authentication token generator that, in certain cases, can be predicted by an attacker potentially resulting i... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-29671 Buffer Overflow vulnerability in NEXTU FLATA AX1500 Router v.1.0.2 allows a remote attacker to execute arbitrary code via the POST request handler component. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-55557 ui/pref/ProxyPrefView.java in weasis-core in Weasis 4.5.1 has a hardcoded key for symmetric encryption of proxy credentials. | 9.8 | CRITICAL | — | 0 |
| CVE-2022-22687 Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in Authentication functionality in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers ... | 9.8 | CRITICAL | — | 0 |
| CVE-2023-31983 A Command Injection vulnerability in Edimax Wireless Router N300 Firmware BR-6428NS_v4 allows attacker to execute arbitrary code via the mp function in /bin/webs without any limitations. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-30247 File Upload vulnerability found in Oretnom23 Storage Unit Rental Management System v.1.0 allows a remote attacker to execute arbitrary code via the update_settings parameter. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-43661 The <redacted>.so library, which is used by <redacted>, is vulnerable to a buffer overflow in the code that handles the deletion of certificates. This buffer overflow can be triggered by providing a l... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-43663 There are many buffer overflow vulnerabilities present in several CGI binaries of the charging station.This issue affects Iocharger firmware for AC model chargers beforeversion 24120701. Likelihood: ... | 9.8 | CRITICAL | — | 0 |
| CVE-2018-9467 In the getHost() function of UriTest.java, there is the possibility of incorrect web origin determination. This could lead to incorrect security decisions with no additional execution privileges neede... | 9.8 | CRITICAL | — | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.