Vulnerabilidades CVE
Base de datos de vulnerabilidades CVE enriquecida con datos de CISA KEV y NVD
| CVE ID | CVSS | Severidad | KEV | Avistamientos |
|---|---|---|---|---|
| CVE-2023-29542 A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental exe... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-28892 An OS command injection vulnerability exists in the name parameter of GoCast 1.1.3. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an unauthenticated HT... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-13147 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Merkur Software B2B Login Panel allows SQL Injection.This issue affects B2B Login Panel: before 15... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-8806 Cohesive Networks VNS3 Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cohesive Networks VNS3. ... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-11313 The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leadi... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-10961 The Social Login plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.9.0. This is due to insufficient verification on the user being returned by the soc... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-11314 The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leadi... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-45999 A SQL Injection vulnerability was discovered in Cloudlog 2.6.15, specifically within the get_station_info()function located in the file /application/models/Oqrs_model.php. The vulnerability is exploit... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-8807 Cohesive Networks VNS3 Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cohesive Networks VNS3. ... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-10820 The WooCommerce Upload Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_files() function in all versions up to, and including, 84.3.... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-30470 A use-after-free related to unsound inference in the bytecode generation when optimizations are enabled for Hermes prior to commit da8990f737ebb9d9810633502f65ed462b819c09 could have been used by an a... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-10575 CWE-862: Missing Authorization vulnerability exists that could cause unauthorized access when enabled on the network and potentially impacting connected devices. | 9.8 | CRITICAL | β | 0 |
| CVE-2024-39226 GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE30... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-11150 The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_tmp_uploaded_file() function in all versions up to,... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-11315 The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leadi... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-41577 An arbitrary file upload vulnerability in the Ueditor component of productinfoquick v1.0 allows attackers to execute arbitrary code via uploading a crafted PNG file. | 9.8 | CRITICAL | β | 0 |
| CVE-2024-53912 An issue was discovered in the server in Veritas Enterprise Vault before 15.2, ZDI-CAN-24341. It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting T... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-2319 It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS pack... | 9.8 | CRITICAL | β | 0 |
| CVE-2018-9479 In process_service_attr_req and process_service_search_attr_req of sdp_server.cc, there is an out of bounds write due to a missing bounds check. This could lead to remote code execution with no additi... | 9.8 | CRITICAL | β | 0 |
| CVE-2018-9478 In process_service_attr_req and process_service_search_attr_req of sdp_server.cc, there is an out of bounds write due to a missing bounds check. This could lead to remote code execution with no additi... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-9942 The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the MJ_gmgt_user_avatar_image_upload() function in all v... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-31707 SEMCMS 1.5 is vulnerable to SQL Injection via Ant_Rponse.php. | 9.8 | CRITICAL | β | 0 |
| CVE-2023-29985 Sourcecodester Student Study Center Desk Management System v1.0 admin\reports\index.php#date_from has a SQL Injection vulnerability. | 9.8 | CRITICAL | β | 0 |
| CVE-2024-11028 The MultiManager WP β Manage All Your WordPress Sites Easily plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.5. This is due to the user impersonat... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-47074 DataEase is an open source data visualization analysis tool. In Dataease, the PostgreSQL data source in the data source function can customize the JDBC connection parameters and the PG server target t... | 9.8 | CRITICAL | β | 0 |
| CVE-2019-16028 A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions ... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-22399 Deserialization of Untrusted Data vulnerability in Apache Seata.Β When developers disable authentication on the Seata-Server and do not use the Seata client SDK dependencies, they may construct uncon... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-21334 Open Management Infrastructure (OMI) Remote Code Execution Vulnerability | 9.8 | CRITICAL | β | 0 |
| CVE-2023-28081 A bytecode optimization bug in Hermes prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could be used to cause an use-after-free and obtain arbitrary code execution via a carefully crafted payl... | 9.8 | CRITICAL | β | 0 |
| CVE-2020-20413 SQL injection vulnerability found in WUZHICMS v.4.1.0 allows a remote attacker to execute arbitrary code via the checktitle() function in admin/content.php. | 9.8 | CRITICAL | β | 0 |
| CVE-2024-50672 A NoSQL injection vulnerability in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows unauthenticated attackers to reset user and administrator account passwords via the "Reset password" feature. Th... | 9.8 | CRITICAL | β | 0 |
| CVE-2024-21855 A lack of authentication vulnerability exists in the HTTP API functionality of GoCast 1.1.3. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an unauthent... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-25933 A type confusion bug in TypedArray prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could have been used by a malicious attacker to execute arbitrary code via untrusted JavaScript. Note that t... | 9.8 | CRITICAL | β | 0 |
| CVE-2023-31729 TOTOLINK A3300R v17.0.0cu.557 is vulnerable to Command Injection via /cgi-bin/cstecgi.cgi. | 9.8 | CRITICAL | β | 0 |
| CVE-2022-37138 Loan Management System 1.0 is vulnerable to SQL Injection at the login page, which allows unauthorized users to login as Administrator after injecting username form. | 9.8 | CRITICAL | β | 0 |
| CVE-2022-37661 SmartRG SR506n 2.5.15 and SR510n 2.6.13 routers are vulnerable to Remote Code Execution (RCE) via the ping host feature. | 9.8 | CRITICAL | β | 0 |
| CVE-2022-37889 There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Netw... | 9.8 | CRITICAL | β | 0 |
| CVE-2022-37890 Unauthenticated buffer overflow vulnerabilities exist within the Aruba InstantOS and ArubaOS 10 web management interface. Successful exploitation results in the execution of arbitrary commands on the ... | 9.8 | CRITICAL | β | 0 |
| CVE-2022-37891 Unauthenticated buffer overflow vulnerabilities exist within the Aruba InstantOS and ArubaOS 10 web management interface. Successful exploitation results in the execution of arbitrary commands on the ... | 9.8 | CRITICAL | β | 0 |
| CVE-2022-42075 Wedding Planner v1.0 is vulnerable to arbitrary code execution. | 9.8 | CRITICAL | β | 0 |
| CVE-2022-4338 An integer underflow in Organization Specific TLV was found in various versions of OpenvSwitch. | 9.8 | CRITICAL | β | 0 |
| CVE-2022-2466 It was found that Quarkus 2.10.x does not terminate HTTP requests header context which may lead to unpredictable behavior. | 9.8 | CRITICAL | β | 0 |
| CVE-2022-4337 An out-of-bounds read in Organization Specific TLV was found in various versions of OpenvSwitch. | 9.8 | CRITICAL | β | 0 |
| CVE-2022-38542 Archery v1.4.0 to v1.8.5 was discovered to contain a SQL injection vulnerability via the ThreadIDs parameter in the kill_session interface. The project has released an update, please upgrade to v1.9.0... | 9.8 | CRITICAL | β | 0 |
| CVE-2022-36669 Hospital Information System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass. | 9.8 | CRITICAL | β | 0 |
| CVE-2022-4422 Call Center System developed by Bulutses Information Technologies before version 3.0 has an unauthenticated Sql Injection vulnerability. This has been fixed in the version 3.0 | 9.8 | CRITICAL | β | 0 |
| CVE-2022-3792 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GullsEye GullsEye terminal operating system allows SQL Injection.This issue affects GullsEye termi... | 9.8 | CRITICAL | β | 0 |
| CVE-2022-37264 Prototype pollution vulnerability in stealjs steal 2.2.4 via the optionName variable in main.js. | 9.8 | CRITICAL | β | 0 |
| CVE-2022-30318 Honeywell ControlEdge through R151.1 uses Hard-coded Credentials. According to FSCT-2022-0056, there is a Honeywell ControlEdge hardcoded credentials issue. The affected components are characterized a... | 9.8 | CRITICAL | β | 0 |
| CVE-2022-38541 Archery v1.8.3 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_time and stop_time parameters in the my2sql interface. | 9.8 | CRITICAL | β | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.