Search Results (2711 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-29887 1 Nuovo 1 Spreadsheet-reader 2025-02-06 7.5 High
A Local File inclusion vulnerability in test.php in spreadsheet-reader 0.5.11 allows remote attackers to include arbitrary files via the File parameter.
CVE-2023-30547 2 Redhat, Vm2 Project 3 Acm, Multicluster Engine, Vm2 2025-02-05 9.8 Critical
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade.
CVE-2023-4596 1 Incsub 1 Forminator 2025-02-05 9.8 Critical
The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in versions up to, and including, 1.24.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVE-2023-4634 1 Davidlingren 1 Media Library Assistant 2025-02-05 9.8 Critical
The Media Library Assistant plugin for WordPress is vulnerable to Local File Inclusion and Remote Code Execution in versions up to, and including, 3.09. This is due to insufficient controls on file paths being supplied to the 'mla_stream_file' parameter from the ~/includes/mla-stream-image.php file, where images are processed via Imagick(). This makes it possible for unauthenticated attackers to supply files via FTP that will make directory lists, local file inclusion, and remote code execution possible.
CVE-2023-22621 1 Strapi 1 Strapi 2025-02-05 7.2 High
Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution.
CVE-2023-29923 1 Powerjob 1 Powerjob 2025-02-05 5.3 Medium
PowerJob V4.3.1 is vulnerable to Insecure Permissions. via the list job interface.
CVE-2023-29922 1 Powerjob 1 Powerjob 2025-02-05 5.3 Medium
PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create user/save interface.
CVE-2023-20864 1 Vmware 2 Aria Operations For Logs, Cloud Foundation 2025-02-05 9.8 Critical
VMware Aria Operations for Logs contains a deserialization vulnerability. An unauthenticated, malicious actor with network access to VMware Aria Operations for Logs may be able to execute arbitrary code as root.
CVE-2024-2330 1 Netentsec 1 Application Security Gateway 2025-02-05 6.3 Medium
A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been classified as critical. This affects an unknown part of the file /protocol/index.php. The manipulation of the argument IPAddr leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256281 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2023-2227 1 Modoboa 1 Modoboa 2025-02-04 9.1 Critical
Improper Authorization in GitHub repository modoboa/modoboa prior to 2.1.0.
CVE-2023-31059 1 Repetier-server 1 Repetier-server 2025-02-04 7.5 High
Repetier Server through 1.4.10 allows ..%5c directory traversal for reading files that contain credentials, as demonstrated by connectionLost.php.
CVE-2023-1020 1 Wp Live Chat Shoutbox Project 1 Wp Live Chat Shoutbox 2025-02-04 9.8 Critical
The Steveas WP Live Chat Shoutbox WordPress plugin through 1.4.2 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
CVE-2021-39312 1 Trueranker 1 True Ranker 2025-01-31 7.5 High
The True Ranker plugin <= 2.2.2 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file.
CVE-2024-1380 1 Relevanssi 1 Relevanssi 2025-01-31 5.3 Medium
The Relevanssi – A Better Search plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the relevanssi_export_log_check() function in all versions up to, and including, 4.22.0. This makes it possible for unauthenticated attackers to export the query log data. The vendor has indicated that they may look into adding a capability check for proper authorization control, however, this vulnerability is theoretically patched as is.
CVE-2023-2356 1 Lfprojects 1 Mlflow 2025-01-30 7.5 High
Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1.
CVE-2023-2479 1 Appium 1 Appium-desktop 2025-01-30 9.8 Critical
OS Command Injection in GitHub repository appium/appium-desktop prior to v1.22.3-4.
CVE-2024-40422 1 Stitionai 1 Devika 2025-01-29 9.1 Critical
The snapshot_path parameter in the /api/get-browser-snapshot endpoint in stitionai devika v1 is susceptible to a path traversal attack. An attacker can manipulate the snapshot_path parameter to traverse directories and access sensitive files on the server. This can potentially lead to unauthorized access to critical system files and compromise the confidentiality and integrity of the system.
CVE-2023-31478 1 Gl-inet 64 Gl-a1300, Gl-a1300 Firmware, Gl-ap1300 and 61 more 2025-01-29 7.5 High
An issue was discovered on GL.iNet devices before 3.216. An API endpoint reveals information about the Wi-Fi configuration, including the SSID and key.
CVE-2023-30013 1 Totolink 2 X5000r, X5000r Firmware 2025-01-29 9.8 Critical
TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setting/setTracerouteCfg. This vulnerability allows an attacker to execute arbitrary commands through the "command" parameter.
CVE-2023-32235 1 Ghost 1 Ghost 2025-01-29 7.5 High
Ghost before 5.42.1 allows remote attackers to read arbitrary files within the active theme's folder via /assets/built%2F..%2F..%2F/ directory traversal. This occurs in frontend/web/middleware/static-theme.js.