Latest CVE Feed
-
9.8
CRITICALCVE-2024-43692
An attacker can directly request the ProGauge MAGLINK LX CONSOLE resource sub page with full privileges by requesting the URL directly.... Read more
- Published: Sep. 25, 2024
- Modified: Oct. 01, 2024
-
9.8
CRITICALCVE-2024-4371
The CoDesigner WooCommerce Builder for Elementor – Customize Checkout, Shop, Email, Products & More plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.4.1 via deserialization of untrusted input from the rece... Read more
Affected Products : codesigner- Published: Jun. 13, 2024
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2023-30378
In Tenda AC15 V15.03.05.19, the function "sub_8EE8" contains a stack-based buffer overflow vulnerability.... Read more
- Published: Apr. 24, 2023
- Modified: Feb. 05, 2025
-
9.8
CRITICALCVE-2022-33106
WiJungle NGFW Version U250 was discovered to be vulnerable to No Rate Limit attack, allowing the attacker to brute force the admin password leading to Account Take Over.... Read more
- Published: Oct. 12, 2022
- Modified: May. 16, 2025
-
9.8
CRITICALCVE-2024-1301
SQL injection vulnerability in Badger Meter Monitool affecting versions 4.6.3 and earlier. A remote attacker could send a specially crafted SQL query to the server via the j_username parameter and retrieve the information stored in the database.... Read more
Affected Products : monitool- Published: Mar. 12, 2024
- Modified: Feb. 26, 2025
-
9.8
CRITICALCVE-2024-43978
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in highwarden Super Store Finder allows SQL Injection.This issue affects Super Store Finder: from n/a before 6.9.8.... Read more
Affected Products : super_store_finder- Published: Sep. 17, 2024
- Modified: Sep. 24, 2024
-
9.8
CRITICALCVE-2024-22857
Heap based buffer flow in zlog v1.1.0 to v1.2.17 in zlog_rule_new().The size of record_name is MAXLEN_PATH(1024) + 1 but file_path may have data upto MAXLEN_CFG_LINE(MAXLEN_PATH*4) + 1. So a check was missing in zlog_rule_new() while copying the record_na... Read more
Affected Products :- Published: Mar. 07, 2024
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2024-22901
Vinchin Backup & Recovery v7.2 was discovered to use default MYSQL credentials.... Read more
Affected Products : vinchin_backup_and_recovery- Published: Feb. 02, 2024
- Modified: May. 15, 2025
-
9.8
CRITICALCVE-2024-44004
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPTaskForce WPCargo Track & Trace allows SQL Injection.This issue affects WPCargo Track & Trace: from n/a through 7.0.6.... Read more
Affected Products : track_\&_trace- Published: Sep. 17, 2024
- Modified: Sep. 24, 2024
-
9.8
CRITICALCVE-2022-2139
The affected product is vulnerable to directory traversal, which may allow an attacker to access unauthorized files and execute arbitrary code.... Read more
Affected Products : iview- Published: Jul. 22, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2023-27574
ShadowsocksX-NG 1.10.0 signs with com.apple.security.get-task-allow entitlements because of CODE_SIGNING_INJECT_BASE_ENTITLEMENTS.... Read more
Affected Products : shadowsocksx-ng- Published: Mar. 03, 2023
- Modified: Mar. 06, 2025
-
9.8
CRITICALCVE-2024-24004
jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findInOutDetail() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct ... Read more
Affected Products : jsherp- Published: Feb. 07, 2024
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2024-24332
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the url parameter in the setUrlFilterRules function.... Read more
- Published: Jan. 30, 2024
- Modified: May. 30, 2025
-
9.8
CRITICALCVE-2023-7099
A vulnerability, which was classified as critical, has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This issue affects some unknown processing of the file bwdates-report-result.php. The manipulation of the argument fromdate leads to... Read more
Affected Products : nipah_virus_testing_management_system- Published: Dec. 25, 2023
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2023-7111
A vulnerability, which was classified as critical, was found in code-projects Library Management System 2.0. Affected is an unknown function of the file index.php. The manipulation of the argument category leads to sql injection. It is possible to launch ... Read more
Affected Products : library_management_system- Published: Dec. 26, 2023
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2024-25019
IBM Cognos Controller 11.0.0 and 11.0.1 could be vulnerable to malicious file upload by not validating the type of file uploaded to Journal entry attachments. Attackers can make use of this weakness and upload malicious executable files into the system ... Read more
Affected Products : cognos_controller- Published: Dec. 03, 2024
- Modified: Dec. 11, 2024
-
9.8
CRITICALCVE-2022-3900
The Cooked Pro WordPress plugin before 1.7.5.7 does not properly validate or sanitize the recipe_args parameter before unserializing it in the cooked_loadmore action, allowing an unauthenticated attacker to trigger a PHP Object injection vulnerability.... Read more
Affected Products : cooked- Published: Dec. 12, 2022
- Modified: Apr. 22, 2025
-
9.8
CRITICALCVE-2024-25400
Subrion CMS 4.2.1 is vulnerable to SQL Injection via ia.core.mysqli.php. NOTE: this is disputed by multiple third parties because it refers to an HTTP request to a PHP file that only contains a class, without any mechanism for accepting external input, an... Read more
Affected Products : subrion- Published: Feb. 27, 2024
- Modified: May. 23, 2025
-
9.8
CRITICALCVE-2022-26096
Null pointer dereference vulnerability in parser_ispe function in libsimba library prior to SMR Apr-2022 Release 1 allows out of bounds write by remote attacker.... Read more
- Published: Apr. 11, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2024-25995
An unauthenticated remote attacker can modify configurations to perform a remote code execution, gain root rights or perform an DoS due to improper input validation.... Read more
- Published: Mar. 12, 2024
- Modified: Jan. 30, 2025