Search Results (332947 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-4566 1 Huawei 2 Emui, Harmonyos 2025-06-20 7.5 High
Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2023-4536 1 Koalaapps 1 My Account Page Editor 2025-06-20 8.8 High
The My Account Page Editor WordPress plugin before 1.3.2 does not validate the profile picture to be uploaded, allowing any authenticated users, such as subscriber to upload arbitrary files to the server, leading to RCE
CVE-2023-49259 1 Hongdian 2 H8951-4g-esp, H8951-4g-esp Firmware 2025-06-20 7.5 High
The authentication cookies are generated using an algorithm based on the username, hardcoded secret and the up-time, and can be guessed in a reasonable time.
CVE-2023-49256 1 Hongdian 2 H8951-4g-esp, H8951-4g-esp Firmware 2025-06-20 7.5 High
It is possible to download the configuration backup without authorization and decrypt included passwords using hardcoded static key.
CVE-2023-49254 1 Hongdian 2 H8951-4g-esp, H8951-4g-esp Firmware 2025-06-20 8.8 High
Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the "destination" field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly.
CVE-2023-49253 1 Hongdian 2 H8951-4g-esp, H8951-4g-esp Firmware 2025-06-20 9.8 Critical
Root user password is hardcoded into the device and cannot be changed in the user interface.
CVE-2023-48166 1 Unify 1 Openscape Voice 2025-06-20 7.5 High
A directory traversal vulnerability in the SOAP Server integrated in Atos Unify OpenScape Voice V10 before V10R3.26.1 allows a remote attacker to view the contents of arbitrary files in the local file system. An unauthenticated attacker might obtain sensitive files that allow for the compromise of the underlying system.
CVE-2023-46226 1 Apache 1 Iotdb 2025-06-20 9.8 Critical
Remote Code Execution vulnerability in Apache IoTDB.This issue affects Apache IoTDB: from 1.0.0 through 1.2.2. Users are recommended to upgrade to version 1.3.0, which fixes the issue.
CVE-2023-40362 1 Centralsquare 1 Click2gov Building Permit 2025-06-20 4.3 Medium
An issue was discovered in CentralSquare Click2Gov Building Permit before October 2023. Lack of access control protections allows remote attackers to arbitrarily delete the contractors from any user's account when the user ID and contractor information is known.
CVE-2023-3771 1 T1 Project 1 T1 2025-06-20 6.1 Medium
The T1 WordPress theme through 19.0 is vulnerable to unauthenticated open redirect with which any attacker and redirect users to arbitrary websites.
CVE-2023-3647 1 Indigitall 1 Iurny 2025-06-20 4.8 Medium
The IURNY by INDIGITALL WordPress plugin before 3.2.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
CVE-2023-3372 1 Lana 1 Lana Shortcodes 2025-06-20 5.4 Medium
The Lana Shortcodes WordPress plugin before 1.2.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which allows users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
CVE-2023-34063 1 Vmware 2 Aria Automation, Cloud Foundation 2025-06-20 9.9 Critical
Aria Automation contains a Missing Access Control vulnerability. An authenticated malicious actor may exploit this vulnerability leading to unauthorized access to remote organizations and workflows.
CVE-2023-30016 1 Oretnom23 1 Judging Management System 2025-06-20 9.8 Critical
SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via sub_event_id parameter in sub_event_details_edit.php.
CVE-2023-22526 1 Atlassian 2 Confluence Data Center, Confluence Server 2025-06-20 8.8 High
This High severity RCE (Remote Code Execution) vulnerability was introduced in version 7.19.0 of Confluence Data Center. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Confluence Data Center customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Confluence Data Center and Server 7.19: Upgrade to a release 7.19.17, or any higher 7.19.x release Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release See the release notes ([https://confluence.atlassian.com/doc/confluence-release-notes-327.html]). You can download the latest version of Confluence Data Center from the download center ([https://www.atlassian.com/software/confluence/download-archives]). This vulnerability was discovered by m1sn0w and reported via our Bug Bounty program
CVE-2023-20573 1 Amd 130 Epyc 7203, Epyc 7203 Firmware, Epyc 7203p and 127 more 2025-06-20 3.2 Low
A privileged attacker can prevent delivery of debug exceptions to SEV-SNP guests potentially resulting in guests not receiving expected debug information.
CVE-2023-0824 1 Wpuserplus 1 Userplus 2025-06-20 7.4 High
The User registration & user profile WordPress plugin through 2.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged-in admin add Stored XSS payloads via a CSRF attack.
CVE-2023-0479 1 Tychesoftwares 1 Print Invoice \& Delivery Notes For Woocommerce 2025-06-20 6.1 Medium
The Print Invoice & Delivery Notes for WooCommerce WordPress plugin before 4.7.2 is vulnerable to reflected XSS by echoing a GET value in an admin note within the WooCommerce orders page. This means that this vulnerability can be exploited for users with the edit_others_shop_orders capability. WooCommerce must be installed and active. This vulnerability is caused by a urldecode() after cleanup with esc_url_raw(), allowing double encoding.
CVE-2022-3829 1 Newnine 1 Font Awesome 4 Menus 2025-06-20 4.8 Medium
The Font Awesome 4 Menus WordPress plugin through 4.7.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
CVE-2022-3764 1 Wpvibes 1 Form Vibes 2025-06-20 7.2 High
The plugin does not filter the "delete_entries" parameter from user requests, leading to an SQL Injection vulnerability.