CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
An arbitrary file upload vulnerability in the Add Student's Profile Picture function of Student Enrollment In PHP v1.0 allows attackers to execute arbitrary code via uploading a crafted PHP file. |
A vulnerability, which was classified as critical, has been found in Codezips Gym Management System 1.0. This issue affects some unknown processing of the file /dashboard/admin/over_month.php. The manipulation of the argument mm leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. |
A vulnerability classified as critical was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::GetNextLine in the library ParsingUtils.h of the component File Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. |
Incorrect Permission Assignment for Critical Resource, Cleartext Storage of Sensitive Information vulnerability in ABB Automation Builder.This issue affects Automation Builder: through 2.8.0. |
Incorrect Permission Assignment for Critical Resource vulnerability in ABB Automation Builder.This issue affects Automation Builder: through 2.8.0. |
A local file include vulnerability in the /servlet/Report of Zucchetti Ad Hoc Infinity 2.4 allows an authenticated attacker to achieve Remote Code Execution by uploading a jsp web/reverse shell through /jsp/zimg_upload.jsp. |
A vulnerability was found in thinkgem JeeSite up to 5.11.1. It has been rated as critical. Affected by this issue is the function ResourceLoader.getResource of the file /cms/fileTemplate/form of the component URI Scheme Handler. The manipulation of the argument Name leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. |
A vulnerability classified as critical has been found in Sony SNC-M1, SNC-M3, SNC-RZ25N, SNC-RZ30N, SNC-DS10, SNC-CS3N and SNC-RX570N up to 1.30. This affects an unknown part of the component Administrative Interface. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. It is recommended to change the configuration settings. The vendor was contacted early about this issue. They confirmed the existence but pointed out that they "have published the 'Hardening Guide' on the Web from July 2018 to January 2025 and have thoroughly informed customers of the recommendation to change their initial passwords". |
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused |
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused |
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused |
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused |
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused |
Prototype pollution vulnerability in stealjs steal 2.2.4 via the alias variable in babel.js. |
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused |
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused |
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused |
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused |
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused |
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused |