Search Results (328883 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-46080 1 Scriptcase 1 Scriptcase 2025-04-28 8 High
Scriptcase v9.10.023 and before is vulnerable to Remote Code Execution (RCE) via the nm_zip function.
CVE-2024-46083 1 Scriptcase 1 Scriptcase 2025-04-28 5.4 Medium
Scriptcase v9.10.023 and before is vulnerable to Cross Site Scripting (XSS). An authenticated user can craft malicious payloads using the messages feature, which allows the injection of malicious code into any user's account on the platform. It is important to note that regular users can trigger actions for administrator users.
CVE-2024-46079 1 Scriptcase 1 Scriptcase 2025-04-28 6.1 Medium
Scriptcase v9.10.023 and before is vulnerable to Cross Site Scripting (XSS) in proj_new.php via the Descricao parameter.
CVE-2024-46081 1 Scriptcase 1 Scriptcase 2025-04-28 5.4 Medium
Scriptcase v9.10.023 and before is vulnerable to Cross Site Scripting (XSS). An authenticated user can craft malicious payloads in the To-Do List. The assigned user will trigger a stored XSS, which is particularly dangerous because tasks are assigned to various users on the platform.
CVE-2024-55516 1 Raisecom 8 Msg1200, Msg1200 Firmware, Msg2100e and 5 more 2025-04-28 9.1 Critical
A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 v3.90. The component affected by this issue is /upload_sysconfig.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded, potentially leading to unauthorized access to server permissions.
CVE-2024-55515 1 Raisecom 8 Msg1200, Msg1200 Firmware, Msg2100e and 5 more 2025-04-28 9.8 Critical
A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90. The component affected by this issue is /upload_ipslib.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded.
CVE-2024-55514 1 Raisecom 8 Msg1200, Msg1200 Firmware, Msg2100e and 5 more 2025-04-28 6.3 Medium
A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90. The component affected by this issue is /upload_sfmig.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded, potentially leading to unauthorized access to server permissions.
CVE-2024-55513 1 Raisecom 8 Msg1200, Msg1200 Firmware, Msg2100e and 5 more 2025-04-28 9.1 Critical
A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90. The component affected by this issue is /upload_netaction.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded, potentially leading to unauthorized access to server permissions.
CVE-2024-29507 1 Artifex 1 Ghostscript 2025-04-28 5.4 Medium
Artifex Ghostscript before 10.03.0 sometimes has a stack-based buffer overflow via the CIDFSubstPath and CIDFSubstFont parameters.
CVE-2024-29510 2 Artifex, Redhat 3 Ghostscript, Enterprise Linux, Rhel Eus 2025-04-28 6.3 Medium
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
CVE-2024-39842 1 Centreon 1 Centreon 2025-04-28 7.2 High
A SQL injection vulnerability in Centreon 24.04.2 allows a remote high-privileged attacker to execute arbitrary SQL command via user massive changes inputs.
CVE-2024-29511 1 Artifex 1 Ghostscript 2025-04-28 7.5 High
Artifex Ghostscript before 10.03.1, when Tesseract is used for OCR, has a directory traversal issue that allows arbitrary file reading (and writing of error messages to arbitrary files) via OCRLanguage. For example, exploitation can use debug_file /tmp/out and user_patterns_file /etc/passwd.
CVE-2024-39843 1 Centreon 1 Centreon 2025-04-28 6.7 Medium
A SQL injection vulnerability in Centreon 24.04.2 allows a remote high-privileged attacker to execute arbitrary SQL command via create user form inputs.
CVE-2024-42797 2 Kashipara, Lopalopa 2 Music Management System, Music Management System 2025-04-28 9.8 Critical
An Incorrect Access Control vulnerability was found in /music/ajax.php?action=delete_playlist in Kashipara Music Management System v1.0. This vulnerability allows an unauthenticated attacker to delete the valid music playlist entries.
CVE-2024-46607 1 Thecosy 1 Icecms 2025-04-28 7.6 High
Incorrect access control in IceCMS v3.4.7 and before allows attackers to authenticate by entering any arbitrary values as the username and password via the loginAdmin method in the UserController.java file.
CVE-2025-27172 1 Adobe 1 Substance 3d Designer 2025-04-28 7.8 High
Substance3D - Designer versions 14.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-21169 1 Adobe 1 Substance 3d Designer 2025-04-28 7.8 High
Substance3D - Designer versions 14.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-27175 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2025-04-28 7.8 High
InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-27171 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2025-04-28 7.8 High
InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-27166 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2025-04-28 7.8 High
InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.