Aggregator
CVE-2025-46553 | misskey-dev summaly up to 5.2.0 protection mechanism (GHSA-7899-w6c4-vqc4)
4 months 1 week ago
A vulnerability has been found in misskey-dev summaly up to 5.2.0 and classified as problematic. Affected by this vulnerability is the function summaly. The manipulation leads to protection mechanism failure.
This vulnerability is known as CVE-2025-46553. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
Alien's Eye: Hunt Down 570 Social Media Accounts Using AI
4 months 1 week ago
Alien's Eye: Hunt Down 570 Social Media Accounts Using AI
Dark Web Informer - Cyber Threat Intelligence
CVE-2025-45239 | FoxCMS 2.0.6 Restore DataBackup.php path traversal
4 months 1 week ago
A vulnerability, which was classified as critical, was found in FoxCMS 2.0.6. Affected is an unknown function of the file DataBackup.php of the component Restore Handler. The manipulation leads to path traversal.
This vulnerability is traded as CVE-2025-45239. The attack needs to be done within the local network. There is no exploit available.
vuldb.com
CVE-2025-43844 | RVC-Project Retrieval-based-Voice-Conversion-WebUI up to 2.2.231006 click_train exp_dir1 command injection (GHSL-2025-012)
4 months 1 week ago
A vulnerability, which was classified as very critical, has been found in RVC-Project Retrieval-based-Voice-Conversion-WebUI up to 2.2.231006. This issue affects the function click_train. The manipulation of the argument exp_dir1 leads to command injection.
The identification of this vulnerability is CVE-2025-43844. The attack may be initiated remotely. There is no exploit available.
vuldb.com
Commvault security advisory (AV25–249)
4 months 1 week ago
Canadian Centre for Cyber Security
CVE-2025-4318 | Amazon Amplify Studio up to 2.20.2 UI neutralization of directives (AWS-2025-010)
4 months 1 week ago
A vulnerability classified as problematic was found in Amazon Amplify Studio up to 2.20.2. This vulnerability affects unknown code of the component UI. The manipulation leads to improper neutralization of directives in dynamically evaluated code ('eval injection').
This vulnerability was named CVE-2025-4318. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2017-6511 | andrzuk FineCMS application.php action Reflected cross site scripting
4 months 1 week ago
A vulnerability classified as problematic has been found in andrzuk FineCMS. This affects an unknown part of the file application/classes/application.php. The manipulation of the argument action leads to cross site scripting (Reflected).
This vulnerability is uniquely identified as CVE-2017-6511. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2018-10248 | WUZHI CMS 4.1.0 index.php?m=content&f=content&v=recycle_delete cross-site request forgery (Issue 130)
4 months 1 week ago
A vulnerability was found in WUZHI CMS 4.1.0. It has been classified as problematic. Affected is an unknown function of the file index.php?m=content&f=content&v=recycle_delete. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2018-10248. It is possible to launch the attack remotely. There is no exploit available.
vuldb.com
CVE-2018-10311 | WUZHI CMS 4.1.0 index.php?m=tags&f=index&v=add tag[pinyin] Persistent cross site scripting (Issue 131 / EDB-44618)
4 months 1 week ago
A vulnerability was found in WUZHI CMS 4.1.0 and classified as problematic. This issue affects some unknown processing of the file /index.php?m=tags&f=index&v=add. The manipulation of the argument tag[pinyin] as part of Parameter leads to cross site scripting (Persistent).
The identification of this vulnerability is CVE-2018-10311. The attack may be initiated remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2018-10312 | WUZHI CMS 4.1.0 index.php?m=member&v=pw_reset cross-site request forgery (Issue 132 / EDB-44504)
4 months 1 week ago
A vulnerability was found in WUZHI CMS 4.1.0. It has been classified as problematic. Affected is an unknown function of the file index.php?m=member&v=pw_reset. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2018-10312. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2018-10313 | WUZHI CMS 4.1.0 index.php?m=member&f=index&v=profile&set_iframe=1 form%5Bqq_10%5D Persistent cross site scripting (Issue 133 / EDB-44617)
4 months 1 week ago
A vulnerability was found in WUZHI CMS 4.1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /index.php?m=member&f=index&v=profile&set_iframe=1. The manipulation of the argument form%5Bqq_10%5D as part of Parameter leads to cross site scripting (Persistent).
This vulnerability is known as CVE-2018-10313. The attack can be launched remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2018-10367 | WUZHI CMS 4.1.0 Title/Content Stored cross site scripting (Issue 135)
4 months 1 week ago
A vulnerability was found in WUZHI CMS 4.1.0. It has been rated as problematic. This issue affects some unknown processing of the component Title/Content. The manipulation leads to cross site scripting (Stored).
The identification of this vulnerability is CVE-2018-10367. The attack may be initiated remotely. There is no exploit available.
vuldb.com
CVE-2018-10368 | WUZHI CMS 4.1.0 Extension Module Announcement Stored cross site scripting (Issue 136)
4 months 1 week ago
A vulnerability classified as problematic has been found in WUZHI CMS 4.1.0. Affected is an unknown function of the component Extension Module. The manipulation of the argument Announcement leads to cross site scripting (Stored).
This vulnerability is traded as CVE-2018-10368. It is possible to launch the attack remotely. There is no exploit available.
vuldb.com
CVE-2018-10391 | WUZHI CMS 4.1.0 index.php?m=member&v=register email cross site scripting (Issue 134)
4 months 1 week ago
A vulnerability was found in WUZHI CMS 4.1.0 and classified as problematic. This issue affects some unknown processing of the file index.php?m=member&v=register. The manipulation of the argument email as part of Parameter leads to cross site scripting.
The identification of this vulnerability is CVE-2018-10391. The attack may be initiated remotely. There is no exploit available.
vuldb.com
CVE-2018-11493 | WUZHI CMS 4.1.0 index.php?m=link&f=index&v=add cross-site request forgery (Issue 137)
4 months 1 week ago
A vulnerability, which was classified as problematic, has been found in WUZHI CMS 4.1.0. This issue affects some unknown processing of the file index.php?m=link&f=index&v=add. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2018-11493. The attack may be initiated remotely. There is no exploit available.
vuldb.com
CVE-2018-11528 | WUZHI CMS 4.1.0 api/sms_check.php param sql injection (Issue 138)
4 months 1 week ago
A vulnerability was found in WUZHI CMS 4.1.0. It has been classified as critical. Affected is an unknown function of the file api/sms_check.php. The manipulation of the argument param leads to sql injection.
This vulnerability is traded as CVE-2018-11528. It is possible to launch the attack remotely. There is no exploit available.
vuldb.com
CVE-2018-11549 | WUZHI CMS 4.1.0 Account Settings form[qq_10] Stored cross site scripting (Issue 139)
4 months 1 week ago
A vulnerability, which was classified as problematic, was found in WUZHI CMS 4.1.0. This affects an unknown part of the component Account Settings. The manipulation of the argument form[qq_10] leads to cross site scripting (Stored).
This vulnerability is uniquely identified as CVE-2018-11549. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2018-14512 | WUZHI CMS 4.1.0 System Settings index.php?m=core&f=set&v=sendmail form[nickname] Persistent cross site scripting (Issue 143)
4 months 1 week ago
A vulnerability, which was classified as problematic, has been found in WUZHI CMS 4.1.0. Affected by this issue is some unknown functionality of the file index.php?m=core&f=set&v=sendmail of the component System Settings. The manipulation of the argument form[nickname] as part of Parameter leads to cross site scripting (Persistent).
This vulnerability is handled as CVE-2018-14512. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2018-9866 | SonicWALL Global Management System up to 8.1 XML-RPC Call Parameter command injection (ID 13224 / ID 2026023)
4 months 1 week ago
A vulnerability was found in SonicWALL Global Management System up to 8.1. It has been rated as critical. This issue affects some unknown processing of the component XML-RPC Call Handler. The manipulation as part of Parameter leads to command injection.
The identification of this vulnerability is CVE-2018-9866. The attack may be initiated remotely. There is no exploit available.
vuldb.com