CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 30474 CVEs

CVE ID Severity Description EPSS Published
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_DLG.ASP'.

0.0% 2025-10-02
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_DHL.ASP'.

0.0% 2025-10-02
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_DELCROIX.ASP'.

0.0% 2025-10-02
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_CYLOG.ASP'.

0.0% 2025-10-02
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_CATOLD.ASP'.

0.0% 2025-10-02
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ 'SuppConn in /clt/LOGINFRM_CON.ASP'.

0.0% 2025-10-02
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_CAT.ASP'.

0.0% 2025-10-02
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_original.ASP'.

0.0% 2025-10-02
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_BET.ASP'.

0.0% 2025-10-02
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_LXA.ASP'.

0.0% 2025-10-02
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_DJO.ASP'.

0.0% 2025-10-02
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM.ASP'.

0.0% 2025-10-02
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier is 'l' parameter in '/clt/TRACK_REQUEST.ASP'.

0.0% 2025-10-02
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier is 'l' and 'reset' parameters in '/clt/changepassword.asp'.

0.0% 2025-10-02
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier is 'l' parameter in '/clt/resetPassword.asp'.

0.0% 2025-10-02
6.1 MEDIUM

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'm' parameter in '/lib/asp/alert.asp'.

0.0% 2025-10-02
7.5 HIGH

Vulnerability in the cryptographic algorithm of AndSoft's e-TMS v25.03, which uses MD5 to encrypt passwords. MD5 is a cryptographically vulnerable hash algorithm and is no longer considered secure for storing or transmitting passwords. It is vulnerable to collision attacks and can be easily cracked with modern hardware, exposing user credentials to potential risks.

0.0% 2025-10-02
7.5 HIGH

Path traversal vulnerability in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to access files only within the web root using the ā€œdocurlā€ parameter in ā€œ/lib/asp/DOCSAVEASASP.ASPā€.

0.1% 2025-10-02
9.8 CRITICAL

SQL injection vulnerability in AndSoft's e-TMS v25.03. This vulnerability could allow an attacker to retrieve, create, update, and delete databases by sending a POST request. The relationship between parameter and assigned identifier is aĀ 'SessionID' cookie in '/inc/connect/CONNECTION.ASP'.

0.0% 2025-10-02
9.8 CRITICAL

SQL injection vulnerability in AndSoft's e-TMS v25.03. This vulnerability could allow an attacker to retrieve, create, update, and delete databases by sending a POST request. The relationship between parameter and assigned identifier is aĀ 'USRMAIL' parameter in'/inc/login/TRACK_REQUESTFRMSQL.ASP'.

0.0% 2025-10-02
9.8 CRITICAL

Operating system command injection vulnerability in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute operating system commands on the server by sending a POST request. The relationship between parameter and assigned identifier is a 'm' parameter in '/CLT/LOGINERRORFRM.ASP'.

0.4% 2025-10-02
5.1 MEDIUM

FrostWire 6.14.0-build-326 for macOS contains permissive entitlements (allow-dyld-environment-variables, disable-library-validation) that allow unprivileged local attackers to inject code into the FrostWire process via the DYLD_INSERT_LIBRARIES environment variable. This allows escalated privileges to arbitrary TCC-approved directories.

0.0% 2025-10-02
9.8 CRITICAL

Operating system command injection vulnerability in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute operating system commands on the server by sending a POST request. The relationship between parameter and assigned identifier is a 'm' parameter in '/clt/LOGINFRM_CAT.ASP'.

0.4% 2025-10-02
9.8 CRITICAL

Operating system command injection vulnerability in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute operating system commands on the server by sending a POST request. The relationship between parameter and assigned identifier is a 'm' parameter in '/clt/LOGINFRM_original.ASP'.

0.4% 2025-10-02
9.8 CRITICAL

Operating system command injection vulnerability in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute operating system commands on the server by sending a POST request. The relationship between parameter and assigned identifier is a 'm' parameter in '/clt/LOGINFRM_BET.ASP'.

0.4% 2025-10-02
9.8 CRITICAL

Operating system command injection vulnerability in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute operating system commands on the server by sending a POST request. The relationship between parameter and assigned identifier is a 'm' parameter in '/clt/LOGINFRM_LXA.ASP'.

0.4% 2025-10-02
9.8 CRITICAL

Operating system command injection vulnerability in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute operating system commands on the server by sending a POST request. The relationship between parameter and assigned identifier is aĀ 'm' parameter in '/clt/LOGINFRM_DJO.ASP'.

0.4% 2025-10-02
9.8 CRITICAL

Operating system command injection vulnerability in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute operating system commands on the server by sending a POST request. The relationship between parameter and assigned identifier is aĀ 'm' parameter in '/clt/LOGINFRM.ASP'.

0.4% 2025-10-02
6.5 MEDIUM

ERPNEXT v15.67.0 was discovered to contain multiple SQL injection vulnerabilities in the /api/method/frappe.desk.reportview.get endpoint via the order_by and group_by parameters.

0.0% 2025-10-02
6.5 MEDIUM

Frappe Framework v15.72.4 was discovered to contain a SQL injection vulnerability via the fieldname parameter in the frappe.client.get_value API endpoint and a crafted script to the fieldname parameter

0.0% 2025-10-02
5.4 MEDIUM

A stored cross-site scripting (XSS) vulnerability in the blog post feature of ERPNEXT v15.67.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the content field.

0.0% 2025-10-02
N/A

A UNIX Symbolic Link (Symlink) Following vulnerability in logrotate config in the exim package allowed privilege escalation from mail user/group to root.This issue affects Tumbleweed: from ? before 4.98.2-lp156.248.1.

0.0% 2025-10-02
7.5 HIGH

TP-Link AX1800 WiFi 6 Router (Archer AX21) devices allow unauthenticated attackers (on the LAN) to execute arbitrary code as root via the db_dir field to minidlnad. The attacker obtains the ability to modify files.db, and that can be used to reach a stack-based buffer overflow in minidlna-1.1.2/upnpsoap.c. Exploitation requires that a USB flash drive is connected to the router (customers often do this to make a \\192.168.0.1 share available on their local network).

1.8% 2025-10-02
N/A

Incorrect Cross-Origin Resource Sharing (CORS) configuration in Hiberus Sintra. Cross-Origin Resource Sharing (CORS) allows browsers to make cross-domain requests in a controlled manner. This request has an ā€œOriginā€ header that identifies the domain making the initial request and defines the protocol between a browser and a server to see if the request is allowed. An attacker can exploit this and potentially perform privileged actions and access confidential information when Access-Control-Allow-Credentials is enabled.

0.1% 2025-10-02
6.7 MEDIUM

AnĀ Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS 7.4.0 through 7.4.7, 7.2.0 through 7.2.11, 7.0.6 and above; and FortiProxy 7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, 7.0.5 and aboveĀ may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component.

0.0% 2025-10-02
7.2 HIGH

An open redirect vulnerability existed in KNIME Business Hub prior to version 1.16.0. An unauthenticated remote attacker could craft a link to a legitimate KNIME Business Hub installation which, when opened by the user, redirects the user to a page of the attackers choice. This might open the possibility for fishing or other similar attacks. The problem has been fixed in KNIME Business Hub 1.16.0.

0.0% 2025-10-02
4.3 MEDIUM

Potentially sensitive information in jobs on KNIME Business Hub prior to 1.16.0 were visible to all members of the user's team. Starting with KNIME Business Hub 1.16.0 only metadata of jobs is shown to team members. Only the creator of a job can see all information including in- and output data (if present).

0.0% 2025-10-02
6.3 MEDIUM

Use of Hard-coded Credentials, Authorization Bypass Through User-Controlled Key vulnerability in PosCube Hardware Software and Consulting Ltd. Co. Assist allows Excavation, Authentication Bypass.This issue affects Assist: through 10.02.2025.

0.1% 2025-10-02
N/A

Incorrect authentication vulnerability in OpenSIAC, which could allow an attacker to impersonate a person using Cl@ve as an authentication method.

0.1% 2025-10-02
8.0 HIGH

A vulnerability has been identified within Rancher Manager whereby the SAML authentication from the Rancher CLI tool is vulnerable to phishing attacks. The custom authentication protocol for SAML-based providers can be abused to steal Rancher’s authentication tokens.

0.0% 2025-10-02
7.6 HIGH

A vulnerability has been identified within Rancher Manager where a missing server-side validation on the `.username` field in Rancher can allow users with update permissions on other User resources to cause denial of access for targeted accounts.

0.0% 2025-10-02
6.5 MEDIUM

Path Traversal in the log file retrieval function in Canonical LXD 5.0 LTS on Linux allows authenticated remote attackers to read arbitrary files on the host system via crafted log file names or symbolic links.

0.1% 2025-10-02
N/A

Stored XSS vulnerability in Creativeitem Sociopro due to lack of proper validation of user inputs via the endpoint '/sociopro/profile/update_profile', affecting to 'name' parameter via POST. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal his/her cookie session details.

0.2% 2025-10-02
5.4 MEDIUM

Stored Cross Site Scripting vulnerability in Ekushey CRM v5.0 by Creativeitem, due to lack of proper validation of user inputs via the "/ekushey/index.php/client/project_file/upload/xxxx", affecting to "description" parameter via POST. This vulnerability could allow a remote attacker to send a specially crafted query to an authenticated user and steal his/her cookie session details.

0.1% 2025-10-02
5.4 MEDIUM

Stored Cross Site Scripting vulnerability in Ekushey CRM v5.0 by Creativeitem, due to lack of proper validation of user inputs via the "/ekushey/index.php/client/project_bug/create/xxx", affecting to "title" and "description" parameters via POST. This vulnerability could allow a remote attacker to send a specially crafted query to an authenticated user and steal his/her cookie session details.

0.1% 2025-10-02
5.4 MEDIUM

Stored Cross Site Scripting vulnerability in Ekushey CRM v5.0 by Creativeitem, due to lack of proper validation of user inputs via the "/ekushey/index.php/client/project_message/add/xxx", affecting to "message" parameter via POST. This vulnerability could allow a remote attacker to send a specially crafted query to an authenticated user and steal his/her cookie session details.

0.1% 2025-10-02
7.3 HIGH

Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin. This issue affects Apache Kylin: from 4.0.0 through 5.0.2.Ā You are fine as long as the Kylin's system and project admin access is well protected. Users are recommended to upgrade to version 5.0.3, which fixes the issue.

0.1% 2025-10-02
7.5 HIGH

Files or Directories Accessible to External Parties vulnerability in Apache Kylin. You are fine as long as the Kylin's system and project admin access is well protected. This issue affects Apache Kylin: from 4.0.0 through 5.0.2. Users are recommended to upgrade to version 5.0.3, which fixes the issue.

0.1% 2025-10-02
7.5 HIGH

Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Kylin. This issue affects Apache Kylin: from 4.0.0 through 5.0.2. Users are recommended to upgrade to version 5.0.3, which fixes the issue.

0.1% 2025-10-02
4.7 MEDIUM

A vulnerability has been identified within Rancher Manager whereby `Impersonate-Extra-*` headers are being sent to an external entity, for example `amazonaws.com`, via the `/meta/proxy` Rancher endpoint. These headers may contain identifiable and/or sensitive information e.g. email addresses.

0.0% 2025-10-02