CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 94568 CVEs

CVE ID Severity Description EPSS Published
8.4 HIGH

Bagisto is an open source laravel eCommerce platform. A stored Cross-Site Scripting (XSS) vulnerability exists in Bagisto prior to version 2.3.10 within the CMS page editor. Although the platform normally attempts to sanitize `<script>` tags, the filtering can be bypassed by manipulating the raw HTTP POST request before submission. As a result, arbitrary JavaScript can be stored in the CMS content and executed whenever the page is viewed or edited. This exposes administrators to a high-severity risk, including complete account takeover, backend hijacking, and malicious script execution. Version 2.3.10 fixes the issue.

0.0% 2026-01-02
9.8 CRITICAL

Bagisto is an open source laravel eCommerce platform. Versions prior to 2.3.10 are vulnerable to server-side template injection via type parameter, which can lead to remote code execution or another exploitation. Version 2.3.10 fixes the issue.

0.7% 2026-01-02
8.8 HIGH

Bagisto is an open source laravel eCommerce platform. Versions prior to 2.3.10 are vulnerable to server-side template injection via first name and last name from a low-privilege user. Version 2.3.10 fixes the issue.

0.0% 2026-01-02
9.8 CRITICAL

Bagisto is an open source laravel eCommerce platform. Versions prior to 2.3.10 are vulnerable to server-side template injection. When a normal customer orders any product, in the `add address` step they can inject a value to run in admin view. The issue can lead to remote code execution. Version 2.3.10 contains a patch.

0.2% 2026-01-02
7.1 HIGH

Bagisto is an open source laravel eCommerce platform. Prior to version 2.3.10, an Insecure Direct Object Reference vulnerability in the customer order reorder function allows any authenticated customer to add items from another customer's order to their own shopping cart by manipulating the order ID parameter. This exposes sensitive purchase information and enables potential fraud. Version 2.3.10 patches the issue.

0.0% 2026-01-02
9.8 CRITICAL

Bagisto is an open source laravel eCommerce platform. In versions on the 2.3 branch prior to 2.3.10, API routes remain active even after initial installation is complete. The underlying API endpoints (`/install/api/*`) are directly accessible and exploitable without any authentication. An attacker can bypass the Ib installer entirely by calling the API endpoints directly. This allows any unauthenticated attacker to create admin accounts, modify application configurations, and potentially overwrite existing data. Version 2.3.10 fixes the issue.

0.1% 2026-01-02
9.1 CRITICAL

Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.0.dev45, multiple critical API endpoints in Langflow are missing authentication controls. The issue allows any unauthenticated user to access sensitive user conversation data, transaction histories, and perform destructive operations including message deletion. This affects endpoints handling personal data and system operations that should require proper authorization. Version 1.7.0.dev45 contains a patch.

7.0% 2026-01-02
4.3 MEDIUM

A security flaw has been discovered in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected by this issue is the function createResponseEntity of the file warehouse\src\main\java\com\yeqifu\sys\common\AppFileUtils.java. The manipulation of the argument path results in path traversal. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases.

0.1% 2026-01-02
5.5 MEDIUM

libtpms, a library that provides software emulation of a Trusted Platform Module, has a flaw in versions 0.10.0 and 0.10.1. The commonly used integration of libtpms with OpenSSL 3.x contained a vulnerability related to the returned IV (initialization vector) when certain symmetric ciphers were used. Instead of returning the last IV it returned the initial IV to the caller, thus weakening the subsequent encryption and decryption steps. The highest threat from this vulnerability is to data confidentiality. Version 0.10.2 fixes the issue. No known workarounds are available.

0.0% 2026-01-02
N/A

AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in AdonisJS multipart file handling may allow a remote attacker to write arbitrary files to arbitrary locations on the server filesystem. This impacts @adonisjs/bodyparser through version 10.1.1 and 11.x prerelease versions prior to 11.0.0-next.6. This issue has been patched in @adonisjs/bodyparser versions 10.1.2 and 11.0.0-next.6.

0.1% 2026-01-02
7.7 HIGH

Emlog is an open source website building system. Versions up to and including 2.5.19 are vulnerable to server-side Out-of-Band (OOB) requests / SSRF via uploaded SVG files. An attacker can upload a crafted SVG to http[:]//emblog/admin/media[.]php which contains external resource references. When the server processes/renders the SVG (thumbnailing, preview, or sanitization), it issues an HTTP request to the attacker-controlled host. Impact: server-side SSRF/OOB leading to internal network probing and potential metadata/credential exposure. As of time of publication, no known patched versions are available.

0.0% 2026-01-02
5.4 MEDIUM

Emlog is an open source website building system. Version 2.5.23 has a stored cross-site scripting vulnerability that can lead to account takeover, including takeover of admin accounts. As of time of publication, no known patched versions are available.

0.0% 2026-01-02
5.4 MEDIUM

Emlog is an open source website building system. Version 2.5.23 has a stored cross-site scripting vulnerability in the `Resource media library ` function while publishing an article. As of time of publication, no known patched versions are available.

0.0% 2026-01-02
9.3 CRITICAL

Emlog is an open source website building system. In version 2.5.23, article creation functionality is vulnerable to cross-site request forgery (CSRF). This can lead to a user being forced to post an article with arbitrary, attacker-controlled content. This, when combined with stored cross-site scripting, leads to account takeover. As of time of publication, no known patched versions are available.

0.0% 2026-01-02
7.3 HIGH

A vulnerability was found in code-projects Online Music Site 1.0. This impacts an unknown function of the file /Frontend/Feedback.php. Performing a manipulation of the argument fname results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.

0.0% 2026-01-02
7.3 HIGH

A vulnerability has been found in code-projects Online Music Site 1.0. This affects an unknown function of the file /Frontend/AlbumByCategory.php. Such manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

0.0% 2026-01-02
4.3 MEDIUM

Emlog is an open source website building system. In version 2.5.23, the admin can set controls which makes users unable to edit or delete their articles after publishing them. As of time of publication, no known patched versions are available.

0.0% 2026-01-02
7.3 HIGH

A flaw has been found in code-projects Online Music Site 1.0. The impacted element is an unknown function of the file /Frontend/ViewSongs.php. This manipulation of the argument ID causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.

0.0% 2026-01-02
7.3 HIGH

A vulnerability was detected in code-projects Content Management System 1.0. The affected element is an unknown function of the file /pages.php. The manipulation of the argument ID results in sql injection. The attack may be performed from remote. The exploit is now public and may be used.

0.0% 2026-01-02
4.7 MEDIUM

A security vulnerability has been detected in code-projects Content Management System 1.0. Impacted is an unknown function of the file /admin/edit_posts.php. The manipulation of the argument image leads to unrestricted upload. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.

0.1% 2026-01-02
5.0 MEDIUM

In the plex.tv backend for Plex Media Server (PMS) through 2025-12-31, a non-server device token can retrieve share tokens (intended for unrelated access) via a shared_servers endpoint.

0.0% 2026-01-02
5.0 MEDIUM

In the plex.tv backend for Plex Media Server (PMS) through 2025-12-31, a non-server device token can retrieve other tokens (intended for unrelated access) via clients.plex.tv/devices.xml.

0.0% 2026-01-02
7.1 HIGH

In Plex Media Server (PMS) through 1.42.2.10156, ability to access /myplex/account with a device token is not properly aligned with whether the device is currently associated with an account.

0.0% 2026-01-02
8.5 HIGH

Plex Media Server (PMS) through 1.42.2.10156 allows retrieval of a permanent access token via a /myplex/account call with a transient access token.

0.0% 2026-01-02
7.5 HIGH

An issue in Vatilon v1.12.37-20240124 allows attackers to access sensitive directories and files via a directory traversal.

0.2% 2026-01-02
7.5 HIGH

Vatilon v1.12.37-20240124 was discovered to transmit user credentials in plaintext.

0.0% 2026-01-02
7.5 HIGH

An authentication bypass in the /cgi-bin/jvsweb.cgi endpoint of Revotech I6032W-FHW v1.0.0014 - 20210517 allows attackers to access sensitive information and escalate privileges via a crafted HTTP request.

0.1% 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02
N/A

Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

- 2026-01-02