Vulnerability Research
CVEs
66 vulnerabilities reported
2026
18CVE-2026-26215
9.3 CRITICALmanga-image-translator version beta-0.3 and prior in shared API mode contains an unsafe deserialization vulnerability via pickle.loads() on two FastAPI endpoints, combined with a nonce authentication bypass that defaults to an empty string, allowing unauthenticated remote code execution.
CVE-2026-26220
9.3 CRITICALLightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD master node exposes WebSocket endpoints that receive binary frames and pass the data directly to pickle.loads() without authentication or validation. The server explicitly refuses to bind to localhost, ensuring these endpoints are always network-exposed.
CVE-2026-27174
9.8 CRITICALMajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit statement, allowing unauthenticated requests to reach eval() via register_globals parameters.
CVE-2026-27175
9.8 CRITICALMajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS command injection via rc/index.php. The $param variable is interpolated into a command string within double quotes without escapeshellarg(), queued via safe_exec(), and executed by the web-accessible cycle_execs.php worker via exec().
CVE-2026-27176
6.1 MEDIUMMajorDoMo (aka Major Domestic Module) contains a reflected cross-site scripting (XSS) vulnerability in command.php. The $qry parameter is rendered directly into the HTML page without htmlspecialchars().
CVE-2026-27177
7.2 HIGHMajorDoMo (aka Major Domestic Module) contains a stored XSS vulnerability via the unauthenticated /objects/?op=set endpoint. Property values are stored raw and rendered without escaping in the admin panel's property editor, enabling session hijack via cookie exfiltration.
CVE-2026-27178
7.2 HIGHMajorDoMo (aka Major Domestic Module) contains a stored XSS vulnerability through method parameter injection into the shoutbox. Default methods pass attacker-controlled parameters into say(), which stores messages raw. The dashboard widget auto-refreshes every 3 seconds, firing the XSS automatically.
CVE-2026-27179
8.2 HIGHMajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in the commands module. The $_GET['parent'] parameter is directly interpolated into multiple SQL queries without sanitization. Admin passwords are stored as unsalted MD5 hashes.
CVE-2026-27180
9.8 CRITICALMajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method without authentication, allowing an attacker to poison the update URL, serve a malicious tarball, and trigger deployment to the webroot.
CVE-2026-27181
7.5 HIGHMajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation through the market module. The market module's admin() method is reachable without authentication, enabling recursive deletion of module files, templates, and database records.
CVE-2026-27743
9.8 CRITICALSPIP referer_spam plugin <= 1.2.1 is vulnerable to unauthenticated blind SQL injection. Two action handlers take $_GET['url'] and concatenate it raw into SQL LIKE clauses without sql_quote(), securiser_action(), or autoriser().
CVE-2026-27744
9.8 CRITICALSPIP tickets plugin <= 4.3.2 is vulnerable to unauthenticated remote code execution. During forum comment preview, raw _request() values are concatenated into the previsu error key, which is rendered via #ENV** (interdire_scripts=false), allowing PHP code injection through SPIP's template eval() chain.
CVE-2026-27745
8.8 HIGHSPIP interface_traduction_objets plugin <= 2.2.1 is vulnerable to authenticated remote code execution. The lang_dest parameter is concatenated raw into _hidden, which skips protege_champ() and renders with interdire_scripts=false, enabling PHP code injection via SPIP's template eval() chain.
CVE-2026-27746
6.1 MEDIUMSPIP jeux plugin <= 4.1.0 is vulnerable to reflected XSS. The debut_index_jeux and index_jeux parameters are interpolated unsanitized into a single-quoted HTML id attribute, allowing attribute breakout and script injection.
CVE-2026-27747
6.5 MEDIUMSPIP interface_traduction_objets plugin <= 2.2.1 is vulnerable to authenticated blind SQL injection. The id_parent parameter from _request() is concatenated raw into a sql_getfetsel WHERE clause without intval() or sql_quote().
CVE-2026-28515
9.3 CRITICALopenDCIM install.php performs no role check before the LDAP configuration form, allowing any authenticated user (or unauthenticated on Docker deployments) to reach Config::UpdateParameter() calls.
CVE-2026-28516
9.3 CRITICALopenDCIM Config::UpdateParameter() uses string interpolation in SQL queries. PDO with MySQL supports stacked queries, giving full database control via the LDAP configuration form in install.php.
CVE-2026-28517
9.3 CRITICALopenDCIM report_network_map.php reads the dot config value from fac_Config and passes it directly to exec() without validation. Combined with CVE-2026-28516, an attacker can overwrite the value and achieve RCE.
2025
26CVE-2025-34452
8.7 HIGHStreama versions 1.10.0 through 1.10.5 and prior to commit b7c8767 contain a combination of path traversal and server-side request forgery (SSRF) vulnerabilities that allow an authenticated attacker to write arbitrary files to the server filesystem.
CVE-2025-34433
9.3 CRITICALAVideo versions 14.3.1 prior to 20.1 contain an unauthenticated remote code execution vulnerability caused by predictable generation of an installation salt using PHP uniqid(). The installation timestamp is exposed via a public endpoint, and a derived hash identifier is accessible through unauthenticated API responses, allowing attackers to brute-force the remaining entropy. The recovered salt can then be used to encrypt a malicious payload supplied to a notification API endpoint that evaluates attacker-controlled input, resulting in arbitrary code execution as the web server user.
CVE-2025-34434
9.1 CRITICALAVideo versions prior to 20.0 with the ImageGallery plugin enabled is vulnerable to unauthenticated file upload and deletion. Plugin endpoints responsible for managing gallery images fail to enforce authentication checks and do not validate ownership, allowing unauthenticated attackers to upload or delete images associated with any image-based video.
CVE-2025-34435
6.5 MEDIUMAVideo versions prior to 20.0 are vulnerable to an insecure direct object reference (IDOR) that allows any authenticated user to delete media files belonging to other users. The affected endpoint validates authentication but fails to verify ownership or edit permissions for the targeted video.
CVE-2025-34436
8.8 HIGHAVideo versions prior to 20.0 allow any authenticated user to upload files into directories belonging to other users due to an insecure direct object reference. The upload functionality verifies authentication but does not enforce ownership checks.
CVE-2025-34437
8.8 HIGHAVideo versions prior to 20.0 permit any authenticated user to upload comment images to videos owned by other users. The endpoint validates authentication but omits ownership checks, allowing attackers to perform unauthorized uploads to arbitrary video objects.
CVE-2025-34438
8.1 HIGHAVideo versions prior to 20.0 contain an insecure direct object reference vulnerability allowing users with upload permissions to modify the rotation metadata of any video. The endpoint verifies upload capability but fails to enforce ownership or management rights for the targeted video.
CVE-2025-34439
6.1 MEDIUMAVideo versions prior to 20.0 are vulnerable to an open redirect flaw due to missing validation of the cancelUri parameter during user login. An attacker can craft a link to redirect users to arbitrary external sites, enabling phishing attacks.
CVE-2025-34440
6.1 MEDIUMAVideo versions prior to 20.0 contain an open redirect vulnerability caused by insufficient validation of the siteRedirectUri parameter during user registration. Attackers can redirect users to external sites, facilitating phishing attacks.
CVE-2025-34441
7.5 HIGHAVideo versions prior to 20.0 expose sensitive user information through an unauthenticated public API endpoint. Responses include emails, usernames, administrative status, and last login times, enabling user enumeration and privacy violations.
CVE-2025-34442
7.5 HIGHAVideo versions prior to 20.0 disclose absolute filesystem paths via multiple public API endpoints. Returned metadata includes full server paths to media files, revealing underlying filesystem structure and facilitating more effective attack chains.
CVE-2025-2611
9.3 CRITICALICTBroadcast <= 7.4 is vulnerable to an unauthenticated remote code execution. The /login.php page issues a session cookie, and certain cookie keys are evaluated using shell backticks in server-side code. This allows attackers to inject arbitrary system commands into the cookie, resulting in code execution during session handling, without authentication.
CVE-2025-34147
9.4 CRITICALAn unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in Extender mode via its captive portal, the extap2g SSID field is inserted unescaped into a reboot-time shell script. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root during device reboot, leading to full system compromise.
CVE-2025-34148
9.4 CRITICALAn unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in WISP mode, the 'ssid' parameter is passed unsanitized to system-level scripts. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root, resulting in full device compromise.
CVE-2025-34149
9.4 CRITICALA command injection vulnerability affects the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) during WPA2 configuration. The 'key' parameter is interpreted directly by the system shell, enabling attackers to execute arbitrary commands as root. Exploitation requires no authentication and can be triggered during wireless setup.
CVE-2025-34150
9.4 CRITICALThe PPPoE configuration interface of the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) is vulnerable to command injection via the 'user' parameter. Input is processed unsafely during network setup, allowing attackers to execute arbitrary system commands with root privileges.
CVE-2025-34151
9.4 CRITICALA command injection vulnerability exists in the 'passwd' parameter of the PPPoE setup process on the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). The input is passed directly to system-level commands without sanitation, enabling unauthenticated attackers to achieve root-level code execution.
CVE-2025-34152
9.4 CRITICALAn unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal `date -s` command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.
CVE-2025-2609
8.2 HIGHMagnusBilling 7.3.0 and lower is vulnerable to an unauthenticated stored XSS via the login logs feature. Malicious input submitted as a username during login is stored and later executed in the admin context.
CVE-2025-2610
7.6 HIGHMagnusBilling 7.3.0 and lower contains a stored XSS vulnerability in the Alarm module. Unsanitized message fields can lead to arbitrary JavaScript execution when viewed by an administrator.
CVE-2025-2292
6.5 MEDIUMXorcom CompletePBX <= 5.2.35 is vulnerable to authenticated file disclosure, allowing access to sensitive files through crafted requests.
CVE-2025-30004
8.8 HIGHXorcom CompletePBX <= 5.2.35 contains an authenticated command injection vulnerability, leading to remote code execution via system commands.
CVE-2025-30005
8.3 HIGHXorcom CompletePBX <= 5.2.35 is affected by a path traversal vulnerability allowing authenticated file deletion and access to arbitrary paths.
CVE-2025-30006
6.1 MEDIUMXorcom CompletePBX 5.2.35 is vulnerable to an authenticated reflected XSS, allowing JavaScript injection via crafted input.
CVE-2025-30007
8.2 HIGHVembu BDRSuite <= 7.5.0.1 is affected by an unauthenticated stored XSS in serverbackupprogress.sgp via the ClientName and BackupName parameters.
CVE-2025-30008
8.2 HIGHVembu BDRSuite <= 7.5.0.1 contains an unauthenticated stored XSS in restoreprogress.sgp through multiple unsanitized URL parameters.
2024
21CVE-2024-22899
8.8 HIGHVinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the syncNtpTime function.
CVE-2024-22900
8.8 HIGHVinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the setNetworkCardInfo function.
CVE-2024-22901
9.8 CRITICALVinchin Backup & Recovery v7.2 was discovered to use default MYSQL credentials.
CVE-2024-22902
9.8 CRITICALVinchin Backup & Recovery v7.2 was discovered to be configured with default root credentials.
CVE-2024-22903
8.8 HIGHVinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the deleteUpdateAPK function.
CVE-2024-25228
8.8 HIGHVinchin Backup and Recovery 7.2 and Earlier is vulnerable to Authenticated Remote Code Execution (RCE) via the getVerifydiyResult function in ManoeuvreHandler.class.php.
CVE-2024-30920
7.4 HIGHCross Site Scripting vulnerability in DerbyNet v9.0 and below allows a remote attacker to execute arbitrary code via the render-document.php component.
CVE-2024-30921
5.4 MEDIUMCross Site Scripting vulnerability in DerbyNet v9.0 and below allows a remote attacker to execute arbitrary code via the photo.php component.
CVE-2024-30922
9.8 CRITICALSQL Injection vulnerability in DerbyNet v9.0 allows a remote attacker to execute arbitrary code via the where Clause in Award Document Rendering.
CVE-2024-30923
9.8 CRITICALSQL Injection vulnerability in DerbyNet v9.0 and below allows a remote attacker to execute arbitrary code via the where Clause in Racer Document Rendering.
CVE-2024-30924
4.6 MEDIUMCross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the checkin.php component.
CVE-2024-30925
6.5 MEDIUMCross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the photo-thumbs.php component.
CVE-2024-30926
4.6 MEDIUMCross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the ./inc/kiosks.inc component.
CVE-2024-30927
6.3 MEDIUMCross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the racer-results.php component.
CVE-2024-30928
8.1 HIGHSQL Injection vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary SQL commands via 'classids' Parameter in ajax/query.slide.next.inc.
CVE-2024-30929
8 HIGHCross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the 'back' Parameter in playlist.php.
CVE-2024-31818
9.8 CRITICALDirectory Traversal vulnerability in DerbyNet v9.0 allows a remote attacker to execute arbitrary code via the page parameter of the kiosk.php component.
CVE-2024-31819
9.8 CRITICALAn issue in WWBN AVideo v12.4 through v14.2 allows a remote attacker to execute arbitrary code via the systemRootPath parameter of the submitIndex.php component.
CVE-2024-3032
6.1 MEDIUMThemify Builder < 7.5.8 does not validate a parameter before redirecting the user to its value, leading to an Open Redirect issue.
CVE-2024-35373
9.8 CRITICALMocodo Online 4.2.6 and below is vulnerable to Remote Code Execution via /web/rewrite.php.
CVE-2024-35374
9.8 CRITICALMocodo Online 4.2.6 and below does not properly sanitize the sql_case input field in /web/generate.php, leading to remote code execution (RCE).