Export limit exceeded: 79090 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 79090 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (79090 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-38415 1 Qualcomm 360 215 Mobile Platform, 215 Mobile Platform Firmware, Ar8035 and 357 more 2024-11-07 7.8 High
Memory corruption while handling session errors from firmware.
CVE-2024-10335 2 Sadat, Sourcecodester 2 Garbage Collection Management System, Garbage Collection Management System 2024-11-07 7.3 High
A vulnerability was found in SourceCodester Garbage Collection Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "username" to be affected. But it must be assumed that the parameter "password" is affected as well.
CVE-2024-10336 2 Clothes Recommendation System Project, Sourcecodehero 2 Clothes Recommendation System, Clothes Recommendation System 2024-11-07 7.3 High
A vulnerability was found in SourceCodeHero Clothes Recommendation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/index.php of the component Admin Login Page. The manipulation of the argument t1 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-10711 1 Ithemelandco 1 Woocommerce Report 2024-11-07 8.8 High
The WooCommerce Report plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.1. This is due to missing or incorrect nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to update arbitrary options that can be leveraged for privilege escalation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVE-2024-51510 1 Huawei 2 Emui, Harmonyos 2024-11-07 7.6 High
Out-of-bounds access vulnerability in the logo module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2024-49366 1 Nginxui 1 Nginx Ui 2024-11-07 7.5 High
Nginx UI is a web user interface for the Nginx web server. Nginx UI v2.0.0-beta.35 and earlier gets the value from the json field without verification, and can construct a value value in the form of `../../`. Arbitrary files can be written to the server, which may result in loss of permissions. Version 2.0.0-beta.26 fixes the issue.
CVE-2024-49367 1 Nginxui 1 Nginx Ui 2024-11-07 7.5 High
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.0.0-beta.36, the log path of nginxui is controllable. This issue can be combined with the directory traversal at `/api/configs` to read directories and file contents on the server. Version 2.0.0-beta.36 fixes the issue.
CVE-2024-36485 1 Zohocorp 1 Manageengine Adaudit Plus 2024-11-07 8.3 High
Zohocorp ManageEngine ADAudit Plus versions below 8121 are vulnerable to SQL Injection in Technician reports option.
CVE-2024-21250 1 Oracle 1 Process Manufacturing Product Development 2024-11-06 8.1 High
Vulnerability in the Oracle Process Manufacturing Product Development product of Oracle E-Business Suite (component: Quality Manager Specification). Supported versions that are affected are 12.2.13-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Process Manufacturing Product Development. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Process Manufacturing Product Development accessible data as well as unauthorized access to critical data or complete access to all Oracle Process Manufacturing Product Development accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
CVE-2024-51408 1 Appsmith 1 Appsmith 2024-11-06 8.5 High
AppSmith Community 1.8.3 before 1.46 allows SSRF via New DataSource for application/json requests to 169.254.169.254 to retrieve AWS metadata credentials.
CVE-2024-48809 2 Aetherproject, Onosproject 3 Onos-a1t, Sdran-in-a-box, Sdran-in-a-box 2024-11-06 7.5 High
An issue in Open Networking Foundations sdran-in-a-box v.1.4.3 and onos-a1t v.0.2.3 allows a remote attacker to cause a denial of service via the onos-a1t component of the sdran-in-a-box, specifically the DeleteWatcher function.
CVE-2024-51329 1 Idrsdev 1 Agile-board 2024-11-06 8.1 High
A Host header injection vulnerability in Agile-Board 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link.
CVE-2024-51774 1 Qbittorrent 1 Qbittorrent 2024-11-06 8.1 High
qBittorrent before 5.0.1 proceeds with use of https URLs even after certificate validation errors.
CVE-2024-45785 2 Neumann, Neumannjp 2 Musasi, Musasi 2024-11-06 7.5 High
MUSASI version 3 contains an issue with use of client-side authentication. If this vulnerability is exploited, other users' credential and sensitive information may be retrieved.
CVE-2024-51561 2 63moons, Brokeragetechnologysolutions 3 Aero, Wave 2.0, Aero 2024-11-06 7.5 High
This vulnerability exists in Aero due to improper implementation of OTP validation mechanism in certain API endpoints. An authenticated remote attacker could exploit this vulnerability by intercepting and manipulating the responses exchanged during the second factor authentication process. Successful exploitation of this vulnerability could allow the attacker to bypass OTP verification for accessing other user accounts.
CVE-2024-10202 1 Wellchoose 1 Administrative Management System 2024-11-06 8.8 High
Administrative Management System from Wellchoose has an OS Command Injection vulnerability, allowing remote attackers with regular privileges to inject and execute arbitrary OS commands.
CVE-2024-48931 2 Icewhaletech, Zimaspace 2 Zimaos, Zimaos 2024-11-06 7.5 High
ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the ZimaOS API endpoint `http://<Zima_Server_IP:PORT>/v3/file?token=<token>&files=<file_path>` is vulnerable to arbitrary file reading due to improper input validation. By manipulating the `files` parameter, authenticated users can read sensitive system files, including `/etc/shadow`, which contains password hashes for all users. This vulnerability exposes critical system data and poses a high risk for privilege escalation or system compromise. The vulnerability occurs because the API endpoint does not validate or restrict file paths provided via the `files` parameter. An attacker can exploit this by manipulating the file path to access sensitive files outside the intended directory. As of time of publication, no known patched versions are available.
CVE-2024-9459 1 Zohocorp 1 Manageengine Exchange Reporter Plus 2024-11-06 8.3 High
Zohocorp ManageEngine Exchange Reporter Plus versions 5718 and prior are vulnerable to authenticated SQL Injection in reports module.
CVE-2024-47137 1 Openatom 1 Openharmony 2024-11-06 8.4 High
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write.
CVE-2024-47404 1 Openatom 1 Openharmony 2024-11-06 8.4 High
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through double free.