Export limit exceeded: 346772 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 79038 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (79038 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-10336 2 Clothes Recommendation System Project, Sourcecodehero 2 Clothes Recommendation System, Clothes Recommendation System 2024-11-07 7.3 High
A vulnerability was found in SourceCodeHero Clothes Recommendation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/index.php of the component Admin Login Page. The manipulation of the argument t1 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-51510 1 Huawei 2 Emui, Harmonyos 2024-11-07 7.6 High
Out-of-bounds access vulnerability in the logo module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2024-49366 1 Nginxui 1 Nginx Ui 2024-11-07 7.5 High
Nginx UI is a web user interface for the Nginx web server. Nginx UI v2.0.0-beta.35 and earlier gets the value from the json field without verification, and can construct a value value in the form of `../../`. Arbitrary files can be written to the server, which may result in loss of permissions. Version 2.0.0-beta.26 fixes the issue.
CVE-2024-49367 1 Nginxui 1 Nginx Ui 2024-11-07 7.5 High
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.0.0-beta.36, the log path of nginxui is controllable. This issue can be combined with the directory traversal at `/api/configs` to read directories and file contents on the server. Version 2.0.0-beta.36 fixes the issue.
CVE-2024-36485 1 Zohocorp 1 Manageengine Adaudit Plus 2024-11-07 8.3 High
Zohocorp ManageEngine ADAudit Plus versions below 8121 are vulnerable to SQL Injection in Technician reports option.
CVE-2024-21250 1 Oracle 1 Process Manufacturing Product Development 2024-11-06 8.1 High
Vulnerability in the Oracle Process Manufacturing Product Development product of Oracle E-Business Suite (component: Quality Manager Specification). Supported versions that are affected are 12.2.13-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Process Manufacturing Product Development. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Process Manufacturing Product Development accessible data as well as unauthorized access to critical data or complete access to all Oracle Process Manufacturing Product Development accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
CVE-2024-51408 1 Appsmith 1 Appsmith 2024-11-06 8.5 High
AppSmith Community 1.8.3 before 1.46 allows SSRF via New DataSource for application/json requests to 169.254.169.254 to retrieve AWS metadata credentials.
CVE-2024-51329 1 Idrsdev 1 Agile-board 2024-11-06 8.1 High
A Host header injection vulnerability in Agile-Board 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link.
CVE-2024-51774 1 Qbittorrent 1 Qbittorrent 2024-11-06 8.1 High
qBittorrent before 5.0.1 proceeds with use of https URLs even after certificate validation errors.
CVE-2024-45785 2 Neumann, Neumannjp 2 Musasi, Musasi 2024-11-06 7.5 High
MUSASI version 3 contains an issue with use of client-side authentication. If this vulnerability is exploited, other users' credential and sensitive information may be retrieved.
CVE-2024-51561 2 63moons, Brokeragetechnologysolutions 3 Aero, Wave 2.0, Aero 2024-11-06 7.5 High
This vulnerability exists in Aero due to improper implementation of OTP validation mechanism in certain API endpoints. An authenticated remote attacker could exploit this vulnerability by intercepting and manipulating the responses exchanged during the second factor authentication process. Successful exploitation of this vulnerability could allow the attacker to bypass OTP verification for accessing other user accounts.
CVE-2024-10202 1 Wellchoose 1 Administrative Management System 2024-11-06 8.8 High
Administrative Management System from Wellchoose has an OS Command Injection vulnerability, allowing remote attackers with regular privileges to inject and execute arbitrary OS commands.
CVE-2024-48931 2 Icewhaletech, Zimaspace 2 Zimaos, Zimaos 2024-11-06 7.5 High
ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the ZimaOS API endpoint `http://<Zima_Server_IP:PORT>/v3/file?token=<token>&files=<file_path>` is vulnerable to arbitrary file reading due to improper input validation. By manipulating the `files` parameter, authenticated users can read sensitive system files, including `/etc/shadow`, which contains password hashes for all users. This vulnerability exposes critical system data and poses a high risk for privilege escalation or system compromise. The vulnerability occurs because the API endpoint does not validate or restrict file paths provided via the `files` parameter. An attacker can exploit this by manipulating the file path to access sensitive files outside the intended directory. As of time of publication, no known patched versions are available.
CVE-2024-9459 1 Zohocorp 1 Manageengine Exchange Reporter Plus 2024-11-06 8.3 High
Zohocorp ManageEngine Exchange Reporter Plus versions 5718 and prior are vulnerable to authenticated SQL Injection in reports module.
CVE-2024-47137 1 Openatom 1 Openharmony 2024-11-06 8.4 High
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write.
CVE-2024-47404 1 Openatom 1 Openharmony 2024-11-06 8.4 High
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through double free.
CVE-2024-47797 1 Openatom 1 Openharmony 2024-11-06 8.4 High
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write.
CVE-2024-10791 1 Codezips 1 Hospital Appointment System 2024-11-06 7.3 High
A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /doctorAction.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting file and parameter names to be affected.
CVE-2024-51326 1 Projectworlds 1 Travel Management System 2024-11-06 7.5 High
SQL Injection vulnerability in projectworlds Travel management System v.1.0 allows a remote attacker to execute arbitrary code via the 't2' parameter in deletesubcategory.php.
CVE-2024-49760 1 Openrefine 1 Openrefine 2024-11-06 7.1 High
OpenRefine is a free, open source tool for working with messy data. The load-language command expects a `lang` parameter from which it constructs the path of the localization file to load, of the form `translations-$LANG.json`. But when doing so in versions prior to 3.8.3, it does not check that the resulting path is in the expected directory, which means that this command could be exploited to read other JSON files on the file system. Version 3.8.3 addresses this issue.