Search Results (79005 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-51526 1 Huawei 1 Harmonyos 2024-11-07 8.2 High
Permission control vulnerability in the hidebug module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2024-38423 1 Qualcomm 416 205 Mobile Platform, 205 Mobile Platform Firmware, 215 Mobile Platform and 413 more 2024-11-07 7.8 High
Memory corruption while processing GPU page table switch.
CVE-2024-38422 1 Qualcomm 541 205 Mobile Platform, 205 Mobile Platform Firmware, 215 Mobile Platform and 538 more 2024-11-07 7.8 High
Memory corruption while processing voice packet with arbitrary data received from ADSP.
CVE-2024-38421 1 Qualcomm 157 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 7800 and 154 more 2024-11-07 7.8 High
Memory corruption while processing GPU commands.
CVE-2024-38419 1 Qualcomm 299 Ar8035, Ar8035 Firmware, Csra6620 and 296 more 2024-11-07 7.8 High
Memory corruption while invoking IOCTL calls from the use-space for HGSL memory node.
CVE-2024-38415 1 Qualcomm 360 215 Mobile Platform, 215 Mobile Platform Firmware, Ar8035 and 357 more 2024-11-07 7.8 High
Memory corruption while handling session errors from firmware.
CVE-2024-10335 2 Sadat, Sourcecodester 2 Garbage Collection Management System, Garbage Collection Management System 2024-11-07 7.3 High
A vulnerability was found in SourceCodester Garbage Collection Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "username" to be affected. But it must be assumed that the parameter "password" is affected as well.
CVE-2024-10336 2 Clothes Recommendation System Project, Sourcecodehero 2 Clothes Recommendation System, Clothes Recommendation System 2024-11-07 7.3 High
A vulnerability was found in SourceCodeHero Clothes Recommendation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/index.php of the component Admin Login Page. The manipulation of the argument t1 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-51510 1 Huawei 2 Emui, Harmonyos 2024-11-07 7.6 High
Out-of-bounds access vulnerability in the logo module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2024-49366 1 Nginxui 1 Nginx Ui 2024-11-07 7.5 High
Nginx UI is a web user interface for the Nginx web server. Nginx UI v2.0.0-beta.35 and earlier gets the value from the json field without verification, and can construct a value value in the form of `../../`. Arbitrary files can be written to the server, which may result in loss of permissions. Version 2.0.0-beta.26 fixes the issue.
CVE-2024-49367 1 Nginxui 1 Nginx Ui 2024-11-07 7.5 High
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.0.0-beta.36, the log path of nginxui is controllable. This issue can be combined with the directory traversal at `/api/configs` to read directories and file contents on the server. Version 2.0.0-beta.36 fixes the issue.
CVE-2024-36485 1 Zohocorp 1 Manageengine Adaudit Plus 2024-11-07 8.3 High
Zohocorp ManageEngine ADAudit Plus versions below 8121 are vulnerable to SQL Injection in Technician reports option.
CVE-2024-21250 1 Oracle 1 Process Manufacturing Product Development 2024-11-06 8.1 High
Vulnerability in the Oracle Process Manufacturing Product Development product of Oracle E-Business Suite (component: Quality Manager Specification). Supported versions that are affected are 12.2.13-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Process Manufacturing Product Development. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Process Manufacturing Product Development accessible data as well as unauthorized access to critical data or complete access to all Oracle Process Manufacturing Product Development accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
CVE-2024-51408 1 Appsmith 1 Appsmith 2024-11-06 8.5 High
AppSmith Community 1.8.3 before 1.46 allows SSRF via New DataSource for application/json requests to 169.254.169.254 to retrieve AWS metadata credentials.
CVE-2024-51329 1 Idrsdev 1 Agile-board 2024-11-06 8.1 High
A Host header injection vulnerability in Agile-Board 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link.
CVE-2024-51774 1 Qbittorrent 1 Qbittorrent 2024-11-06 8.1 High
qBittorrent before 5.0.1 proceeds with use of https URLs even after certificate validation errors.
CVE-2024-45785 2 Neumann, Neumannjp 2 Musasi, Musasi 2024-11-06 7.5 High
MUSASI version 3 contains an issue with use of client-side authentication. If this vulnerability is exploited, other users' credential and sensitive information may be retrieved.
CVE-2024-51561 2 63moons, Brokeragetechnologysolutions 3 Aero, Wave 2.0, Aero 2024-11-06 7.5 High
This vulnerability exists in Aero due to improper implementation of OTP validation mechanism in certain API endpoints. An authenticated remote attacker could exploit this vulnerability by intercepting and manipulating the responses exchanged during the second factor authentication process. Successful exploitation of this vulnerability could allow the attacker to bypass OTP verification for accessing other user accounts.
CVE-2024-10202 1 Wellchoose 1 Administrative Management System 2024-11-06 8.8 High
Administrative Management System from Wellchoose has an OS Command Injection vulnerability, allowing remote attackers with regular privileges to inject and execute arbitrary OS commands.
CVE-2024-48931 2 Icewhaletech, Zimaspace 2 Zimaos, Zimaos 2024-11-06 7.5 High
ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the ZimaOS API endpoint `http://<Zima_Server_IP:PORT>/v3/file?token=<token>&files=<file_path>` is vulnerable to arbitrary file reading due to improper input validation. By manipulating the `files` parameter, authenticated users can read sensitive system files, including `/etc/shadow`, which contains password hashes for all users. This vulnerability exposes critical system data and poses a high risk for privilege escalation or system compromise. The vulnerability occurs because the API endpoint does not validate or restrict file paths provided via the `files` parameter. An attacker can exploit this by manipulating the file path to access sensitive files outside the intended directory. As of time of publication, no known patched versions are available.