Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2012-4520

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-18 Nov, 2012 | 23:00
Updated At-06 Aug, 2024 | 20:42
Rejected At-
Credits

The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:18 Nov, 2012 | 23:00
Updated At:06 Aug, 2024 | 20:42
Rejected At:
▼CVE Numbering Authority (CNA)

The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.openwall.com/lists/oss-security/2012/10/30/4
mailing-list
x_refsource_MLIST
http://securitytracker.com/id?1027708
vdb-entry
x_refsource_SECTRACK
https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071
x_refsource_CONFIRM
http://www.osvdb.org/86493
vdb-entry
x_refsource_OSVDB
http://secunia.com/advisories/51314
third-party-advisory
x_refsource_SECUNIA
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145
x_refsource_MISC
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
vendor-advisory
x_refsource_FEDORA
http://ubuntu.com/usn/usn-1757-1
vendor-advisory
x_refsource_UBUNTU
https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3
x_refsource_CONFIRM
http://www.debian.org/security/2013/dsa-2634
vendor-advisory
x_refsource_DEBIAN
https://www.djangoproject.com/weblog/2012/oct/17/security/
x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
vendor-advisory
x_refsource_FEDORA
https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e
x_refsource_CONFIRM
http://secunia.com/advisories/51033
third-party-advisory
x_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=865164
x_refsource_MISC
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
vendor-advisory
x_refsource_FEDORA
http://ubuntu.com/usn/usn-1632-1
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.openwall.com/lists/oss-security/2012/10/30/4
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://securitytracker.com/id?1027708
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.osvdb.org/86493
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://secunia.com/advisories/51314
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145
Resource:
x_refsource_MISC
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://ubuntu.com/usn/usn-1757-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.debian.org/security/2013/dsa-2634
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://www.djangoproject.com/weblog/2012/oct/17/security/
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/51033
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=865164
Resource:
x_refsource_MISC
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://ubuntu.com/usn/usn-1632-1
Resource:
vendor-advisory
x_refsource_UBUNTU
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.openwall.com/lists/oss-security/2012/10/30/4
mailing-list
x_refsource_MLIST
x_transferred
http://securitytracker.com/id?1027708
vdb-entry
x_refsource_SECTRACK
x_transferred
https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071
x_refsource_CONFIRM
x_transferred
http://www.osvdb.org/86493
vdb-entry
x_refsource_OSVDB
x_transferred
http://secunia.com/advisories/51314
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145
x_refsource_MISC
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://ubuntu.com/usn/usn-1757-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3
x_refsource_CONFIRM
x_transferred
http://www.debian.org/security/2013/dsa-2634
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://www.djangoproject.com/weblog/2012/oct/17/security/
x_refsource_CONFIRM
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
vendor-advisory
x_refsource_FEDORA
x_transferred
https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/51033
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=865164
x_refsource_MISC
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://ubuntu.com/usn/usn-1632-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2012/10/30/4
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://securitytracker.com/id?1027708
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.osvdb.org/86493
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://secunia.com/advisories/51314
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://ubuntu.com/usn/usn-1757-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.debian.org/security/2013/dsa-2634
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://www.djangoproject.com/weblog/2012/oct/17/security/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/51033
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=865164
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://ubuntu.com/usn/usn-1632-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:18 Nov, 2012 | 23:55
Updated At:11 Apr, 2025 | 00:51

The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.4MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
Type: Primary
Version: 2.0
Base score: 6.4
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N
CPE Matches

Django
djangoproject
>>django>>1.3
cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*
Django
djangoproject
>>django>>1.3
cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*
Django
djangoproject
>>django>>1.3
cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*
Django
djangoproject
>>django>>1.3.1
cpe:2.3:a:djangoproject:django:1.3.1:*:*:*:*:*:*:*
Django
djangoproject
>>django>>1.3.2
cpe:2.3:a:djangoproject:django:1.3.2:*:*:*:*:*:*:*
Django
djangoproject
>>django>>1.3.3
cpe:2.3:a:djangoproject:django:1.3.3:*:*:*:*:*:*:*
Django
djangoproject
>>django>>1.4
cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*
Django
djangoproject
>>django>>1.4.1
cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145secalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/51033secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/51314secalert@redhat.com
Vendor Advisory
http://securitytracker.com/id?1027708secalert@redhat.com
N/A
http://ubuntu.com/usn/usn-1632-1secalert@redhat.com
N/A
http://ubuntu.com/usn/usn-1757-1secalert@redhat.com
N/A
http://www.debian.org/security/2013/dsa-2634secalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2012/10/30/4secalert@redhat.com
N/A
http://www.osvdb.org/86493secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=865164secalert@redhat.com
N/A
https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3secalert@redhat.com
N/A
https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657esecalert@redhat.com
N/A
https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071secalert@redhat.com
N/A
https://www.djangoproject.com/weblog/2012/oct/17/security/secalert@redhat.com
Patch
Vendor Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145af854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/51033af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/51314af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1027708af854a3a-2127-422b-91ae-364da2661108
N/A
http://ubuntu.com/usn/usn-1632-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://ubuntu.com/usn/usn-1757-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2013/dsa-2634af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2012/10/30/4af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/86493af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=865164af854a3a-2127-422b-91ae-364da2661108
N/A
https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3af854a3a-2127-422b-91ae-364da2661108
N/A
https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657eaf854a3a-2127-422b-91ae-364da2661108
N/A
https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.djangoproject.com/weblog/2012/oct/17/security/af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/51033
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/51314
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://securitytracker.com/id?1027708
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://ubuntu.com/usn/usn-1632-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://ubuntu.com/usn/usn-1757-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2013/dsa-2634
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2012/10/30/4
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.osvdb.org/86493
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=865164
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.djangoproject.com/weblog/2012/oct/17/security/
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/51033
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/51314
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://securitytracker.com/id?1027708
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://ubuntu.com/usn/usn-1632-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://ubuntu.com/usn/usn-1757-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.debian.org/security/2013/dsa-2634
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2012/10/30/4
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/86493
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=865164
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.djangoproject.com/weblog/2012/oct/17/security/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

62Records found

CVE-2019-13932
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.1||CRITICAL
EPSS-0.37% / 57.97%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 19:08
Updated-05 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in XHQ (All versions < V6.0.0.2). The web application requests could be manipulated, causing the the application to behave in unexpected ways for legitimate users. Successful exploitation does not require for an attacker to be authenticated. A successful attack could allow the import of scripts or generation of malicious links. This could allow the attacker to read or modify contents of the web application. At the time of advisory publication no public exploitation of this security vulnerability was known.

Action-Not Available
Vendor-Siemens AG
Product-xhqXHQ
CWE ID-CWE-20
Improper Input Validation
CVE-2016-6445
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.77% / 72.54%
||
7 Day CHG~0.00%
Published-27 Oct, 2016 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Extensible Messaging and Presence Protocol (XMPP) service of the Cisco Meeting Server (CMS) before 2.0.6 and Acano Server before 1.8.18 and 1.9.x before 1.9.6 could allow an unauthenticated, remote attacker to masquerade as a legitimate user. This vulnerability is due to the XMPP service incorrectly processing a deprecated authentication scheme. A successful exploit could allow an attacker to access the system as another user.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-meeting_serverCisco Meeting Server (CMS) before 2.0.6 and Acano Server before 1.8.18 and 1.9.x before 1.9.6
CWE ID-CWE-20
Improper Input Validation
CVE-2016-1441
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.2||HIGH
EPSS-0.21% / 43.76%
||
7 Day CHG~0.00%
Published-03 Jul, 2016 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Cloud Network Automation Provisioner (CNAP) 1.0(0) in Cisco Configuration Assistant (CCA) allows remote attackers to bypass intended filesystem and administrative-endpoint restrictions via GET API calls, aka Bug ID CSCuy77145.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-cloud_network_automation_provisionern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-10492
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.22% / 44.68%
||
7 Day CHG~0.00%
Published-18 Apr, 2018 | 14:00
Updated-16 Sep, 2024 | 19:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9645, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, SD 845, SD 850, and SDX20, improper ciphersuite validation leads SecSSL accept an unadvertised ciphersuite.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_850mdm9635m_firmwaremdm9640_firmwaresd_820amdm9650sd_615_firmwaremsm8909w_firmwaresd_820mdm9645sd_650sd_450_firmwaresd_845_firmwaresd_410sd_820a_firmwaremdm9206sd_652sd_425_firmwaresd_800_firmwaresd_625_firmwaresd_450mdm9635mmdm9615sd_845mdm9206_firmwaremdm9640sd_835_firmwaremdm9650_firmwaresd_835sd_210_firmwaresd_415_firmwaresd_652_firmwaremsm8909wsd_616_firmwaresd_205_firmwaresd_415sd_650_firmwaresd_212sd_412sd_808_firmwaresd_400sdx20sd_616sd_425sd_430_firmwaremdm9607_firmwaresd_615sd_625sd_210mdm9607sd_820_firmwaremdm9645_firmwaresd_808sd_800sd_617sd_400_firmwaresd_212_firmwaresd_850_firmwaresd_412_firmwaresd_430sd_810mdm9615_firmwaresdx20_firmwaresd_410_firmwaresd_205sd_810_firmwaresd_617_firmwareSnapdragon Mobile, Snapdragon Wear
CWE ID-CWE-20
Improper Input Validation
CVE-2019-1109
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.1||CRITICAL
EPSS-7.97% / 91.73%
||
7 Day CHG~0.00%
Published-29 Jul, 2019 | 14:08
Updated-04 Aug, 2024 | 18:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A spoofing vulnerability exists when Microsoft Office Javascript does not check the validity of the web page making a request to Office documents.An attacker who successfully exploited this vulnerability could read or write information in Office documents.The security update addresses the vulnerability by correcting the way that Microsoft Office Javascript verifies trusted web pages., aka 'Microsoft Office Spoofing Vulnerability'.

Action-Not Available
Vendor-Microsoft Corporation
Product-office_365officeMicrosoft OfficeOffice 365 ProPlus
CWE ID-CWE-20
Improper Input Validation
CVE-2015-3411
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.18% / 40.36%
||
7 Day CHG~0.00%
Published-16 May, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.

Action-Not Available
Vendor-n/aRed Hat, Inc.The PHP Group
Product-enterprise_linuxenterprise_linux_serverenterprise_linux_hpc_nodeenterprise_linux_desktopenterprise_linux_server_eusenterprise_linux_workstationphpenterprise_linux_hpc_node_eusn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2014-9358
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.26% / 49.04%
||
7 Day CHG~0.00%
Published-16 Dec, 2014 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."

Action-Not Available
Vendor-n/aDocker, Inc.
Product-dockern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2014-9038
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-1.14% / 77.58%
||
7 Day CHG~0.00%
Published-25 Nov, 2014 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

wp-includes/http.php in WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 allows remote attackers to conduct server-side request forgery (SSRF) attacks by referring to a 127.0.0.0/8 resource.

Action-Not Available
Vendor-n/aWordPress.org
Product-wordpressn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-20981
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.60% / 68.38%
||
7 Day CHG~0.00%
Published-22 Aug, 2019 | 12:40
Updated-05 Aug, 2024 | 12:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ninja-forms plugin before 3.3.9 for WordPress has insufficient restrictions on submission-data retrieval during Export Personal Data requests.

Action-Not Available
Vendor-n/aSaturday Drive, INC
Product-ninja_formsn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2003-1488
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-2.62% / 85.11%
||
7 Day CHG~0.00%
Published-24 Oct, 2007 | 23:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) verif_admin.php and (2) check_admin.php scripts in Truegalerie 1.0 allow remote attackers to gain administrator access via a request to admin.php without the connect parameter and with the loggedin parameter set to any value, such as 1.

Action-Not Available
Vendor-truelogikn/a
Product-truegalerien/a
CWE ID-CWE-20
Improper Input Validation
CVE-2003-1538
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.45% / 62.78%
||
7 Day CHG~0.00%
Published-20 Dec, 2007 | 21:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

susehelp in SuSE Linux 8.1, Enterprise Server 8, Office Server, and Openexchange Server 4 does not properly filter shell metacharacters, which allows remote attackers to execute arbitrary commands via CGI queries.

Action-Not Available
Vendor-n/aSUSE
Product-suse_linux_openexchange_serversuse_linuxoffice_servern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-6887
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.24% / 47.51%
||
7 Day CHG~0.00%
Published-27 Apr, 2014 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenJPEG 1.5.1 allows remote attackers to cause a denial of service via unspecified vectors that trigger NULL pointer dereferences, division-by-zero, and other errors.

Action-Not Available
Vendor-uclouvainn/a
Product-openjpegn/a
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • Next
Details not found