Search
Search Results (323536 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2013-2233 | 1 Redhat | 1 Ansible | 2024-11-21 | N/A |
| Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle attacks by leveraging failure to cache SSH host keys. | ||||
| CVE-2013-2228 | 1 Saltstack | 1 Saltstack | 2024-11-21 | 8.1 High |
| SaltStack RSA Key Generation allows remote users to decrypt communications | ||||
| CVE-2013-2227 | 2 Debian, Glpi-project | 2 Debian Linux, Glpi | 2024-11-21 | 7.5 High |
| GLPI 0.83.7 has Local File Inclusion in common.tabs.php. | ||||
| CVE-2013-2213 | 1 Kde | 1 Paste Applet | 2024-11-21 | 5.5 Medium |
| The KRandom::random function in KDE Paste Applet after 4.10.5 in kdeplasma-addons uses the GNU C Library rand function's linear congruential generator, which makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms by predicting the generator output. | ||||
| CVE-2013-2198 | 1 Login Security Project | 1 Login Security | 2024-11-21 | 9.8 Critical |
| The Login Security module 6.x-1.x before 6.x-1.3 and 7.x-1.x before 7.x-1.3 for Drupal allows attackers to bypass intended restrictions via a crafted username. | ||||
| CVE-2013-2183 | 1 Monkey-project | 1 Monkey | 2024-11-21 | 7.1 High |
| Monkey HTTP Daemon has local security bypass | ||||
| CVE-2013-2167 | 3 Debian, Openstack, Redhat | 3 Debian Linux, Python-keystoneclient, Openstack | 2024-11-21 | 9.8 Critical |
| python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass | ||||
| CVE-2013-2166 | 4 Debian, Fedoraproject, Openstack and 1 more | 4 Debian Linux, Fedora, Python-keystoneclient and 1 more | 2024-11-21 | 9.8 Critical |
| python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass | ||||
| CVE-2013-2159 | 1 Monkey-project | 1 Monkey | 2024-11-21 | 9.8 Critical |
| Monkey HTTP Daemon: broken user name authentication | ||||
| CVE-2013-2120 | 1 Kde | 1 Paste Applet | 2024-11-21 | 8.4 High |
| The %{password(...)} macro in pastemacroexpander.cpp in the KDE Paste Applet before 4.10.5 in kdeplasma-addons does not properly generate passwords, which allows context-dependent attackers to bypass authentication via a brute-force attack. | ||||
| CVE-2013-2109 | 1 Undolog | 1 Wp Cleanfix | 2024-11-21 | 8.8 High |
| WordPress plugin wp-cleanfix has Remote Code Execution | ||||
| CVE-2013-2108 | 1 Undolog | 1 Cleanfix | 2024-11-21 | 5.4 Medium |
| WordPress WP Cleanfix Plugin 2.4.4 has CSRF | ||||
| CVE-2013-2106 | 2 Debian, Stanford | 2 Debian Linux, Webauth | 2024-11-21 | 7.5 High |
| webauth before 4.6.1 has authentication credential disclosure | ||||
| CVE-2013-2103 | 1 Redhat | 1 Openshift | 2024-11-21 | 8.1 High |
| OpenShift cartridge allows remote URL retrieval | ||||
| CVE-2013-2101 | 2 Redhat, Theforeman | 2 Satellite, Katello | 2024-11-21 | 5.4 Medium |
| Katello has multiple XSS issues in various entities | ||||
| CVE-2013-2097 | 1 Zpanel Project | 1 Zpanel | 2024-11-21 | 7.8 High |
| ZPanel through 10.1.0 has Remote Command Execution | ||||
| CVE-2013-2095 | 1 Openshift-origin-controller Project | 1 Openshift-origin-controller | 2024-11-21 | 9.8 Critical |
| rubygem-openshift-origin-controller: API can be used to create applications via cartridge_cache.rb URI.prase() to perform command injection | ||||
| CVE-2013-2093 | 1 Dolibarr | 1 Dolibarr Erp\/crm | 2024-11-21 | 9.8 Critical |
| Dolibarr ERP/CRM 3.3.1 does not properly validate user input in viewimage.php and barcode.lib.php which allows remote attackers to execute arbitrary commands. | ||||
| CVE-2013-2092 | 1 Dolibarr | 1 Dolibarr Erp\/crm | 2024-11-21 | 6.1 Medium |
| Cross-site Scripting (XSS) in Dolibarr ERP/CRM 3.3.1 allows remote attackers to inject arbitrary web script or HTML in functions.lib.php. | ||||
| CVE-2013-2091 | 1 Dolibarr | 1 Dolibarr Erp\/crm | 2024-11-21 | 9.8 Critical |
| SQL injection vulnerability in Dolibarr ERP/CRM 3.3.1 allows remote attackers to execute arbitrary SQL commands via the 'pays' parameter in fiche.php. | ||||