Latest CVE Feed
-
4.3
MEDIUMCVE-2009-0143
Apple iTunes before 8.1 does not properly inform the user about the origin of an authentication request, which makes it easier for remote podcast servers to trick a user into providing a username and password when subscribing to a crafted podcast.... Read more
Affected Products : itunes- Published: Mar. 14, 2009
- Modified: Apr. 09, 2025
-
4.3
MEDIUMCVE-2009-0038
Multiple cross-site scripting (XSS) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) ip, (3) username, or (4) desc... Read more
Affected Products : geronimo- Published: Apr. 17, 2009
- Modified: Apr. 09, 2025
-
4.3
MEDIUMCVE-2021-20372
IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 could allow a remote authenticated user to cause a denial of another user's service due to insufficient permission checking. IBM X-Force ID: 195518.... Read more
- Published: Oct. 07, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2016-5251
Mozilla Firefox before 48.0 allows remote attackers to spoof the location bar via crafted characters in the media type of a data: URL.... Read more
Affected Products : firefox- Published: Aug. 05, 2016
- Modified: Apr. 12, 2025
-
4.3
MEDIUMCVE-2021-21676
Jenkins requests-plugin Plugin 2.2.7 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to send test emails to an attacker-specified email address.... Read more
Affected Products : requests- Published: Jun. 30, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2024-39908
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilitie... Read more
Affected Products : rexml- Published: Jul. 16, 2024
- Modified: Jan. 17, 2025
-
4.3
MEDIUMCVE-2024-11117
Inappropriate implementation in FileSystem in Google Chrome prior to 131.0.6778.69 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. (Chromium security severity: Low)... Read more
- Published: Nov. 12, 2024
- Modified: Jan. 02, 2025
-
4.3
MEDIUMCVE-2017-8597
Microsoft Edge in Microsoft Windows 10 Version 1703 allows an attacker to obtain information to further compromise the user's system, due to the way that Microsoft Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". ... Read more
- Published: Sep. 13, 2017
- Modified: Apr. 20, 2025
-
4.3
MEDIUMCVE-2017-7531
In Moodle 3.3, the course overview block reveals activities in hidden courses.... Read more
Affected Products : moodle- Published: Jul. 17, 2017
- Modified: Apr. 20, 2025
-
4.3
MEDIUMCVE-2017-3322
Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: NDBAPI). Supported versions that are affected are 7.2.25 and earlier, 7.3.14 and earlier, 7.4.12 and earlier and . Difficult to exploit vulnerability allows unauthenticat... Read more
Affected Products : mysql_cluster- Published: Jan. 27, 2017
- Modified: Apr. 20, 2025
-
4.3
MEDIUMCVE-2017-3321
Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: General). Supported versions that are affected are 7.2.19 and earlier, 7.3.8 and earlier and 7.4.5 and earlier. Difficult to exploit vulnerability allows unauthenticated ... Read more
Affected Products : mysql_cluster- Published: Jan. 27, 2017
- Modified: Apr. 20, 2025
-
4.3
MEDIUMCVE-2017-7497
The dialog for creating cloud volumes (cinder provider) in CloudForms does not filter cloud tenants by user. An attacker with the ability to create storage volumes could use this to create storage volumes for any other tenant.... Read more
Affected Products : cloudforms_management_engine- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2017-5524
Plone 4.x through 4.3.11 and 5.x through 5.0.6 allow remote attackers to bypass a sandbox protection mechanism and obtain sensitive information by leveraging the Python string format method.... Read more
Affected Products : plone- Published: Mar. 23, 2017
- Modified: Apr. 20, 2025
-
4.3
MEDIUMCVE-2018-1000193
A improper neutralization of control sequences vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in HudsonPrivateSecurityRealm.java that allows users to sign up using user names containing control characters that can then appear to ha... Read more
- Published: Jun. 05, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-24207
By default, the WP Page Builder WordPress plugin before 1.2.4 allows subscriber-level users to edit and make changes to any and all posts pages - user roles must be specifically blocked from editing posts and pages.... Read more
Affected Products : wp_page_builder- Published: Apr. 05, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2018-1000105
An improper authorization vulnerability exists in Jenkins Gerrit Trigger Plugin 2.27.4 and earlier in GerritManagement.java, GerritServer.java, and PluginImpl.java that allows an attacker with Overall/Read access to retrieve some configuration information... Read more
Affected Products : gerrit_trigger- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2018-1000109
An improper authorization vulnerability exists in Jenkins Google Play Android Publisher Plugin version 1.6 and earlier in GooglePlayBuildStepDescriptor.java that allow an attacker to obtain credential IDs.... Read more
Affected Products : google-play-android-publisher- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2017-5865
The password reset functionality in ownCloud Server before 8.1.11, 8.2.x before 8.2.9, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 sends different error messages depending on whether the username is valid, which allows remote attackers to enumerate user na... Read more
Affected Products : owncloud- Published: Mar. 03, 2017
- Modified: Apr. 20, 2025
-
4.3
MEDIUMCVE-2023-2465
Inappropriate implementation in CORS in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)... Read more
- Published: May. 03, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2024-45619
A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled ... Read more
- Published: Sep. 03, 2024
- Modified: Sep. 23, 2024