Latest CVE Feed
-
4.3
MEDIUMCVE-2018-1000057
Jenkins Credentials Binding Plugin 1.14 and earlier masks passwords it provides to build processes in their build logs. Jenkins however transforms provided password values, e.g. replacing environment variable references, which could result in values diffe... Read more
Affected Products : credentials_binding- Published: Feb. 09, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2017-9794
When a cluster is operating in secure mode, a user with read privileges for specific data regions can use the gfsh command line utility to execute queries. In Apache Geode before 1.2.1, the query results may contain data from another user's concurrently e... Read more
Affected Products : geode- Published: Sep. 30, 2017
- Modified: Apr. 20, 2025
-
4.3
MEDIUMCVE-2018-1000002
Improper input validation bugs in DNSSEC validators components in Knot Resolver (prior version 1.5.2) allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay.... Read more
Affected Products : knot_resolver- Published: Jan. 22, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2017-8761
In OpenStack Swift through 2.10.1, 2.11.0 through 2.13.0, and 2.14.0, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware ar... Read more
Affected Products : swift- Published: Jun. 02, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2024-45619
A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled ... Read more
- Published: Sep. 03, 2024
- Modified: Sep. 23, 2024
-
4.3
MEDIUMCVE-2017-3029
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability when handling a JPEG 2000 code-stream.... Read more
- Published: Apr. 12, 2017
- Modified: Apr. 20, 2025
-
4.3
MEDIUMCVE-2018-0566
Cybozu Office 10.0.0 to 10.8.0 allows authenticated attackers to bypass authentication to obtain the schedules without access privilege via unspecified vectors.... Read more
Affected Products : office- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2017-7497
The dialog for creating cloud volumes (cinder provider) in CloudForms does not filter cloud tenants by user. An attacker with the ability to create storage volumes could use this to create storage volumes for any other tenant.... Read more
Affected Products : cloudforms_management_engine- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2017-3032
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability in the JPEG 2000 code-stream parser.... Read more
- Published: Apr. 12, 2017
- Modified: Apr. 20, 2025
-
4.3
MEDIUMCVE-2018-0218
A vulnerability in the web-based user interface of the Cisco Secure Access Control Server prior to 5.8 patch 9 could allow an unauthenticated, remote attacker to gain read access to certain information in the affected system. The vulnerability is due to i... Read more
Affected Products : secure_access_control_server_solution_engine- Published: Mar. 08, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2018-0249
A vulnerability when handling incoming 802.11 Association Requests for Cisco Aironet 1800 Series Access Point (APs) on Qualcomm Atheros (QCA) based hardware platforms could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) con... Read more
Affected Products : aironet_access_point_software- Published: May. 02, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2024-39409
Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor integrity changes on behalf of a user. ... Read more
- Published: Aug. 14, 2024
- Modified: Oct. 16, 2024
-
4.3
MEDIUMCVE-2018-1000109
An improper authorization vulnerability exists in Jenkins Google Play Android Publisher Plugin version 1.6 and earlier in GooglePlayBuildStepDescriptor.java that allow an attacker to obtain credential IDs.... Read more
Affected Products : google-play-android-publisher- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2024-45129
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in Privilege escalation. A low-privileged attacker could leverage this vulnerability to bypass security ... Read more
- Published: Oct. 10, 2024
- Modified: Oct. 11, 2024
-
4.3
MEDIUMCVE-2018-1000105
An improper authorization vulnerability exists in Jenkins Gerrit Trigger Plugin 2.27.4 and earlier in GerritManagement.java, GerritServer.java, and PluginImpl.java that allows an attacker with Overall/Read access to retrieve some configuration information... Read more
Affected Products : gerrit_trigger- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2017-3321
Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: General). Supported versions that are affected are 7.2.19 and earlier, 7.3.8 and earlier and 7.4.5 and earlier. Difficult to exploit vulnerability allows unauthenticated ... Read more
Affected Products : mysql_cluster- Published: Jan. 27, 2017
- Modified: Apr. 20, 2025
-
4.3
MEDIUMCVE-2018-1000193
A improper neutralization of control sequences vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in HudsonPrivateSecurityRealm.java that allows users to sign up using user names containing control characters that can then appear to ha... Read more
- Published: Jun. 05, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2024-43577
Microsoft Edge (Chromium-based) Spoofing Vulnerability... Read more
Affected Products : edge_chromium- Published: Oct. 18, 2024
- Modified: Jan. 07, 2025
-
4.3
MEDIUMCVE-2018-0587
Unrestricted file upload vulnerability in Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote authenticated users to upload arbitrary image files via unspecified vectors.... Read more
- Published: May. 14, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2023-44394
MantisBT is an open source bug tracker. Due to insufficient access-level checks on the Wiki redirection page, any user can reveal private Projects' names, by accessing wiki.php with sequentially incremented IDs. This issue has been addressed in commit `65... Read more
Affected Products : mantisbt- Published: Oct. 16, 2023
- Modified: Aug. 11, 2025