Latest CVE Feed
-
9.9
CRITICALCVE-2023-25765
In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code ... Read more
Affected Products : email_extension- EPSS Score: %0.03
- Published: Feb. 15, 2023
- Modified: Mar. 19, 2025
-
9.9
CRITICALCVE-2023-25616
In some scenario, SAP Business Objects Business Intelligence Platform (CMC) - versions 420, 430, Program Object execution can lead to code injection vulnerability which could allow an attacker to gain access to resources that are allowed by extra privileg... Read more
Affected Products : business_objects_business_intelligence_platform- EPSS Score: %0.47
- Published: Mar. 14, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-23857
Due to missing authentication check, SAP NetWeaver AS for Java - version 7.50, allows an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access services which can be used to perform unauthorized ... Read more
Affected Products : netweaver_application_server_for_java- EPSS Score: %0.26
- Published: Mar. 14, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2022-41267
SAP Business Objects Platform - versions 420, and 430, allows an attacker with normal BI user privileges to upload/replace any file on Business Objects server at the operating system level, enabling the attacker to take full control of the system causing ... Read more
Affected Products : business_objects_business_intelligence_platform- EPSS Score: %0.20
- Published: Dec. 13, 2022
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2018-3865
An exploitable buffer overflow vulnerability exists in the Samsung WifiScan handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy overflows the destination buffer, which has a size of 40 bytes. A... Read more
- EPSS Score: %0.39
- Published: Sep. 20, 2018
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2020-10731
A flaw was found in the nova_libvirt container provided by the Red Hat OpenStack Platform 16, where it does not have SELinux enabled. This flaw causes sVirt, an important isolation mechanism, to be disabled for all running virtual machines.... Read more
- EPSS Score: %0.28
- Published: Jul. 31, 2020
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2021-26867
Windows Hyper-V Remote Code Execution Vulnerability... Read more
- EPSS Score: %1.18
- Published: Mar. 11, 2021
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2021-22987
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3 when running in Appliance mode, the Traffic Management User Interface (TMUI), also referred... Read more
Affected Products : big-ip_access_policy_manager big-ip_advanced_firewall_manager big-ip_analytics big-ip_application_acceleration_manager big-ip_application_security_manager big-ip_domain_name_system big-ip_fraud_protection_service big-ip_global_traffic_manager big-ip_link_controller big-ip_local_traffic_manager +4 more products- EPSS Score: %1.77
- Published: Mar. 31, 2021
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2021-22192
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 allowing unauthorized authenticated users to execute arbitrary code on the server.... Read more
Affected Products : gitlab- EPSS Score: %81.16
- Published: Mar. 24, 2021
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2021-1471
Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive informa... Read more
Affected Products : jabber- EPSS Score: %0.32
- Published: Mar. 24, 2021
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2020-6102
An exploitable code execution vulnerability exists in the Shader functionality of AMD Radeon DirectX 11 Driver atidxx64.dll 26.20.15019.19000. An attacker can provide a a specially crafted shader file to trigger this vulnerability, resulting in code execu... Read more
Affected Products : radeon_directx_11_driver_atidxx64.dll- EPSS Score: %0.93
- Published: Jul. 20, 2020
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2020-3374
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization, enabling them to access sensitive information, modify the system configuration, or impact the ava... Read more
- EPSS Score: %0.10
- Published: Jul. 31, 2020
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2020-27127
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive info... Read more
- EPSS Score: %0.35
- Published: Dec. 11, 2020
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2020-26085
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive info... Read more
Affected Products : jabber- EPSS Score: %2.26
- Published: Jan. 07, 2021
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2019-1384
A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages.To exploit this vulnerability, an attacker could send a specially crafted authentication request, aka 'Microsoft Windows Security F... Read more
- EPSS Score: %2.80
- Published: Nov. 12, 2019
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2020-1660
When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process, responsible for managing "URL... Read more
Affected Products : junos- EPSS Score: %0.29
- Published: Oct. 16, 2020
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2021-32639
Emissary is a P2P-based, data-driven workflow engine. Emissary version 6.4.0 is vulnerable to Server-Side Request Forgery (SSRF). In particular, the `RegisterPeerAction` endpoint and the `AddChildDirectoryAction` endpoint are vulnerable to SSRF. This vuln... Read more
Affected Products : emissary- EPSS Score: %0.78
- Published: Jul. 02, 2021
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2019-2633
Vulnerability in the Oracle Work in Process component of Oracle E-Business Suite (subcomponent: Messages). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability... Read more
Affected Products : work_in_process- EPSS Score: %1.74
- Published: Apr. 23, 2019
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2019-10328
Jenkins Pipeline Remote Loader Plugin 1.4 and earlier provided a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.... Read more
Affected Products : pipeline_remote_loader- EPSS Score: %0.28
- Published: May. 31, 2019
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2019-1003034
A sandbox bypass vulnerability exists in Jenkins Job DSL Plugin 1.71 and earlier in job-dsl-core/src/main/groovy/javaposse/jobdsl/dsl/AbstractDslScriptLoader.groovy, job-dsl-plugin/build.gradle, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/JobDs... Read more
- EPSS Score: %1.92
- Published: Mar. 08, 2019
- Modified: Nov. 21, 2024