Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.9

    CRITICAL
    CVE-2023-28444

    angular-server-side-configuration helps configure an angular application at runtime on the server or in a docker container via environment variables. angular-server-side-configuration detects used environment variables in TypeScript (.ts) files during bui... Read more

    Affected Products : angular-server-side-configuration
    • EPSS Score: %0.06
    • Published: Mar. 24, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-27479

    XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki inst... Read more

    Affected Products : xwiki
    • EPSS Score: %1.60
    • Published: Mar. 07, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-27407

    A vulnerability has been identified in SCALANCE LPE9403 (All versions < V2.1). The web based management of affected device does not properly validate user input, making it susceptible to command injection. This could allow an authenticated remote attacker... Read more

    • EPSS Score: %1.22
    • Published: May. 09, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2021-32639

    Emissary is a P2P-based, data-driven workflow engine. Emissary version 6.4.0 is vulnerable to Server-Side Request Forgery (SSRF). In particular, the `RegisterPeerAction` endpoint and the `AddChildDirectoryAction` endpoint are vulnerable to SSRF. This vuln... Read more

    Affected Products : emissary
    • EPSS Score: %0.78
    • Published: Jul. 02, 2021
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-26474

    XWiki Platform is a generic wiki platform. Starting in version 13.10, it's possible to use the right of an existing document content author to execute a text area property. This has been patched in XWiki 14.10, 14.4.7, and 13.10.11. There are no known wor... Read more

    Affected Products : xwiki
    • EPSS Score: %0.36
    • Published: Mar. 02, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2019-2633

    Vulnerability in the Oracle Work in Process component of Oracle E-Business Suite (subcomponent: Messages). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability... Read more

    Affected Products : work_in_process
    • EPSS Score: %1.74
    • Published: Apr. 23, 2019
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-26472

    XWiki Platform is a generic wiki platform. Starting in version 6.2-milestone-1, one can execute any wiki content with the right of IconThemeSheet author by creating an icon theme with certain content. This can be done by creating a new page or even throug... Read more

    Affected Products : xwiki
    • EPSS Score: %1.42
    • Published: Mar. 02, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-25915

    Due to improper input validation, an authenticated remote attacker could execute arbitrary commands on the target system.... Read more

    Affected Products : ak-sm_800a_firmware ak-sm_800a
    • EPSS Score: %0.44
    • Published: Aug. 21, 2023
    • Modified: Jan. 17, 2025
  • 9.9

    CRITICAL
    CVE-2023-26055

    XWiki Commons are technical libraries common to several other top level XWiki projects. Starting in version 3.1-milestone-1, any user can edit their own profile and inject code, which is going to be executed with programming right. The same vulnerability ... Read more

    Affected Products : xwiki commons
    • EPSS Score: %0.87
    • Published: Mar. 02, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-28110

    Jumpserver is a popular open source bastion host, and Koko is a Jumpserver component that is the Go version of coco, refactoring coco's SSH/SFTP service and Web Terminal service. Prior to version 2.28.8, using illegal tokens to connect to a Kubernetes clu... Read more

    Affected Products : jumpserver koko
    • EPSS Score: %0.36
    • Published: Mar. 16, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2019-10328

    Jenkins Pipeline Remote Loader Plugin 1.4 and earlier provided a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.... Read more

    Affected Products : pipeline_remote_loader
    • EPSS Score: %0.28
    • Published: May. 31, 2019
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2019-1003030

    A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on ... Read more

    • Actively Exploited
    • EPSS Score: %93.01
    • Published: Mar. 08, 2019
    • Modified: Feb. 20, 2025
  • 9.9

    CRITICAL
    CVE-2019-1003029

    A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroov... Read more

    • Actively Exploited
    • EPSS Score: %93.04
    • Published: Mar. 08, 2019
    • Modified: Feb. 20, 2025
  • 9.9

    CRITICAL
    CVE-2021-21477

    SAP Commerce Cloud, versions - 1808,1811,1905,2005,2011, enables certain users with required privileges to edit drools rules, an authenticated attacker with this privilege will be able to inject malicious code in the drools rules which when executed leads... Read more

    Affected Products : commerce
    • EPSS Score: %1.15
    • Published: Feb. 09, 2021
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-22946

    In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configuration-... Read more

    Affected Products : spark
    • EPSS Score: %0.18
    • Published: Apr. 17, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-22651

    Improper Privilege Management vulnerability in SUSE Rancher allows Privilege Escalation. A failure in the update logic of Rancher's admission Webhook may lead to the misconfiguration of the Webhook. This component enforces validation rules and security ... Read more

    Affected Products : rancher rancher
    • EPSS Score: %0.19
    • Published: May. 04, 2023
    • Modified: Jan. 29, 2025
  • 9.9

    CRITICAL
    CVE-2016-9269

    Remote Command Execution in com.trend.iwss.gui.servlet.ManagePatches in Trend Micro Interscan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allows authenticated, remote users with least privileges to run arbitrary com... Read more

    • EPSS Score: %6.85
    • Published: Feb. 21, 2017
    • Modified: Apr. 20, 2025
  • 9.9

    CRITICAL
    CVE-2018-18406

    An issue was discovered in Tufin SecureTrack 18.1 with TufinOS 2.16 build 1179(Final). The Audit Report module is affected by a blind XXE vulnerability when a new Best Practices Report is saved using a special payload inside the xml input field. The XXE v... Read more

    Affected Products : securetrack tufinos
    • EPSS Score: %0.73
    • Published: Jun. 19, 2019
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2018-12892

    An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may... Read more

    Affected Products : debian_linux xen
    • EPSS Score: %3.03
    • Published: Jul. 02, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2019-2253

    Buffer over-read can occur while parsing an ogg file with a corrupted comment block. in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon W... Read more

    • EPSS Score: %0.37
    • Published: Jul. 25, 2019
    • Modified: Nov. 21, 2024
Showing 20 of 292508 Results