Latest CVE Feed
-
9.9
CRITICALCVE-2023-28444
angular-server-side-configuration helps configure an angular application at runtime on the server or in a docker container via environment variables. angular-server-side-configuration detects used environment variables in TypeScript (.ts) files during bui... Read more
Affected Products : angular-server-side-configuration- EPSS Score: %0.06
- Published: Mar. 24, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-27479
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki inst... Read more
Affected Products : xwiki- EPSS Score: %1.60
- Published: Mar. 07, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-27407
A vulnerability has been identified in SCALANCE LPE9403 (All versions < V2.1). The web based management of affected device does not properly validate user input, making it susceptible to command injection. This could allow an authenticated remote attacker... Read more
- EPSS Score: %1.22
- Published: May. 09, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2021-32639
Emissary is a P2P-based, data-driven workflow engine. Emissary version 6.4.0 is vulnerable to Server-Side Request Forgery (SSRF). In particular, the `RegisterPeerAction` endpoint and the `AddChildDirectoryAction` endpoint are vulnerable to SSRF. This vuln... Read more
Affected Products : emissary- EPSS Score: %0.78
- Published: Jul. 02, 2021
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-26474
XWiki Platform is a generic wiki platform. Starting in version 13.10, it's possible to use the right of an existing document content author to execute a text area property. This has been patched in XWiki 14.10, 14.4.7, and 13.10.11. There are no known wor... Read more
Affected Products : xwiki- EPSS Score: %0.36
- Published: Mar. 02, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2019-2633
Vulnerability in the Oracle Work in Process component of Oracle E-Business Suite (subcomponent: Messages). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability... Read more
Affected Products : work_in_process- EPSS Score: %1.74
- Published: Apr. 23, 2019
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-26472
XWiki Platform is a generic wiki platform. Starting in version 6.2-milestone-1, one can execute any wiki content with the right of IconThemeSheet author by creating an icon theme with certain content. This can be done by creating a new page or even throug... Read more
Affected Products : xwiki- EPSS Score: %1.42
- Published: Mar. 02, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-25915
Due to improper input validation, an authenticated remote attacker could execute arbitrary commands on the target system.... Read more
- EPSS Score: %0.44
- Published: Aug. 21, 2023
- Modified: Jan. 17, 2025
-
9.9
CRITICALCVE-2023-26055
XWiki Commons are technical libraries common to several other top level XWiki projects. Starting in version 3.1-milestone-1, any user can edit their own profile and inject code, which is going to be executed with programming right. The same vulnerability ... Read more
- EPSS Score: %0.87
- Published: Mar. 02, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-28110
Jumpserver is a popular open source bastion host, and Koko is a Jumpserver component that is the Go version of coco, refactoring coco's SSH/SFTP service and Web Terminal service. Prior to version 2.28.8, using illegal tokens to connect to a Kubernetes clu... Read more
- EPSS Score: %0.36
- Published: Mar. 16, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2019-10328
Jenkins Pipeline Remote Loader Plugin 1.4 and earlier provided a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.... Read more
Affected Products : pipeline_remote_loader- EPSS Score: %0.28
- Published: May. 31, 2019
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2019-1003030
A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on ... Read more
- Actively Exploited
- EPSS Score: %93.01
- Published: Mar. 08, 2019
- Modified: Feb. 20, 2025
-
9.9
CRITICALCVE-2019-1003029
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroov... Read more
- Actively Exploited
- EPSS Score: %93.04
- Published: Mar. 08, 2019
- Modified: Feb. 20, 2025
-
9.9
CRITICALCVE-2021-21477
SAP Commerce Cloud, versions - 1808,1811,1905,2005,2011, enables certain users with required privileges to edit drools rules, an authenticated attacker with this privilege will be able to inject malicious code in the drools rules which when executed leads... Read more
Affected Products : commerce- EPSS Score: %1.15
- Published: Feb. 09, 2021
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-22946
In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configuration-... Read more
Affected Products : spark- EPSS Score: %0.18
- Published: Apr. 17, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-22651
Improper Privilege Management vulnerability in SUSE Rancher allows Privilege Escalation. A failure in the update logic of Rancher's admission Webhook may lead to the misconfiguration of the Webhook. This component enforces validation rules and security ... Read more
- EPSS Score: %0.19
- Published: May. 04, 2023
- Modified: Jan. 29, 2025
-
9.9
CRITICALCVE-2016-9269
Remote Command Execution in com.trend.iwss.gui.servlet.ManagePatches in Trend Micro Interscan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allows authenticated, remote users with least privileges to run arbitrary com... Read more
Affected Products : interscan_web_security_virtual_appliance- EPSS Score: %6.85
- Published: Feb. 21, 2017
- Modified: Apr. 20, 2025
-
9.9
CRITICALCVE-2018-18406
An issue was discovered in Tufin SecureTrack 18.1 with TufinOS 2.16 build 1179(Final). The Audit Report module is affected by a blind XXE vulnerability when a new Best Practices Report is saved using a special payload inside the xml input field. The XXE v... Read more
- EPSS Score: %0.73
- Published: Jun. 19, 2019
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2018-12892
An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may... Read more
- EPSS Score: %3.03
- Published: Jul. 02, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2019-2253
Buffer over-read can occur while parsing an ogg file with a corrupted comment block. in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon W... Read more
Affected Products : sdm660_firmware msm8996au_firmware sd_450_firmware sd_625_firmware sd_820_firmware sd_820a_firmware sd_835_firmware mdm9150_firmware qcs605_firmware sd_675_firmware +76 more products- EPSS Score: %0.37
- Published: Jul. 25, 2019
- Modified: Nov. 21, 2024