Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.9

    CRITICAL
    CVE-2023-29512

    XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit rights on a page (e.g., it's own user page), can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access ... Read more

    Affected Products : xwiki
    • Published: Apr. 19, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-29523

    XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can edit their own user profile can execute arbitrary script macros including Groovy and Python macros that allow remote code execution i... Read more

    Affected Products : xwiki
    • Published: Apr. 19, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-29209

    XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents including the legacy notification activity macro can execute arbitrary Groovy, Python or Velocity code in XW... Read more

    Affected Products : xwiki
    • Published: Apr. 15, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2020-3374

    A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization, enabling them to access sensitive information, modify the system configuration, or impact the ava... Read more

    Affected Products : sd-wan sd-wan_vmanage
    • Published: Jul. 31, 2020
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2020-27127

    Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive info... Read more

    Affected Products : jabber jabber_for_mobile_platforms
    • Published: Dec. 11, 2020
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2020-26085

    Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive info... Read more

    Affected Products : jabber
    • Published: Jan. 07, 2021
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-28444

    angular-server-side-configuration helps configure an angular application at runtime on the server or in a docker container via environment variables. angular-server-side-configuration detects used environment variables in TypeScript (.ts) files during bui... Read more

    Affected Products : angular-server-side-configuration
    • Published: Mar. 24, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-27479

    XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki inst... Read more

    Affected Products : xwiki
    • Published: Mar. 07, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-27407

    A vulnerability has been identified in SCALANCE LPE9403 (All versions < V2.1). The web based management of affected device does not properly validate user input, making it susceptible to command injection. This could allow an authenticated remote attacker... Read more

    • Published: May. 09, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2021-32639

    Emissary is a P2P-based, data-driven workflow engine. Emissary version 6.4.0 is vulnerable to Server-Side Request Forgery (SSRF). In particular, the `RegisterPeerAction` endpoint and the `AddChildDirectoryAction` endpoint are vulnerable to SSRF. This vuln... Read more

    Affected Products : emissary
    • Published: Jul. 02, 2021
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-26474

    XWiki Platform is a generic wiki platform. Starting in version 13.10, it's possible to use the right of an existing document content author to execute a text area property. This has been patched in XWiki 14.10, 14.4.7, and 13.10.11. There are no known wor... Read more

    Affected Products : xwiki
    • Published: Mar. 02, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2019-2633

    Vulnerability in the Oracle Work in Process component of Oracle E-Business Suite (subcomponent: Messages). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability... Read more

    Affected Products : work_in_process
    • Published: Apr. 23, 2019
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-26472

    XWiki Platform is a generic wiki platform. Starting in version 6.2-milestone-1, one can execute any wiki content with the right of IconThemeSheet author by creating an icon theme with certain content. This can be done by creating a new page or even throug... Read more

    Affected Products : xwiki
    • Published: Mar. 02, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-25915

    Due to improper input validation, an authenticated remote attacker could execute arbitrary commands on the target system.... Read more

    Affected Products : ak-sm_800a_firmware ak-sm_800a
    • Published: Aug. 21, 2023
    • Modified: Jan. 17, 2025
  • 9.9

    CRITICAL
    CVE-2023-26055

    XWiki Commons are technical libraries common to several other top level XWiki projects. Starting in version 3.1-milestone-1, any user can edit their own profile and inject code, which is going to be executed with programming right. The same vulnerability ... Read more

    Affected Products : xwiki commons
    • Published: Mar. 02, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-28110

    Jumpserver is a popular open source bastion host, and Koko is a Jumpserver component that is the Go version of coco, refactoring coco's SSH/SFTP service and Web Terminal service. Prior to version 2.28.8, using illegal tokens to connect to a Kubernetes clu... Read more

    Affected Products : jumpserver koko
    • Published: Mar. 16, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2019-10328

    Jenkins Pipeline Remote Loader Plugin 1.4 and earlier provided a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.... Read more

    Affected Products : pipeline_remote_loader
    • Published: May. 31, 2019
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2019-1003030

    A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on ... Read more

    • Actively Exploited
    • Published: Mar. 08, 2019
    • Modified: Feb. 20, 2025
  • 9.9

    CRITICAL
    CVE-2019-1003029

    A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroov... Read more

    • Actively Exploited
    • Published: Mar. 08, 2019
    • Modified: Feb. 20, 2025
  • 9.9

    CRITICAL
    CVE-2021-21477

    SAP Commerce Cloud, versions - 1808,1811,1905,2005,2011, enables certain users with required privileges to edit drools rules, an authenticated attacker with this privilege will be able to inject malicious code in the drools rules which when executed leads... Read more

    Affected Products : commerce
    • Published: Feb. 09, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 292803 Results