Latest CVE Feed
-
9.9
CRITICALCVE-2023-29512
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit rights on a page (e.g., it's own user page), can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access ... Read more
Affected Products : xwiki- Published: Apr. 19, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-29523
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can edit their own user profile can execute arbitrary script macros including Groovy and Python macros that allow remote code execution i... Read more
Affected Products : xwiki- Published: Apr. 19, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-29209
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents including the legacy notification activity macro can execute arbitrary Groovy, Python or Velocity code in XW... Read more
Affected Products : xwiki- Published: Apr. 15, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2020-3374
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization, enabling them to access sensitive information, modify the system configuration, or impact the ava... Read more
- Published: Jul. 31, 2020
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2020-27127
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive info... Read more
- Published: Dec. 11, 2020
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2020-26085
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive info... Read more
Affected Products : jabber- Published: Jan. 07, 2021
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-28444
angular-server-side-configuration helps configure an angular application at runtime on the server or in a docker container via environment variables. angular-server-side-configuration detects used environment variables in TypeScript (.ts) files during bui... Read more
Affected Products : angular-server-side-configuration- Published: Mar. 24, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-27479
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki inst... Read more
Affected Products : xwiki- Published: Mar. 07, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-27407
A vulnerability has been identified in SCALANCE LPE9403 (All versions < V2.1). The web based management of affected device does not properly validate user input, making it susceptible to command injection. This could allow an authenticated remote attacker... Read more
- Published: May. 09, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2021-32639
Emissary is a P2P-based, data-driven workflow engine. Emissary version 6.4.0 is vulnerable to Server-Side Request Forgery (SSRF). In particular, the `RegisterPeerAction` endpoint and the `AddChildDirectoryAction` endpoint are vulnerable to SSRF. This vuln... Read more
Affected Products : emissary- Published: Jul. 02, 2021
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-26474
XWiki Platform is a generic wiki platform. Starting in version 13.10, it's possible to use the right of an existing document content author to execute a text area property. This has been patched in XWiki 14.10, 14.4.7, and 13.10.11. There are no known wor... Read more
Affected Products : xwiki- Published: Mar. 02, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2019-2633
Vulnerability in the Oracle Work in Process component of Oracle E-Business Suite (subcomponent: Messages). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability... Read more
Affected Products : work_in_process- Published: Apr. 23, 2019
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-26472
XWiki Platform is a generic wiki platform. Starting in version 6.2-milestone-1, one can execute any wiki content with the right of IconThemeSheet author by creating an icon theme with certain content. This can be done by creating a new page or even throug... Read more
Affected Products : xwiki- Published: Mar. 02, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-25915
Due to improper input validation, an authenticated remote attacker could execute arbitrary commands on the target system.... Read more
- Published: Aug. 21, 2023
- Modified: Jan. 17, 2025
-
9.9
CRITICALCVE-2023-26055
XWiki Commons are technical libraries common to several other top level XWiki projects. Starting in version 3.1-milestone-1, any user can edit their own profile and inject code, which is going to be executed with programming right. The same vulnerability ... Read more
- Published: Mar. 02, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2023-28110
Jumpserver is a popular open source bastion host, and Koko is a Jumpserver component that is the Go version of coco, refactoring coco's SSH/SFTP service and Web Terminal service. Prior to version 2.28.8, using illegal tokens to connect to a Kubernetes clu... Read more
- Published: Mar. 16, 2023
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2019-10328
Jenkins Pipeline Remote Loader Plugin 1.4 and earlier provided a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.... Read more
Affected Products : pipeline_remote_loader- Published: May. 31, 2019
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2019-1003030
A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on ... Read more
- Actively Exploited
- Published: Mar. 08, 2019
- Modified: Feb. 20, 2025
-
9.9
CRITICALCVE-2019-1003029
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroov... Read more
- Actively Exploited
- Published: Mar. 08, 2019
- Modified: Feb. 20, 2025
-
9.9
CRITICALCVE-2021-21477
SAP Commerce Cloud, versions - 1808,1811,1905,2005,2011, enables certain users with required privileges to edit drools rules, an authenticated attacker with this privilege will be able to inject malicious code in the drools rules which when executed leads... Read more
Affected Products : commerce- Published: Feb. 09, 2021
- Modified: Nov. 21, 2024