Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.9

    CRITICAL
    CVE-2021-32639

    Emissary is a P2P-based, data-driven workflow engine. Emissary version 6.4.0 is vulnerable to Server-Side Request Forgery (SSRF). In particular, the `RegisterPeerAction` endpoint and the `AddChildDirectoryAction` endpoint are vulnerable to SSRF. This vuln... Read more

    Affected Products : emissary
    • Published: Jul. 02, 2021
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-26474

    XWiki Platform is a generic wiki platform. Starting in version 13.10, it's possible to use the right of an existing document content author to execute a text area property. This has been patched in XWiki 14.10, 14.4.7, and 13.10.11. There are no known wor... Read more

    Affected Products : xwiki
    • Published: Mar. 02, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2019-2633

    Vulnerability in the Oracle Work in Process component of Oracle E-Business Suite (subcomponent: Messages). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability... Read more

    Affected Products : work_in_process
    • Published: Apr. 23, 2019
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-26472

    XWiki Platform is a generic wiki platform. Starting in version 6.2-milestone-1, one can execute any wiki content with the right of IconThemeSheet author by creating an icon theme with certain content. This can be done by creating a new page or even throug... Read more

    Affected Products : xwiki
    • Published: Mar. 02, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-25915

    Due to improper input validation, an authenticated remote attacker could execute arbitrary commands on the target system.... Read more

    Affected Products : ak-sm_800a_firmware ak-sm_800a
    • Published: Aug. 21, 2023
    • Modified: Jan. 17, 2025
  • 9.9

    CRITICAL
    CVE-2023-26055

    XWiki Commons are technical libraries common to several other top level XWiki projects. Starting in version 3.1-milestone-1, any user can edit their own profile and inject code, which is going to be executed with programming right. The same vulnerability ... Read more

    Affected Products : xwiki commons
    • Published: Mar. 02, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-28110

    Jumpserver is a popular open source bastion host, and Koko is a Jumpserver component that is the Go version of coco, refactoring coco's SSH/SFTP service and Web Terminal service. Prior to version 2.28.8, using illegal tokens to connect to a Kubernetes clu... Read more

    Affected Products : jumpserver koko
    • Published: Mar. 16, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2019-10328

    Jenkins Pipeline Remote Loader Plugin 1.4 and earlier provided a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.... Read more

    Affected Products : pipeline_remote_loader
    • Published: May. 31, 2019
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2019-1003030

    A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on ... Read more

    • Actively Exploited
    • Published: Mar. 08, 2019
    • Modified: Feb. 20, 2025
  • 9.9

    CRITICAL
    CVE-2019-1003029

    A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroov... Read more

    • Actively Exploited
    • Published: Mar. 08, 2019
    • Modified: Feb. 20, 2025
  • 9.9

    CRITICAL
    CVE-2021-21477

    SAP Commerce Cloud, versions - 1808,1811,1905,2005,2011, enables certain users with required privileges to edit drools rules, an authenticated attacker with this privilege will be able to inject malicious code in the drools rules which when executed leads... Read more

    Affected Products : commerce
    • Published: Feb. 09, 2021
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-22946

    In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configuration-... Read more

    Affected Products : spark
    • Published: Apr. 17, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-22651

    Improper Privilege Management vulnerability in SUSE Rancher allows Privilege Escalation. A failure in the update logic of Rancher's admission Webhook may lead to the misconfiguration of the Webhook. This component enforces validation rules and security ... Read more

    Affected Products : rancher rancher
    • Published: May. 04, 2023
    • Modified: Jan. 29, 2025
  • 9.9

    CRITICAL
    CVE-2016-9269

    Remote Command Execution in com.trend.iwss.gui.servlet.ManagePatches in Trend Micro Interscan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allows authenticated, remote users with least privileges to run arbitrary com... Read more

    • Published: Feb. 21, 2017
    • Modified: Apr. 20, 2025
  • 9.9

    CRITICAL
    CVE-2018-18406

    An issue was discovered in Tufin SecureTrack 18.1 with TufinOS 2.16 build 1179(Final). The Audit Report module is affected by a blind XXE vulnerability when a new Best Practices Report is saved using a special payload inside the xml input field. The XXE v... Read more

    Affected Products : securetrack tufinos
    • Published: Jun. 19, 2019
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2025-42957

    SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability eff... Read more

    Affected Products :
    • Published: Aug. 12, 2025
    • Modified: Aug. 12, 2025
    • Vuln Type: Injection
  • 9.9

    CRITICAL
    CVE-2022-37425

    Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in OpenNebula OpenNebula core on Linux allows Remote Code Inclusion.... Read more

    Affected Products : linux_kernel opennebula
    • Published: Oct. 28, 2022
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2022-0415

    Remote Command Execution in uploading repository file in GitHub repository gogs/gogs prior to 0.12.6.... Read more

    Affected Products : gogs
    • Published: Mar. 21, 2022
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2018-12892

    An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may... Read more

    Affected Products : debian_linux xen
    • Published: Jul. 02, 2018
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2025-29972

    Server-Side Request Forgery (SSRF) in Azure allows an authorized attacker to perform spoofing over a network.... Read more

    • Published: May. 08, 2025
    • Modified: Jun. 05, 2025
    • Vuln Type: Server-Side Request Forgery
Showing 20 of 294276 Results