Show filters
774 Total Results
Displaying 171-180 of 774
Sort by:
Attacker Value
Unknown
CVE-2022-21636
Disclosure Date: October 18, 2022 (last updated October 08, 2023)
Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Session Management). Supported versions that are affected are 12.2.6-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Applications Framework accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
0
Attacker Value
Unknown
CVE-2022-41547
Disclosure Date: October 18, 2022 (last updated October 08, 2023)
Mobile Security Framework (MobSF) v0.9.2 and below was discovered to contain a local file inclusion (LFI) vulnerability in the StaticAnalyzer/views.py script. This vulnerability allows attackers to read arbitrary files via a crafted HTTP request.
0
Attacker Value
Unknown
CVE-2022-26929
Disclosure Date: September 13, 2022 (last updated January 11, 2025)
.NET Framework Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2022-36891
Disclosure Date: July 27, 2022 (last updated February 24, 2025)
A missing permission check in Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier allows attackers with Item/Read permission but without Deploy Now/Deploy permission to read deployment logs.
0
Attacker Value
Unknown
CVE-2022-36890
Disclosure Date: July 27, 2022 (last updated February 24, 2025)
Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the name of files in methods implementing form validation, allowing attackers with Item/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
0
Attacker Value
Unknown
CVE-2022-36889
Disclosure Date: July 27, 2022 (last updated February 24, 2025)
Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the application path of the applications when configuring a deployment, allowing attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller file system to the selected service.
0
Attacker Value
Unknown
CVE-2018-25045
Disclosure Date: July 23, 2022 (last updated February 24, 2025)
Django REST framework (aka django-rest-framework) before 3.9.1 allows XSS because the default DRF Browsable API view templates disable autoescaping.
0
Attacker Value
Unknown
CVE-2022-21566
Disclosure Date: July 19, 2022 (last updated December 22, 2024)
Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Diagnostics). Supported versions that are affected are 12.2.9-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Applications Framework accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
0
Attacker Value
Unknown
CVE-2022-25238
Disclosure Date: June 28, 2022 (last updated February 24, 2025)
Silverstripe silverstripe/framework through 4.10.0 allows XSS, inside of script tags that can can be added to website content via XHR by an authenticated CMS user if the cwp-core module is not installed on the sanitise_server_side contig is not set to true in project code.
0
Attacker Value
Unknown
CVE-2022-31023
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
Play Framework is a web framework for Java and Scala. Verions prior to 2.8.16 are vulnerable to generation of error messages containing sensitive information. Play Framework, when run in dev mode, shows verbose errors for easy debugging, including an exception stack trace. Play does this by configuring its `DefaultHttpErrorHandler` to do so based on the application mode. In its Scala API Play also provides a static object `DefaultHttpErrorHandler` that is configured to always show verbose errors. This is used as a default value in some Play APIs, so it is possible to inadvertently use this version in production. It is also possible to improperly configure the `DefaultHttpErrorHandler` object instance as the injected error handler. Both of these situations could result in verbose errors displaying to users in a production application, which could expose sensitive information from the application. In particular, the constructor for `CORSFilter` and `apply` method for `CORSActionBuilder`…
0