Show filters
10,546 Total Results
Displaying 341-350 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown
CVE-2022-26324
Disclosure Date: November 22, 2024 (last updated February 27, 2025)
Possible XSS in iManager URL for access Component has been discovered in
OpenText™ iManager 3.2.6.0000.
0
Attacker Value
Unknown
CVE-2021-38135
Disclosure Date: November 22, 2024 (last updated February 27, 2025)
Possible
External Service Interaction attack
in iManager has been discovered in
OpenText™ iManager 3.2.6.0000.
0
Attacker Value
Unknown
CVE-2021-38134
Disclosure Date: November 22, 2024 (last updated February 27, 2025)
Possible XSS in iManager URL for access Component has been discovered in
OpenText™ iManager 3.2.5.0000.
0
Attacker Value
Unknown
CVE-2021-38119
Disclosure Date: November 22, 2024 (last updated February 27, 2025)
Possible Reflected Cross-Site Scripting (XSS) Vulnerability
in iManager has been discovered in
OpenText™ iManager 3.2.4.0000.
0
Attacker Value
Unknown
CVE-2021-38118
Disclosure Date: November 22, 2024 (last updated February 27, 2025)
Possible improper input validation Vulnerability
in iManager has been discovered in
OpenText™ iManager 3.2.4.0000.
0
Attacker Value
Unknown
CVE-2021-38117
Disclosure Date: November 22, 2024 (last updated February 27, 2025)
Possible Command injection Vulnerability
in iManager has been discovered in
OpenText™ iManager 3.2.4.0000.
0
Attacker Value
Unknown
CVE-2021-38116
Disclosure Date: November 22, 2024 (last updated February 27, 2025)
Possible Elevation of Privilege Vulnerability
in iManager has been discovered in
OpenText™ iManager. This impacts all versions before 3.2.5
0
Attacker Value
Unknown
CVE-2024-52799
Disclosure Date: November 21, 2024 (last updated February 27, 2025)
Argo Workflows Chart is used to set up argo and its needed dependencies through one command. Prior to 0.44.0, the workflow-role has excessive privileges, the worst being create pods/exec, which will allow kubectl exec into any Pod in the same namespace, i.e. arbitrary code execution within those Pods. If a user can be made to run a malicious template, their whole namespace can be compromised. This affects versions of the argo-workflows Chart that use appVersion: 3.4 and above, which no longer need these permissions for the only available Executor, Emissary. It could also affect users below 3.4 depending on their choice of Executor in those versions. This only affects the Helm Chart and not the upstream manifests. This vulnerability is fixed in 0.44.0.
0
Attacker Value
Unknown
CVE-2024-52797
Disclosure Date: November 21, 2024 (last updated February 27, 2025)
Opencast is free and open source software for automated video capture and distribution. First noticed in Opencast 13 and 14, Opencast's Elasticsearch integration may generate syntactically invalid Elasticsearch queries in relation to previously acceptable search queries. From Opencast version 11.4 and newer, Elasticsearch queries are retried a configurable number of times in the case of error to handle temporary losses of connection to Elasticsearch. These invalid queries would fail, causing the retry mechanism to begin requerying with the same syntactically invalid query immediately, in an infinite loop. This causes a massive increase in log size which can in some cases cause a denial of service due to disk exhaustion.
Opencast 13.10 and Opencast 14.3 contain patches which address the base issue, with Opencast 16.7 containing changes which harmonize the search behaviour between the admin UI and external API. Users are strongly recommended to upgrade as soon as possible if running ve…
0
Attacker Value
Unknown
CVE-2024-52444
Disclosure Date: November 20, 2024 (last updated February 27, 2025)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WPOPAL Opal Woo Custom Product Variation allows Path Traversal.This issue affects Opal Woo Custom Product Variation: from n/a through 1.1.3.
0