Show filters
10,546 Total Results
Displaying 341-350 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown

CVE-2022-26324

Disclosure Date: November 22, 2024 (last updated February 27, 2025)
Possible XSS in iManager URL for access Component has been discovered in OpenText™ iManager 3.2.6.0000.
0
Attacker Value
Unknown

CVE-2021-38135

Disclosure Date: November 22, 2024 (last updated February 27, 2025)
Possible External Service Interaction attack in iManager has been discovered in OpenText™ iManager 3.2.6.0000.
0
Attacker Value
Unknown

CVE-2021-38134

Disclosure Date: November 22, 2024 (last updated February 27, 2025)
Possible XSS in iManager URL for access Component has been discovered in OpenText™ iManager 3.2.5.0000.
0
Attacker Value
Unknown

CVE-2021-38119

Disclosure Date: November 22, 2024 (last updated February 27, 2025)
Possible Reflected Cross-Site Scripting (XSS) Vulnerability in iManager has been discovered in OpenText™ iManager 3.2.4.0000.
0
Attacker Value
Unknown

CVE-2021-38118

Disclosure Date: November 22, 2024 (last updated February 27, 2025)
Possible improper input validation Vulnerability in iManager has been discovered in OpenText™ iManager 3.2.4.0000.
0
Attacker Value
Unknown

CVE-2021-38117

Disclosure Date: November 22, 2024 (last updated February 27, 2025)
Possible Command injection Vulnerability in iManager has been discovered in OpenText™ iManager 3.2.4.0000.
0
Attacker Value
Unknown

CVE-2021-38116

Disclosure Date: November 22, 2024 (last updated February 27, 2025)
Possible Elevation of Privilege Vulnerability in iManager has been discovered in OpenText™ iManager. This impacts all versions before 3.2.5
0
Attacker Value
Unknown

CVE-2024-52799

Disclosure Date: November 21, 2024 (last updated February 27, 2025)
Argo Workflows Chart is used to set up argo and its needed dependencies through one command. Prior to 0.44.0, the workflow-role has excessive privileges, the worst being create pods/exec, which will allow kubectl exec into any Pod in the same namespace, i.e. arbitrary code execution within those Pods. If a user can be made to run a malicious template, their whole namespace can be compromised. This affects versions of the argo-workflows Chart that use appVersion: 3.4 and above, which no longer need these permissions for the only available Executor, Emissary. It could also affect users below 3.4 depending on their choice of Executor in those versions. This only affects the Helm Chart and not the upstream manifests. This vulnerability is fixed in 0.44.0.
0
Attacker Value
Unknown

CVE-2024-52797

Disclosure Date: November 21, 2024 (last updated February 27, 2025)
Opencast is free and open source software for automated video capture and distribution. First noticed in Opencast 13 and 14, Opencast's Elasticsearch integration may generate syntactically invalid Elasticsearch queries in relation to previously acceptable search queries. From Opencast version 11.4 and newer, Elasticsearch queries are retried a configurable number of times in the case of error to handle temporary losses of connection to Elasticsearch. These invalid queries would fail, causing the retry mechanism to begin requerying with the same syntactically invalid query immediately, in an infinite loop. This causes a massive increase in log size which can in some cases cause a denial of service due to disk exhaustion. Opencast 13.10 and Opencast 14.3 contain patches which address the base issue, with Opencast 16.7 containing changes which harmonize the search behaviour between the admin UI and external API. Users are strongly recommended to upgrade as soon as possible if running ve…
0
Attacker Value
Unknown

CVE-2024-52444

Disclosure Date: November 20, 2024 (last updated February 27, 2025)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WPOPAL Opal Woo Custom Product Variation allows Path Traversal.This issue affects Opal Woo Custom Product Variation: from n/a through 1.1.3.
0