PT-2021-02: Encryption bypass when downloading a firmware update in Diebold-Nixdorf RM3/CRS
PT-2021-02: Encryption bypass when downloading a firmware update in Diebold-Nixdorf RM3/CRS RM3/CRS dispenser firmware (all versions up to and including 41128 1002 RM3_CRS.BTR + 170329 2332 RM3_CRS.FRM) Severity: Severity level: High Encryption bypass when downloading a firmware update in...
2.1AI Score
EPSS
PT-2021-01: Encryption bypass when downloading a firmware update in Diebold-Nixdorf CMDv5
PT-2021-01: Encryption bypass when downloading a firmware update in Diebold-Nixdorf CMDv5 CMDv5 dispenser firmware (all versions up to and including 141128 1002 CD5_ATM.BTR + 170329 2332 CD5_ATM.FRM) Severity: Severity level: High Encryption bypass when downloading a firmware update in...
2.1AI Score
EPSS
Tuesday, July 2, 2024 Security Releases
Summary The Node.js project will release new versions of the 22.x, 20.x, 18.x releases lines on or shortly after, Tuesday, July 2, 2024 in order to address: 1 high severity issues. 2 medium severity issues. 3 low severity issues. Node.js fetch will be upgraded to undici v6.19.2 on Node.js 18.x...
7AI Score
londonwarmemorial.co.uk Cross Site Scripting vulnerability OBB-3939803
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...
6.2AI Score
The Quiz and Survey Master (QSM) WordPress plugin before 9.0.2 does not validate and escape some of its Quiz fields before outputting them back in a page/post where the Quiz is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting...
5.9AI Score
EPSS
The Quiz and Survey Master (QSM) WordPress plugin before 9.0.2 does not validate and escape some of its Quiz fields before outputting them back in a page/post where the Quiz is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting...
EPSS
The Form Maker by 10Web WordPress plugin before 1.15.26 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite...
5.7AI Score
EPSS
The Form Maker by 10Web WordPress plugin before 1.15.26 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite...
EPSS
au-magasin-de-velo.fr Cross Site Scripting vulnerability OBB-3939802
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...
6.2AI Score
CVE-2024-4934 Quiz And Survey Master < 9.0.2 - Contributor+ Stored XSS
The Quiz and Survey Master (QSM) WordPress plugin before 9.0.2 does not validate and escape some of its Quiz fields before outputting them back in a page/post where the Quiz is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting...
EPSS
CVE-2024-6130 Form Maker by 10Web < 1.15.26 - Admin+ Stored XSS
The Form Maker by 10Web WordPress plugin before 1.15.26 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite...
EPSS
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08719602; Issue ID:...
7.2AI Score
EPSS
"Piccoma" App for Android and iOS versions prior to 6.20.0 uses a hard-coded API key for an external service, which may allow a local attacker to obtain the API key. Note that the users of the app are not directly affected by this...
6.3AI Score
EPSS
In gnss service, there is a possible escalation of privilege due to improper certificate validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08720039; Issue ID:...
EPSS
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID:...
EPSS
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08719602; Issue ID:...
EPSS
CHANGING Mobile One Time Password's uploading function in a hidden page does not filter file type properly. Remote attackers with administrator privilege can exploit this vulnerability to upload and run malicious file to execute system...
7.2CVSS
7.2AI Score
EPSS
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297807; Issue ID:...
7AI Score
EPSS
In venc, there is a possible out of bounds write due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08737250; Issue ID:...
EPSS
"Piccoma" App for Android and iOS versions prior to 6.20.0 uses a hard-coded API key for an external service, which may allow a local attacker to obtain the API key. Note that the users of the app are not directly affected by this...
EPSS
CHANGING Mobile One Time Password does not properly filter parameters for the file download functionality, allowing remote attackers with administrator privilege to read arbitrary file on the...
4.9CVSS
5.3AI Score
EPSS
CHANGING Mobile One Time Password does not properly filter parameters for the file download functionality, allowing remote attackers with administrator privilege to read arbitrary file on the...
4.9CVSS
EPSS
CHANGING Mobile One Time Password's uploading function in a hidden page does not filter file type properly. Remote attackers with administrator privilege can exploit this vulnerability to upload and run malicious file to execute system...
7.2CVSS
EPSS
In gnss service, there is a possible escalation of privilege due to improper certificate validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08720039; Issue ID:...
7.5AI Score
EPSS
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID:...
7.2AI Score
EPSS
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297807; Issue ID:...
EPSS
In venc, there is a possible out of bounds write due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08737250; Issue ID:...
7.2AI Score
EPSS
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297806; Issue ID:...
EPSS
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297806; Issue ID:...
7AI Score
EPSS
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08719602; Issue ID:...
EPSS
In gnss service, there is a possible escalation of privilege due to improper certificate validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08720039; Issue ID:...
EPSS
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08044040; Issue ID:...
EPSS
In venc, there is a possible out of bounds write due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08737250; Issue ID:...
EPSS
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297806; Issue ID:...
EPSS
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297807; Issue ID:...
EPSS
CVE-2023-44487 vulnerabilities
Vulnerabilities for packages: nginx-mainline, bom, ollama, nats, kubernetes-csi-external-attacher, grype, frp, prometheus, conftest, gatekeeper, amass, nvidia-device-plugin, pulumi-kubernetes-operator, tctl, flux-notification-controller, thanos, haproxy-ingress, sigstore-scaffolding, traefik,...
7.5CVSS
9AI Score
0.732EPSS
Vulnerabilities for packages: gitlab-runner, influxd, k3s, falcoctl, gitlab-kas, slsa-verifier, opentofu, consul, goreleaser, flux-image-reflector-controller, argo-cd, ksops, terraform, kubernetes-event-exporter, zarf, kargo, opentelemetry-collector-contrib, guac, rook, step-ca, vexctl,...
6CVSS
6AI Score
0.0004EPSS
GHSA-2C7C-3MJ9-8FQH vulnerabilities
Vulnerabilities for packages: dex, falco, istio-pilot-discovery, slsa-verifier, cilium-envoy, argo-cd, argo-workflows, vexctl, oauth2-proxy, aactl, gitsign, kots, kubescape, rekor, tekton-chains, external-secrets-operator, cosign, cloudflared, flux-kustomize-controller, spire-server, vault, keda,.....
7.5AI Score
GHSA-7WW5-4WQC-M92C vulnerabilities
Vulnerabilities for packages: neuvector-agent, grype, melange, eksctl, kaniko, newrelic-infrastructure-agent, fuse-overlayfs-snapshotter, kubescape, kots, telegraf, helm-push, gitness, trivy, ctop, k3d, up, cert-manager, flux-source-controller, cilium-cli, helm, kubevela, flux-helm-controller,...
7.5AI Score
CVE-2024-25620 vulnerabilities
Vulnerabilities for packages: flux-source-controller, helm-operator, eksctl, istio-operator, up, k9s, zarf, k8sgpt, chartmuseum, cilium-cli, kots, kubescape, flux-helm-controller, helm-push, zot, cert-manager,...
6.4CVSS
6.7AI Score
0.0004EPSS
GHSA-JQ35-85CJ-FJ4P vulnerabilities
Vulnerabilities for packages: bom, k3s, falco, slsa-verifier, goreleaser, kpt, prometheus, aactl, kubescape, tekton-chains, ctop, k3d, up, chartmuseum, paranoia, cert-manager, scorecard, tekton-pipelines, skaffold,...
7.5AI Score
GHSA-8R3F-844C-MC37 vulnerabilities
Vulnerabilities for packages: ollama, datadog-agent, kyverno-policy-reporter-ui, prometheus-statsd-exporter, nats, kube-logging-operator, protoc-gen-go-grpc, local-path-provisioner, kubernetes, flux-image-reflector-controller, grype, cluster-proportional-autoscaler,...
7.5AI Score
CVE-2023-45289 vulnerabilities
Vulnerabilities for packages: bom, datadog-agent, mage, prometheus-statsd-exporter, nats, fq, kube-logging-operator, local-path-provisioner, protoc-gen-go-grpc, kubernetes, flux-image-reflector-controller, grype, cluster-proportional-autoscaler, kubernetes-csi-external-attacher, regclient, yam,...
7.8AI Score
0.0004EPSS
GHSA-R53H-JV2G-VPX6 vulnerabilities
Vulnerabilities for packages: flux-source-controller, helm-operator, eksctl, istio-operator, up, k9s, zarf, k8sgpt, chartmuseum, cilium-cli, kots, kubescape, flux-helm-controller, helm-push, zot, cert-manager,...
7.5AI Score
CVE-2023-45288 vulnerabilities
Vulnerabilities for packages: datadog-agent, multus-cni, kyverno-policy-reporter-ui, protoc-gen-go-grpc, local-path-provisioner, kubernetes-csi-external-resizer, step-ca, conftest, prometheus-node-exporter, amass, docker-cli, nri-redis, protoc-gen-go, chartmuseum, haproxy-ingress, cert-exporter,...
6.8AI Score
0.0004EPSS
CVE-2024-24787 vulnerabilities
Vulnerabilities for packages: bom, ipfs, mage, multus-cni, kyverno-policy-reporter-ui, prometheus-statsd-exporter, local-path-provisioner, kubernetes-ingress-defaultbackend, stern, kubernetes, flux-image-reflector-controller, kubernetes-csi-external-attacher, extism, osv-scanner,...
6.5AI Score
0.0004EPSS
GHSA-5FQ7-4MXC-535H vulnerabilities
Vulnerabilities for packages: bom, ipfs, mage, multus-cni, kyverno-policy-reporter-ui, prometheus-statsd-exporter, local-path-provisioner, kubernetes-ingress-defaultbackend, stern, kubernetes, flux-image-reflector-controller, kubernetes-csi-external-attacher, extism, osv-scanner,...
7.5AI Score
GHSA-V6V8-XJ6M-XWQH vulnerabilities
Vulnerabilities for packages: gitlab-runner, influxd, k3s, falcoctl, gitlab-kas, slsa-verifier, opentofu, consul, goreleaser, flux-image-reflector-controller, argo-cd, ksops, terraform, kubernetes-event-exporter, zarf, kargo, opentelemetry-collector-contrib, guac, rook, step-ca, vexctl,...
7.5AI Score
CVE-2023-45285 vulnerabilities
Vulnerabilities for packages: influx, aws-flb-firehose, mage, nats, protoc-gen-go-grpc, falco, local-path-provisioner, aws-flb-cloudwatch, slsa-verifier, goreleaser, cilium-envoy, flannel-cni-plugin, prometheus-stackdriver-exporter, sbom-scorecard, ip-masq-agent, gobuster, render-template,...
7.5CVSS
7.9AI Score
0.001EPSS
Vulnerabilities for packages: bom, kpt, kubernetes-dashboard, aactl, goreleaser,...
6.5CVSS
7AI Score
0.001EPSS