F5 BIG-IP security bypass | CVE-2024-22389
NAME__________F5 BIG-IP security bypassPlatforms Affected:F5 BIG-IP 15.1.0 F5 BIG-IP 16.1.0 F5 BIG-IP 16.1.3 F5 BIG-IP 15.1.8 F5 BIG-IP 17.1.0Risk Level:7.2Exploitability:UnprovenConsequences:Bypass...
NAME__________F5 BIG-IP security bypassPlatforms Affected:F5 BIG-IP 15.1.0 F5 BIG-IP 16.1.0 F5 BIG-IP 16.1.3 F5 BIG-IP 15.1.8 F5 BIG-IP 17.1.0Risk Level:7.2Exploitability:UnprovenConsequences:Bypass...
NAME__________Node.js security bypassPlatforms Affected:Node.js Node.js 20.0 Node.js Node.js 21.0Risk Level:5.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Node.js could allow a remote attacker to bypass security...
NAME__________Centreon-web code executionPlatforms Affected:Centreon Centreon-web 23.10.0 Centreon Centreon-web 23.04.9 Centreon Centreon-web 22.10.14Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Centreon-web could allow a remote authenticated...
NAME__________Fortinet FortiAnalyzer, FortiAnalyzer-BigData, and FortiManager information disclosurePlatforms Affected:Fortinet FortiAnalyzer-BigData 7.2.0 Fortinet FortiAnalyzer-BigData 7.2.5 Fortinet FortiAnalyzer-BigData 7.0 Fortinet FortiAnalyzer-BigData 6.4 Fortinet...
NAME__________Centreon-web code executionPlatforms Affected:Centreon Centreon-web 23.10.0 Centreon Centreon-web 23.04.9 Centreon Centreon-web 22.10.14Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Centreon-web could allow a remote authenticated...
NAME__________Centreon-web code executionPlatforms Affected:Centreon Centreon-web 23.10.0 Centreon Centreon-web 23.04.9 Centreon Centreon-web 22.10.14Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Centreon-web could allow a remote authenticated...
NAME__________Dell EMC Unity appliances information disclosurePlatforms Affected:Risk Level:4.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Dell EMC Unity appliances could allow a remote authenticated attacker to...
NAME__________Dell EMC Unity appliances command executionPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Dell EMC Unity appliances could allow a local authenticated attacker to...
NAME__________Dell EMC Unity appliances command executionPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Dell EMC Unity appliances could allow a local authenticated attacker to...
NAME__________Dell EMC Unity appliances command executionPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Dell EMC Unity appliances could allow a local authenticated attacker to...
NAME__________Centreon-web code executionPlatforms Affected:Centreon Centreon-web 23.10.0 Centreon Centreon-web 23.04.9 Centreon Centreon-web 22.10.14Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Centreon-web could allow a remote authenticated...
NAME__________Dell EMC Unity appliances cross-site scriptingPlatforms Affected:Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Dell EMC Unity appliances are vulnerable to cross-site scripting, caused by...
NAME__________Dell EMC Unity appliances command executionPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Dell EMC Unity appliances could allow a local authenticated attacker to...
NAME__________Dell EMC Unity appliances command executionPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Dell EMC Unity appliances could allow a local authenticated attacker to...
NAME__________Dell EMC Unity appliances directory traversalPlatforms Affected:Risk Level:3.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Dell EMC Unity appliances could allow a local authenticated attacker to...
NAME__________Linux Kernel code executionPlatforms Affected:Linux KernelRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Linux Kernel could allow a local authenticated attacker to execute arbitrary code...
NAME__________SAP Master Data Governance Material information disclosurePlatforms Affected:SAP Master Data Governance Material 618 SAP Master Data Governance Material 619 SAP...
NAME__________SAP Fiori app privilege escalationPlatforms Affected:SAP Fiori app 605Risk Level:4.3Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION__________SAP Fiori app could allow a remote authenticated attacker...
NAME__________SAP NetWeaver AS ABAP information disclosurePlatforms Affected:SAP NetWeaver AS ABAP KERNEL 7.85 SAP NetWeaver AS ABAP KERNEL 7.89 SAP NetWeaver...
NAME__________Dell EMC Unity appliances command executionPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Dell EMC Unity appliances could allow a local authenticated attacker to...
NAME__________SAP Bank Account Management privilege escalationPlatforms Affected:SAP Bank Account Management SAP_FIN 618 SAP Bank Account Management SAP_FIN 730 SAP Bank...
NAME__________SAP NetWeaver Business Client for HTML cross-site scriptingPlatforms Affected:SAP NetWeaver Business Client for HTML SAP_UI 754 SAP NetWeaver Business Client...
NAME__________SAP IDES Systems code executionPlatforms Affected:SAP IDES SystemsRisk Level:7.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________SAP IDES Systems could allow a remote authenticated attacker to...
NAME__________SAP man-in-the-middlePlatforms Affected:SAP Cloud Connector 2.0Risk Level:7.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________SAP is vulnerable to a man-in-the-middle attack, caused by improper validation of...