A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'kimiya' was reported to the affected vendor on: 2024-12-12, 78 days ago. The vendor is given until 2025-04-11 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 6.3 AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L severity vulnerability discovered by 'nella17 (@nella17tw), working with DEVCORE Internship Program, and DEVCORE Research Team' was reported to the affected vendor on: 2024-12-12, 78 days ago. The vendor is given until 2025-04-11 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Micro Zero Day Initiative' was reported to the affected vendor on: 2024-12-12, 78 days ago. The vendor is given until 2025-04-11 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Vladislav Berghici of Trend Micro Research & Mat Powell of Trend Micro Zero Day Initiative' was reported to the affected vendor on: 2024-12-12, 7 days ago. The vendor is given until 2025-04-11 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Micro Zero Day Initiative' was reported to the affected vendor on: 2024-12-12, 78 days ago. The vendor is given until 2025-04-11 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Vladislav Berghici of Trend Micro Research & Mat Powell of Trend Micro Zero Day Initiative' was reported to the affected vendor on: 2024-12-12, 7 days ago. The vendor is given until 2025-04-11 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Micro Zero Day Initiative' was reported to the affected vendor on: 2024-12-12, 78 days ago. The vendor is given until 2025-04-11 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Micro Zero Day Initiative' was reported to the affected vendor on: 2024-12-12, 7 days ago. The vendor is given until 2025-04-11 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A vulnerability, which was classified as critical, was found in Composr CMS up to 10.0.39. Affected is an unknown function of the file /adminzone/index.php?page=admin-commandr. The manipulation leads to unrestricted upload.
This vulnerability is traded as CVE-2021-46360. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Oracle Communications Cloud Native Core Console 1.9.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component CNC Console. The manipulation leads to improper input validation.
This vulnerability is known as CVE-2021-44832. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.