Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2017-8045 |
|
Unsafe Deserialization in pivotal-software (CVE-2017-8045)
vulnerability in pivotal-software (CVE-2017-8045). Successful exploitation can lead to full system takeover.
|
| CVE-2017-8038 |
|
Vulnerability in pivotal-software (CVE-2017-8038)
vulnerability in pivotal-software (CVE-2017-8038). Successful exploitation can lead to full system takeover.
|
| CVE-2017-8028 |
|
Authentication Bypass in pivotal-software (CVE-2017-8028)
authentication bypass in pivotal-software (CVE-2017-8028). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14390 |
|
Vulnerability in pivotal-software (CVE-2017-14390)
vulnerability in pivotal-software (CVE-2017-14390). Confidential information can be exposed externally.
|
| CVE-2017-14388 |
|
Vulnerability in pivotal-software (CVE-2017-14388)
vulnerability in pivotal-software (CVE-2017-14388). Successful exploitation can lead to full system takeover.
|
| CVE-2015-5170 |
|
Cross-Site Request Forgery (CSRF) in csrf (CVE-2015-5170)
vulnerability in csrf (CVE-2015-5170). Successful exploitation can lead to full system takeover.
|
| CVE-2015-5171 |
|
Vulnerability in cloudfoundry (CVE-2015-5171)
vulnerability in cloudfoundry (CVE-2015-5171). Successful exploitation can lead to full system takeover.
|
| CVE-2015-5172 |
|
Vulnerability in cloudfoundry (CVE-2015-5172)
vulnerability in cloudfoundry (CVE-2015-5172). Successful exploitation can lead to full system takeover.
|
| CVE-2015-5173 |
|
Information Disclosure in cloudfoundry (CVE-2015-5173)
vulnerability in cloudfoundry (CVE-2015-5173). Successful exploitation can lead to full system takeover.
|
| CVE-2017-8032 |
|
Privilege Escalation in pivotal-software (CVE-2017-8032)
vulnerability in pivotal-software (CVE-2017-8032). Successful exploitation can lead to full system takeover.
|
| CVE-2017-4965 |
|
Cross-Site Scripting (XSS) in broadcom (CVE-2017-4965)
cross-site scripting in broadcom (CVE-2017-4965). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-4994 |
|
Vulnerability in cloudfoundry (CVE-2017-4994)
vulnerability in cloudfoundry (CVE-2017-4994). Data can be tampered with by attackers.
|
| CVE-2017-4992 |
|
Privilege Escalation in privilege-escalation (CVE-2017-4992)
vulnerability in privilege-escalation (CVE-2017-4992). Successful exploitation can lead to full system takeover.
|
| CVE-2017-4991 |
|
Privilege Escalation in cloudfoundry (CVE-2017-4991)
vulnerability in cloudfoundry (CVE-2017-4991). Successful exploitation can lead to full system takeover.
|
| CVE-2017-4974 |
|
SQL Injection in sqli (CVE-2017-4974)
SQL injection in sqli (CVE-2017-4974). Confidential information can be exposed externally.
|
| CVE-2017-4973 |
|
Privilege Escalation in cloudfoundry (CVE-2017-4973)
vulnerability in cloudfoundry (CVE-2017-4973). Successful exploitation can lead to full system takeover.
|
| CVE-2017-4972 |
|
SQL Injection in sqli (CVE-2017-4972)
SQL injection in sqli (CVE-2017-4972). Confidential information can be exposed externally.
|
| CVE-2017-4967 |
|
Cross-Site Scripting (XSS) in broadcom (CVE-2017-4967)
cross-site scripting in broadcom (CVE-2017-4967). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-4966 |
|
Information Disclosure in broadcom (CVE-2017-4966)
vulnerability in broadcom (CVE-2017-4966). Successful exploitation can lead to full system takeover.
|
| CVE-2017-4963 |
|
Vulnerability in pivotal-software (CVE-2017-4963)
vulnerability in pivotal-software (CVE-2017-4963). Successful exploitation can lead to full system takeover.
|
| CVE-2017-4959 |
|
Vulnerability in pivotal-software (CVE-2017-4959)
vulnerability in pivotal-software (CVE-2017-4959). Successful exploitation can lead to full system takeover.
|
| CVE-2017-4955 |
|
Vulnerability in pivotal-software (CVE-2017-4955)
vulnerability in pivotal-software (CVE-2017-4955). Successful exploitation can lead to full system takeover.
|
| CVE-2017-2773 |
|
Vulnerability in pivotal-software (CVE-2017-2773)
vulnerability in pivotal-software (CVE-2017-2773). Successful exploitation can lead to full system takeover.
|
| CVE-2016-0780 |
|
Vulnerability in dos (CVE-2016-0780)
vulnerability in dos (CVE-2016-0780). Risk of unauthorized operations or information disclosure.
|
| CVE-2014-0225 |
|
XXE (XML External Entity) in spring (CVE-2014-0225)
vulnerability in spring (CVE-2014-0225). Successful exploitation can lead to full system takeover.
|
| CVE-2015-1834 |
|
Path Traversal in path-traversal (CVE-2015-1834)
path traversal in path-traversal (CVE-2015-1834). Data can be tampered with by attackers.
|
| CVE-2015-3189 |
|
Vulnerability in cloudfoundry (CVE-2015-3189)
vulnerability in cloudfoundry (CVE-2015-3189). Risk of unauthorized operations or information disclosure.
|
| CVE-2015-3190 |
|
Open Redirect in cloudfoundry (CVE-2015-3190)
vulnerability in cloudfoundry (CVE-2015-3190). Risk of unauthorized operations or information disclosure.
|
| CVE-2015-3191 |
|
Cross-Site Request Forgery (CSRF) in csrf (CVE-2015-3191)
vulnerability in csrf (CVE-2015-3191). Successful exploitation can lead to full system takeover.
|
| CVE-2016-0761 |
|
Vulnerability in cloudfoundry (CVE-2016-0761)
vulnerability in cloudfoundry (CVE-2016-0761). Successful exploitation can lead to full system takeover.
|
| CVE-2016-0781 |
|
Cross-Site Scripting (XSS) in cloudfoundry (CVE-2016-0781)
cross-site scripting in cloudfoundry (CVE-2016-0781). Risk of unauthorized operations or information disclosure.
|
| CVE-2016-2165 |
|
Vulnerability in cloudfoundry (CVE-2016-2165)
vulnerability in cloudfoundry (CVE-2016-2165). Data can be tampered with by attackers.
|
| CVE-2016-3084 |
|
Vulnerability in cloudfoundry (CVE-2016-3084)
vulnerability in cloudfoundry (CVE-2016-3084). Successful exploitation can lead to full system takeover.
|
| CVE-2016-5007 |
|
Vulnerability in spring (CVE-2016-5007)
vulnerability in spring (CVE-2016-5007). Data can be tampered with by attackers.
|
| CVE-2016-5006 |
|
Information Disclosure in pivotal-software (CVE-2016-5006)
vulnerability in pivotal-software (CVE-2016-5006). Successful exploitation can lead to full system takeover.
|
| CVE-2016-5016 |
|
Vulnerability in pivotal-software (CVE-2016-5016)
vulnerability in pivotal-software (CVE-2016-5016). Data can be tampered with by attackers.
|
| CVE-2016-4468 |
|
SQL Injection in sqli (CVE-2016-4468)
SQL injection in sqli (CVE-2016-4468). Successful exploitation can lead to full system takeover.
|
| CVE-2017-4960 |
|
Vulnerability in dos (CVE-2017-4960)
vulnerability in dos (CVE-2017-4960). Risk of unauthorized operations or information disclosure.
|