Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2015-5173 |
|
Information Disclosure in cloudfoundry (CVE-2015-5173)
vulnerability in cloudfoundry (CVE-2015-5173). Successful exploitation can lead to full system takeover.
|
| CVE-2015-5172 |
|
Vulnerability in cloudfoundry (CVE-2015-5172)
vulnerability in cloudfoundry (CVE-2015-5172). Successful exploitation can lead to full system takeover.
|
| CVE-2015-5171 |
|
Vulnerability in cloudfoundry (CVE-2015-5171)
vulnerability in cloudfoundry (CVE-2015-5171). Successful exploitation can lead to full system takeover.
|
| CVE-2015-5170 |
|
Cross-Site Request Forgery (CSRF) in csrf (CVE-2015-5170)
vulnerability in csrf (CVE-2015-5170). Successful exploitation can lead to full system takeover.
|
| CVE-2017-8032 |
|
Privilege Escalation in pivotal-software (CVE-2017-8032)
vulnerability in pivotal-software (CVE-2017-8032). Successful exploitation can lead to full system takeover.
|
| CVE-2017-4973 |
|
Privilege Escalation in cloudfoundry (CVE-2017-4973)
vulnerability in cloudfoundry (CVE-2017-4973). Successful exploitation can lead to full system takeover.
|
| CVE-2017-4994 |
|
Vulnerability in cloudfoundry (CVE-2017-4994)
vulnerability in cloudfoundry (CVE-2017-4994). Data can be tampered with by attackers.
|
| CVE-2017-4992 |
|
Privilege Escalation in privilege-escalation (CVE-2017-4992)
vulnerability in privilege-escalation (CVE-2017-4992). Successful exploitation can lead to full system takeover.
|
| CVE-2017-4991 |
|
Privilege Escalation in cloudfoundry (CVE-2017-4991)
vulnerability in cloudfoundry (CVE-2017-4991). Successful exploitation can lead to full system takeover.
|
| CVE-2017-4974 |
|
SQL Injection in sqli (CVE-2017-4974)
SQL injection in sqli (CVE-2017-4974). Confidential information can be exposed externally.
|
| CVE-2017-4972 |
|
SQL Injection in sqli (CVE-2017-4972)
SQL injection in sqli (CVE-2017-4972). Confidential information can be exposed externally.
|
| CVE-2017-4963 |
|
Vulnerability in pivotal-software (CVE-2017-4963)
vulnerability in pivotal-software (CVE-2017-4963). Successful exploitation can lead to full system takeover.
|
| CVE-2016-3084 |
|
Vulnerability in cloudfoundry (CVE-2016-3084)
vulnerability in cloudfoundry (CVE-2016-3084). Successful exploitation can lead to full system takeover.
|
| CVE-2016-0781 |
|
Cross-Site Scripting (XSS) in cloudfoundry (CVE-2016-0781)
cross-site scripting in cloudfoundry (CVE-2016-0781). Risk of unauthorized operations or information disclosure.
|
| CVE-2015-3191 |
|
Cross-Site Request Forgery (CSRF) in csrf (CVE-2015-3191)
vulnerability in csrf (CVE-2015-3191). Successful exploitation can lead to full system takeover.
|
| CVE-2015-3190 |
|
Open Redirect in cloudfoundry (CVE-2015-3190)
vulnerability in cloudfoundry (CVE-2015-3190). Risk of unauthorized operations or information disclosure.
|
| CVE-2015-3189 |
|
Vulnerability in cloudfoundry (CVE-2015-3189)
vulnerability in cloudfoundry (CVE-2015-3189). Risk of unauthorized operations or information disclosure.
|
| CVE-2016-5016 |
|
Vulnerability in pivotal-software (CVE-2016-5016)
vulnerability in pivotal-software (CVE-2016-5016). Data can be tampered with by attackers.
|
| CVE-2016-4468 |
|
SQL Injection in sqli (CVE-2016-4468)
SQL injection in sqli (CVE-2016-4468). Successful exploitation can lead to full system takeover.
|
| CVE-2017-4960 |
|
Vulnerability in dos (CVE-2017-4960)
vulnerability in dos (CVE-2017-4960). Risk of unauthorized operations or information disclosure.
|