ID | Name | Product | Family | Published | Updated | Severity |
---|---|---|---|---|---|---|
112967 | WordPress 5.2.x < 5.2.12 Multiple Vulnerabilities | Web App Scanning | Component Vulnerability | 9/10/2021 | 3/14/2023 | high |
112968 | WordPress 5.4.x < 5.4.7 Multiple Vulnerabilities | Web App Scanning | Component Vulnerability | 9/10/2021 | 3/14/2023 | high |
112969 | WordPress 5.5.x < 5.5.6 Multiple Vulnerabilities | Web App Scanning | Component Vulnerability | 9/10/2021 | 3/14/2023 | high |
112972 | WordPress 5.8.x < 5.8.1 Multiple Vulnerabilities | Web App Scanning | Component Vulnerability | 9/10/2021 | 3/14/2023 | high |
113006 | Lodash < 4.17.21 Multiple Vulnerabilities | Web App Scanning | Component Vulnerability | 10/4/2021 | 3/14/2023 | high |
112970 | WordPress 5.6.x < 5.6.5 Multiple Vulnerabilities | Web App Scanning | Component Vulnerability | 9/10/2021 | 3/14/2023 | high |
112971 | WordPress 5.7.x < 5.7.3 Multiple Vulnerabilities | Web App Scanning | Component Vulnerability | 9/10/2021 | 3/14/2023 | high |
165119 | RHEL 8 : Red Hat Virtualization Host security update [ovirt-4.4.8] (Moderate) (RHSA-2021:3459) | Nessus | Red Hat Local Security Checks | 9/15/2022 | 11/7/2024 | high |
153173 | WordPress 5.8 < 5.8.1 / 5.7 < 5.7.3 / 5.6 < 5.6.5 / 5.5 < 5.5.6 / 5.4 < 5.4.7 / 5.2 < 5.2.12 | Nessus | CGI abuses | 9/9/2021 | 6/6/2024 | high |
184223 | F5 Networks BIG-IP : Appliance mode authenticated F5 BIG-IP Guided Configuration third-party lodash and jQuery vulnerabilities (K12492858) | Nessus | F5 Networks Local Security Checks | 11/2/2023 | 1/4/2024 | high |
150124 | RHEL 8 : RHV Manager security update (ovirt-engine) [ovirt-4.4.6] (Moderate) (RHSA-2021:2179) | Nessus | Red Hat Local Security Checks | 6/1/2021 | 11/7/2024 | high |