Advanced Vulnerability Search
CVE-2023-36802
Known Exploited Vulnerability
Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability
Max Base Score | 7.8 |
Published | 2023-09-12 |
Updated | 2023-09-14 |
EPSS | 0.04% |
KEV Added | 2023-09-12 |
CVE-2023-36761
Known Exploited Vulnerability
Microsoft Word Information Disclosure Vulnerability
Max Base Score | 6.2 |
Published | 2023-09-12 |
Updated | 2023-09-14 |
EPSS | 57.13% |
KEV Added | 2023-09-12 |
CVE-2023-35674
Known Exploited Vulnerability
In onCreate of WindowState.java, there is a possible way to launch a background activity due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Max Base Score | 7.8 |
Published | 2023-09-11 |
Updated | 2023-09-14 |
EPSS | 0.06% |
KEV Added | 2023-09-13 |
CVE-2023-28434
Known Exploited Vulnerability
Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`.
Max Base Score | 8.8 |
Published | 2023-03-22 |
Updated | 2023-03-28 |
EPSS | 3.08% |
KEV Added | 2023-09-19 |
CVE-2023-26369
Known Exploited Vulnerability
Acrobat Reader versions 23.003.20284 (and earlier), 20.005.30516 (and earlier) and 20.005.30514 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Max Base Score | 7.8 |
Published | 2023-09-13 |
Updated | 2023-09-15 |
EPSS | 3.50% |
KEV Added | 2023-09-14 |
CVE-2023-20269
Known Exploited Vulnerability
A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user.
This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following:
Identify valid credentials that could then be used to establish an unauthorized remote access VPN session.
Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier).
Notes:
Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured.
This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured.
Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability.
Max Base Score | 9.1 |
Published | 2023-09-06 |
Updated | 2023-09-14 |
EPSS | 2.59% |
KEV Added | 2023-09-13 |
CVE-2023-4863
Known Exploited Vulnerability
Heap buffer overflow in WebP in Google Chrome prior to 116.0.5845.187 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
Max Base Score | 8.8 |
Published | 2023-09-12 |
Updated | 2023-09-22 |
EPSS | 21.43% |
KEV Added | 2023-09-13 |
CVE-2022-31463
Known Exploited Vulnerability
Owl Labs Meeting Owl 5.2.0.15 does not require a password for Bluetooth commands, because only client-side authentication is used.
Max Base Score | 8.2 |
Published | 2022-06-02 |
Updated | 2022-07-08 |
EPSS | 8.09% |
KEV Added | 2023-09-18 |
CVE-2022-31462
Known Exploited Vulnerability
Owl Labs Meeting Owl 5.2.0.15 allows attackers to control the device via a backdoor password (derived from the serial number) that can be found in Bluetooth broadcast data.
Max Base Score | 9.3 |
Published | 2022-06-02 |
Updated | 2022-07-08 |
EPSS | 0.61% |
KEV Added | 2023-09-18 |
CVE-2022-31461
Known Exploited Vulnerability
Owl Labs Meeting Owl 5.2.0.15 allows attackers to deactivate the passcode protection mechanism via a certain c 11 message.
Max Base Score | 7.4 |
Published | 2022-06-02 |
Updated | 2022-08-29 |
EPSS | 5.83% |
KEV Added | 2023-09-18 |
CVE-2022-31459
Known Exploited Vulnerability
Owl Labs Meeting Owl 5.2.0.15 allows attackers to retrieve the passcode hash via a certain c 10 value over Bluetooth.
Max Base Score | 7.4 |
Published | 2022-06-02 |
Updated | 2022-07-08 |
EPSS | 5.10% |
KEV Added | 2023-09-18 |
CVE-2022-22265
Known Exploited Vulnerability
An improper check or handling of exceptional conditions in NPU driver prior to SMR Jan-2022 Release 1 allows arbitrary memory write and code execution.
Max Base Score | 7.8 |
Published | 2022-01-10 |
Updated | 2023-06-27 |
EPSS | 0.07% |
KEV Added | 2023-09-18 |
CVE-2021-3129
Public exploit exists
Known Exploited Vulnerability
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
Max Base Score | 9.8 |
Published | 2021-01-12 |
Updated | 2022-02-22 |
EPSS | 97.52% |
KEV Added | 2023-09-18 |
CVE-2017-6884
Known Exploited Vulnerability
A command injection vulnerability was discovered on the Zyxel EMG2926 home router with firmware V1.00(AAQT.4)b8. The vulnerability is located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute arbitrary commands on the router, such as the ping_ip parameter to the expert/maintenance/diagnostic/nslookup URI.
Max Base Score | 9.0 |
Published | 2017-04-06 |
Updated | 2017-04-12 |
EPSS | 97.38% |
KEV Added | 2023-09-18 |
CVE-2014-8361
Public exploit exists
Known Exploited Vulnerability
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.
Max Base Score | 10.0 |
Published | 2015-05-01 |
Updated | 2023-09-05 |
EPSS | 97.09% |
KEV Added | 2023-09-18 |