Advanced Vulnerability Search

CVE-2023-36584

Known Exploited Vulnerability
Windows Mark of the Web Security Feature Bypass Vulnerability
Max Base Score
5.4
Published
2023-10-10
Updated
2023-10-13
EPSS
0.15%
KEV Added
2023-11-16

CVE-2023-1671

Known Exploited Vulnerability
A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code.
Max Base Score
9.8
Published
2023-04-04
Updated
2023-04-26
EPSS
95.05%
KEV Added
2023-11-16

CVE-2020-2551

Known Exploited Vulnerability
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Max Base Score
9.8
Published
2020-01-15
Updated
2022-10-25
EPSS
97.50%
KEV Added
2023-11-16

CVE-2023-36036

Known Exploited Vulnerability
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Max Base Score
7.8
Published
2023-11-14
Updated
2023-11-20
EPSS
0.04%
KEV Added
2023-11-14

CVE-2023-36033

Known Exploited Vulnerability
Windows DWM Core Library Elevation of Privilege Vulnerability
Max Base Score
7.8
Published
2023-11-14
Updated
2023-11-20
EPSS
0.04%
KEV Added
2023-11-14

CVE-2023-36025

Known Exploited Vulnerability
Windows SmartScreen Security Feature Bypass Vulnerability
Max Base Score
8.8
Published
2023-11-14
Updated
2023-11-21
EPSS
0.79%
KEV Added
2023-11-14

CVE-2023-47246

Known Exploited Vulnerability
In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.
Max Base Score
9.8
Published
2023-11-10
Updated
2023-11-13
EPSS
66.80%
KEV Added
2023-11-13

CVE-2023-36851

Known Exploited Vulnerability
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * 22.4 versions prior to 22,4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R2.
Max Base Score
5.3
Published
2023-09-27
Updated
2023-09-28
EPSS
0.44%
KEV Added
2023-11-13

CVE-2023-36847

Known Exploited Vulnerability
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to installAppPackage.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on EX Series: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S4; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S1; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3.
Max Base Score
5.3
Published
2023-08-17
Updated
2023-09-27
EPSS
1.71%
KEV Added
2023-11-13

CVE-2023-36846

Known Exploited Vulnerability
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain  part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3.
Max Base Score
5.3
Published
2023-08-17
Updated
2023-09-27
EPSS
1.71%
KEV Added
2023-11-13

CVE-2023-36845

Public exploit exists
Known Exploited Vulnerability
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.
Max Base Score
9.8
Published
2023-08-17
Updated
2023-10-02
EPSS
69.31%
KEV Added
2023-11-13

CVE-2023-36844

Known Exploited Vulnerability
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on EX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R3-S1; * 22.4 versions prior to 22.4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.
Max Base Score
5.3
Published
2023-08-17
Updated
2023-10-02
EPSS
21.22%
KEV Added
2023-11-13

CVE-2023-29552

Known Exploited Vulnerability
The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.
Max Base Score
7.5
Published
2023-04-25
Updated
2023-05-04
EPSS
4.34%
KEV Added
2023-11-08

CVE-2023-22518

Known Exploited Vulnerability
All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability.  Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
Max Base Score
10.0
Published
2023-10-31
Updated
2023-11-08
EPSS
96.76%
KEV Added
2023-11-07

CVE-2023-46604

Public exploit exists
Known Exploited Vulnerability
The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.
Max Base Score
10.0
Published
2023-10-27
Updated
2023-11-28
EPSS
96.81%
KEV Added
2023-11-02

CVE-2023-46748

Known Exploited Vulnerability
An authenticated SQL injection vulnerability exists in the BIG-IP Configuration utility which may allow an authenticated attacker with network access to the Configuration utility through the BIG-IP management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Max Base Score
8.8
Published
2023-10-26
Updated
2023-11-16
EPSS
1.60%
KEV Added
2023-10-31

CVE-2023-46747

Public exploit exists
Known Exploited Vulnerability
Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Max Base Score
9.8
Published
2023-10-26
Updated
2023-11-16
EPSS
96.55%
KEV Added
2023-10-31

CVE-2023-5631

Known Exploited Vulnerability
Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.
Max Base Score
6.1
Published
2023-10-18
Updated
2023-11-17
EPSS
0.99%
KEV Added
2023-10-26

CVE-2023-20273

Public exploit exists
Known Exploited Vulnerability
A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands with the privileges of root. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
Max Base Score
7.2
Published
2023-10-25
Updated
2023-11-15
EPSS
6.02%
KEV Added
2023-10-23
Toggle Search Form
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!