Advanced Vulnerability Search
CVE-2023-36584
Known Exploited Vulnerability
Windows Mark of the Web Security Feature Bypass Vulnerability
Max Base Score
5.4
Published
2023-10-10
Updated
2023-10-13
EPSS
0.15%
KEV Added
2023-11-16
CVE-2023-1671
Known Exploited Vulnerability
A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code.
Max Base Score
9.8
Published
2023-04-04
Updated
2023-04-26
EPSS
95.05%
KEV Added
2023-11-16
CVE-2020-2551
Known Exploited Vulnerability
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Max Base Score
9.8
Published
2020-01-15
Updated
2022-10-25
EPSS
97.50%
KEV Added
2023-11-16
CVE-2023-36036
Known Exploited Vulnerability
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Max Base Score
7.8
Published
2023-11-14
Updated
2023-11-20
EPSS
0.04%
KEV Added
2023-11-14
CVE-2023-36033
Known Exploited Vulnerability
Windows DWM Core Library Elevation of Privilege Vulnerability
Max Base Score
7.8
Published
2023-11-14
Updated
2023-11-20
EPSS
0.04%
KEV Added
2023-11-14
CVE-2023-36025
Known Exploited Vulnerability
Windows SmartScreen Security Feature Bypass Vulnerability
Max Base Score
8.8
Published
2023-11-14
Updated
2023-11-21
EPSS
0.79%
KEV Added
2023-11-14
CVE-2023-47246
Known Exploited Vulnerability
In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.
Max Base Score
9.8
Published
2023-11-10
Updated
2023-11-13
EPSS
66.80%
KEV Added
2023-11-13
CVE-2023-36851
Known Exploited Vulnerability
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.
With a specific request to
webauth_operation.php
that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of
integrity
for a certain part of the file system, which may allow chaining to other vulnerabilities.
This issue affects Juniper Networks Junos OS on SRX Series:
* 22.4 versions prior to 22,4R2-S2, 22.4R3;
* 23.2 versions prior to 23.2R2.
Max Base Score
5.3
Published
2023-09-27
Updated
2023-09-28
EPSS
0.44%
KEV Added
2023-11-13
CVE-2023-36847
Known Exploited Vulnerability
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.
With a specific request to installAppPackage.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of
integrity
for a certain
part of the file system, which may allow chaining to other vulnerabilities.
This issue affects Juniper Networks Junos OS on EX Series:
* All versions prior to 20.4R3-S8;
* 21.1 versions 21.1R1 and later;
* 21.2 versions prior to 21.2R3-S6;
* 21.3 versions
prior to
21.3R3-S5;
* 21.4 versions
prior to
21.4R3-S4;
* 22.1 versions
prior to
22.1R3-S3;
* 22.2 versions
prior to
22.2R3-S1;
* 22.3 versions
prior to
22.3R2-S2, 22.3R3;
* 22.4 versions
prior to
22.4R2-S1, 22.4R3.
Max Base Score
5.3
Published
2023-08-17
Updated
2023-09-27
EPSS
1.71%
KEV Added
2023-11-13
CVE-2023-36846
Known Exploited Vulnerability
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.
With a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of
integrity
for a certain
part of the file system, which may allow chaining to other vulnerabilities.
This issue affects Juniper Networks Junos OS on SRX Series:
* All versions prior to 20.4R3-S8;
* 21.1 versions 21.1R1 and later;
* 21.2 versions prior to 21.2R3-S6;
* 21.3 versions
prior to
21.3R3-S5;
* 21.4 versions
prior to
21.4R3-S5;
* 22.1 versions
prior to
22.1R3-S3;
* 22.2 versions
prior to
22.2R3-S2;
* 22.3 versions
prior to
22.3R2-S2, 22.3R3;
* 22.4 versions
prior to
22.4R2-S1, 22.4R3.
Max Base Score
5.3
Published
2023-08-17
Updated
2023-09-27
EPSS
1.71%
KEV Added
2023-11-13
CVE-2023-36845
Public exploit exists
Known Exploited Vulnerability
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series
and SRX Series
allows an unauthenticated, network-based attacker to remotely execute code.
Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code.
This issue affects Juniper Networks Junos OS on EX Series
and
SRX Series:
* All versions prior to
20.4R3-S9;
* 21.1 versions 21.1R1 and later;
* 21.2 versions prior to 21.2R3-S7;
* 21.3 versions prior to 21.3R3-S5;
* 21.4 versions prior to 21.4R3-S5;
* 22.1 versions
prior to
22.1R3-S4;
* 22.2 versions
prior to
22.2R3-S2;
* 22.3 versions
prior to
22.3R2-S2, 22.3R3-S1;
* 22.4 versions
prior to
22.4R2-S1, 22.4R3;
* 23.2 versions prior to 23.2R1-S1, 23.2R2.
Max Base Score
9.8
Published
2023-08-17
Updated
2023-10-02
EPSS
69.31%
KEV Added
2023-11-13
CVE-2023-36844
Known Exploited Vulnerability
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables.
Using a crafted request an attacker is able to modify
certain PHP environment variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities.
This issue affects Juniper Networks Junos OS on EX Series:
* All versions prior to 20.4R3-S9;
* 21.1 versions 21.1R1 and later;
* 21.2 versions prior to 21.2R3-S7;
* 21.3 versions
prior to
21.3R3-S5;
* 21.4 versions
prior to
21.4R3-S5;
* 22.1 versions
prior to
22.1R3-S4;
* 22.2 versions
prior to
22.2R3-S2;
* 22.3 versions
prior to 22.3R3-S1;
* 22.4 versions
prior to
22.4R2-S2, 22.4R3;
* 23.2 versions prior to
23.2R1-S1, 23.2R2.
Max Base Score
5.3
Published
2023-08-17
Updated
2023-10-02
EPSS
21.22%
KEV Added
2023-11-13