Advanced Vulnerability Search

CVE-2023-36584

Known Exploited Vulnerability
Windows Mark of the Web Security Feature Bypass Vulnerability
Max Base Score
5.4
Published
2023-10-10
Updated
2023-10-13
EPSS
0.15%
KEV Added
2023-11-16

CVE-2023-1671

Known Exploited Vulnerability
A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code.
Max Base Score
9.8
Published
2023-04-04
Updated
2023-04-26
EPSS
95.05%
KEV Added
2023-11-16

CVE-2020-2551

Known Exploited Vulnerability
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Max Base Score
9.8
Published
2020-01-15
Updated
2022-10-25
EPSS
97.50%
KEV Added
2023-11-16

CVE-2023-36036

Known Exploited Vulnerability
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Max Base Score
7.8
Published
2023-11-14
Updated
2023-11-20
EPSS
0.04%
KEV Added
2023-11-14

CVE-2023-36033

Known Exploited Vulnerability
Windows DWM Core Library Elevation of Privilege Vulnerability
Max Base Score
7.8
Published
2023-11-14
Updated
2023-11-20
EPSS
0.04%
KEV Added
2023-11-14

CVE-2023-36025

Known Exploited Vulnerability
Windows SmartScreen Security Feature Bypass Vulnerability
Max Base Score
8.8
Published
2023-11-14
Updated
2023-11-21
EPSS
0.79%
KEV Added
2023-11-14

CVE-2023-47246

Known Exploited Vulnerability
In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.
Max Base Score
9.8
Published
2023-11-10
Updated
2023-11-13
EPSS
66.80%
KEV Added
2023-11-13

CVE-2023-36851

Known Exploited Vulnerability
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * 22.4 versions prior to 22,4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R2.
Max Base Score
5.3
Published
2023-09-27
Updated
2023-09-28
EPSS
0.44%
KEV Added
2023-11-13

CVE-2023-36847

Known Exploited Vulnerability
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to installAppPackage.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on EX Series: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S4; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S1; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3.
Max Base Score
5.3
Published
2023-08-17
Updated
2023-09-27
EPSS
1.71%
KEV Added
2023-11-13

CVE-2023-36846

Known Exploited Vulnerability
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain  part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3.
Max Base Score
5.3
Published
2023-08-17
Updated
2023-09-27
EPSS
1.71%
KEV Added
2023-11-13

CVE-2023-36845

Public exploit exists
Known Exploited Vulnerability
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.
Max Base Score
9.8
Published
2023-08-17
Updated
2023-10-02
EPSS
69.31%
KEV Added
2023-11-13

CVE-2023-36844

Known Exploited Vulnerability
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on EX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R3-S1; * 22.4 versions prior to 22.4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.
Max Base Score
5.3
Published
2023-08-17
Updated
2023-10-02
EPSS
21.22%
KEV Added
2023-11-13
Toggle Search Form
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!