cveID stringlengths 13 16 | vendorProject stringclasses 187
values | product stringlengths 2 179 | vulnerabilityName stringlengths 30 136 | dateAdded stringclasses 232
values | shortDescription stringlengths 55 567 | requiredAction stringclasses 28
values | dueDate stringlengths 10 10 | knownRansomwareCampaignUse stringclasses 2
values | notes stringlengths 46 505 | cwes stringclasses 185
values |
|---|---|---|---|---|---|---|---|---|---|---|
CVE-2024-4040 | CrushFTP | CrushFTP | CrushFTP VFS Sandbox Escape Vulnerability | 2024-04-24 | CrushFTP contains an unspecified sandbox escape vulnerability that allows a remote attacker to escape the CrushFTP virtual file system (VFS). | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-05-01 | Unknown | https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update&version=34; https://nvd.nist.gov/vuln/detail/CVE-2024-4040 | CWE-1336 |
CVE-2024-20359 | Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) | Cisco ASA and FTD Privilege Escalation Vulnerability | 2024-04-24 | Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain a privilege escalation vulnerability that can allow local privilege escalation from Administrator to root. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-05-01 | Unknown | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h; https://nvd.nist.gov/vuln/detail/CVE-2024-20359 | CWE-94 |
CVE-2024-20353 | Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) | Cisco ASA and FTD Denial of Service Vulnerability | 2024-04-24 | Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an infinite loop vulnerability that can lead to remote denial of service condition. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-05-01 | Unknown | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-websrvs-dos-X8gNucD2; https://nvd.nist.gov/vuln/detail/CVE-2024-20353 | CWE-835 |
CVE-2022-38028 | Microsoft | Windows | Microsoft Windows Print Spooler Privilege Escalation Vulnerability | 2024-04-23 | Microsoft Windows Print Spooler service contains a privilege escalation vulnerability. An attacker may modify a JavaScript constraints file and execute it with SYSTEM-level permissions. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-05-14 | Unknown | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38028; https://nvd.nist.gov/vuln/detail/CVE-2022-38028 | null |
CVE-2024-3400 | Palo Alto Networks | PAN-OS | Palo Alto Networks PAN-OS Command Injection Vulnerability | 2024-04-12 | Palo Alto Networks PAN-OS GlobalProtect feature contains a command injection vulnerability that allows an unauthenticated attacker to execute commands with root privileges on the firewall. | Apply mitigations per vendor instructions as they become available. Otherwise, users with vulnerable versions of affected devices should enable Threat Prevention IDs available from the vendor. See the vendor bulletin for more details and a patch release schedule. | 2024-04-19 | Unknown | https://security.paloaltonetworks.com/CVE-2024-3400 ; https://nvd.nist.gov/vuln/detail/CVE-2024-3400 | CWE-20, CWE-77 |
CVE-2024-3273 | D-Link | Multiple NAS Devices | D-Link Multiple NAS Devices Command Injection Vulnerability | 2024-04-11 | D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contain a command injection vulnerability. When combined with CVE-2024-3272, this can lead to remote, unauthorized code execution. | This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions. | 2024-05-02 | Unknown | https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383; https://nvd.nist.gov/vuln/detail/CVE-2024-3273 | CWE-77 |
CVE-2024-3272 | D-Link | Multiple NAS Devices | D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability | 2024-04-11 | D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contains a hard-coded credential that allows an attacker to conduct authenticated command injection, leading to remote, unauthorized code execution. | This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions. | 2024-05-02 | Unknown | https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383; https://nvd.nist.gov/vuln/detail/CVE-2024-3272 | CWE-798 |
CVE-2024-29748 | Android | Pixel | Android Pixel Privilege Escalation Vulnerability | 2024-04-04 | Android Pixel contains a privilege escalation vulnerability that allows an attacker to interrupt a factory reset triggered by a device admin app. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-04-25 | Unknown | https://source.android.com/docs/security/bulletin/pixel/2024-04-01; https://nvd.nist.gov/vuln/detail/CVE-2024-29748 | CWE-280 |
CVE-2024-29745 | Android | Pixel | Android Pixel Information Disclosure Vulnerability | 2024-04-04 | Android Pixel contains an information disclosure vulnerability in the fastboot firmware used to support unlocking, flashing, and locking affected devices. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-04-25 | Unknown | https://source.android.com/docs/security/bulletin/pixel/2024-04-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-29745 | CWE-908 |
CVE-2023-24955 | Microsoft | SharePoint Server | Microsoft SharePoint Server Code Injection Vulnerability | 2024-03-26 | Microsoft SharePoint Server contains a code injection vulnerability that allows an authenticated attacker with Site Owner privileges to execute code remotely. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-04-16 | Known | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24955; https://nvd.nist.gov/vuln/detail/CVE-2023-24955 | CWE-94 |
CVE-2019-7256 | Nice | Linear eMerge E3-Series | Nice Linear eMerge E3-Series OS Command Injection Vulnerability | 2024-03-25 | Nice Linear eMerge E3-Series contains an OS command injection vulnerability that allows an attacker to conduct remote code execution. | Contact the vendor for guidance on remediating firmware, per their advisory. | 2024-04-15 | Unknown | https://linear-solutions.com/wp-content/uploads/E3-Bulletin-06-27-2023.pdf, https://www.cisa.gov/news-events/ics-advisories/icsa-24-065-01; https://nvd.nist.gov/vuln/detail/CVE-2019-7256 | CWE-78 |
CVE-2021-44529 | Ivanti | Endpoint Manager Cloud Service Appliance (EPM CSA) | Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) Code Injection Vulnerability | 2024-03-25 | Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) contains a code injection vulnerability that allows an unauthenticated user to execute malicious code with limited permissions (nobody). | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-04-15 | Unknown | https://forums.ivanti.com/s/article/SA-2021-12-02?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2021-44529 | CWE-94 |
CVE-2023-48788 | Fortinet | FortiClient EMS | Fortinet FortiClient EMS SQL Injection Vulnerability | 2024-03-25 | Fortinet FortiClient EMS contains a SQL injection vulnerability that allows an unauthenticated attacker to execute commands as SYSTEM via specifically crafted requests. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-04-15 | Known | https://www.fortiguard.com/psirt/FG-IR-24-007; https://nvd.nist.gov/vuln/detail/CVE-2023-48788 | CWE-89 |
CVE-2024-27198 | JetBrains | TeamCity | JetBrains TeamCity Authentication Bypass Vulnerability | 2024-03-07 | JetBrains TeamCity contains an authentication bypass vulnerability that allows an attacker to perform admin actions. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-03-28 | Known | https://www.jetbrains.com/help/teamcity/teamcity-2023-11-4-release-notes.html; https://nvd.nist.gov/vuln/detail/CVE-2024-27198 | CWE-288 |
CVE-2024-23225 | Apple | Multiple Products | Apple Multiple Products Memory Corruption Vulnerability | 2024-03-06 | Apple iOS, iPadOS, macOS, tvOS, watchOS, and visionOS kernel contain a memory corruption vulnerability that allows an attacker with arbitrary kernel read and write capability to bypass kernel memory protections. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-03-27 | Unknown | https://support.apple.com/en-us/HT214081, https://support.apple.com/en-us/HT214082, https://support.apple.com/en-us/HT214083, https://support.apple.com/en-us/HT214084, https://support.apple.com/en-us/HT214085, https://support.apple.com/en-us/HT214086, https://support.apple.com/en-us/HT214087, https://support.apple.com/... | CWE-787 |
CVE-2024-23296 | Apple | Multiple Products | Apple Multiple Products Memory Corruption Vulnerability | 2024-03-06 | Apple iOS, iPadOS, macOS, tvOS, and watchOS RTKit contain a memory corruption vulnerability that allows an attacker with arbitrary kernel read and write capability to bypass kernel memory protections. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-03-27 | Unknown | https://support.apple.com/en-us/HT214081, https://support.apple.com/en-us/HT214082, https://support.apple.com/en-us/HT214084, https://support.apple.com/en-us/HT214086, https://support.apple.com/en-us/HT214088 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23296 | CWE-787 |
CVE-2023-21237 | Android | Pixel | Android Pixel Information Disclosure Vulnerability | 2024-03-05 | Android Pixel contains a vulnerability in the Framework component, where the UI may be misleading or insufficient, providing a means to hide a foreground service notification. This could enable a local attacker to disclose sensitive information. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-03-26 | Unknown | https://source.android.com/docs/security/bulletin/pixel/2023-06-01; https://nvd.nist.gov/vuln/detail/CVE-2023-21237 | CWE-200 |
CVE-2021-36380 | Sunhillo | SureLine | Sunhillo SureLine OS Command Injection Vulnerablity | 2024-03-05 | Sunhillo SureLine contains an OS command injection vulnerability that allows an attacker to cause a denial-of-service or utilize the device for persistence on the network via shell metacharacters in ipAddr or dnsAddr in /cgi/networkDiag.cgi. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-03-26 | Unknown | https://www.sunhillo.com/fb011/; https://nvd.nist.gov/vuln/detail/CVE-2021-36380 | CWE-78 |
CVE-2024-21338 | Microsoft | Windows | Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability | 2024-03-04 | Microsoft Windows Kernel contains an exposed IOCTL with insufficient access control vulnerability within the IOCTL (input and output control) dispatcher in appid.sys that allows a local attacker to achieve privilege escalation. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-03-25 | Known | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21338; https://nvd.nist.gov/vuln/detail/CVE-2024-21338 | CWE-822 |
CVE-2023-29360 | Microsoft | Streaming Service | Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability | 2024-02-29 | Microsoft Streaming Service contains an untrusted pointer dereference vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-03-21 | Unknown | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29360 ;https://nvd.nist.gov/vuln/detail/CVE-2023-29360 | CWE-822 |
CVE-2024-1709 | ConnectWise | ScreenConnect | ConnectWise ScreenConnect Authentication Bypass Vulnerability | 2024-02-22 | ConnectWise ScreenConnect contains an authentication bypass vulnerability that allows an attacker with network access to the management interface to create a new, administrator-level account on affected devices. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-02-29 | Known | https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8; https://nvd.nist.gov/vuln/detail/CVE-2024-1709 | CWE-288 |
CVE-2020-3259 | Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) | Cisco ASA and FTD Information Disclosure Vulnerability | 2024-02-15 | Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an information disclosure vulnerability. An attacker could retrieve memory contents on an affected device, which could lead to the disclosure of confidential information due to a buffer tracking issue when the software parses invalid URL... | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-03-07 | Known | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-info-disclose-9eJtycMB; https://nvd.nist.gov/vuln/detail/CVE-2020-3259 | CWE-200 |
CVE-2024-21410 | Microsoft | Exchange Server | Microsoft Exchange Server Privilege Escalation Vulnerability | 2024-02-15 | Microsoft Exchange Server contains an unspecified vulnerability that allows for privilege escalation. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-03-07 | Unknown | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410; https://nvd.nist.gov/vuln/detail/CVE-2024-21410 | CWE-287 |
CVE-2024-21412 | Microsoft | Windows | Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability | 2024-02-13 | Microsoft Windows Internet Shortcut Files contains an unspecified vulnerability that allows for a security feature bypass. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-03-05 | Unknown | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21412; https://nvd.nist.gov/vuln/detail/CVE-2024-21412 | CWE-693 |
CVE-2024-21351 | Microsoft | Windows | Microsoft Windows SmartScreen Security Feature Bypass Vulnerability | 2024-02-13 | Microsoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience and inject code to potentially gain code execution, which could lead to some data exposure, lack of system availability, or both. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-03-05 | Unknown | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21351; https://nvd.nist.gov/vuln/detail/CVE-2024-21351 | CWE-94 |
CVE-2023-43770 | Roundcube | Webmail | Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability | 2024-02-12 | Roundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that can lead to information disclosure via malicious link references in plain/text messages. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-03-04 | Unknown | https://roundcube.net/news/2023/09/15/security-update-1.6.3-released ; https://nvd.nist.gov/vuln/detail/CVE-2023-43770 | CWE-79 |
CVE-2024-21762 | Fortinet | FortiOS | Fortinet FortiOS Out-of-Bound Write Vulnerability | 2024-02-09 | Fortinet FortiOS contains an out-of-bound write vulnerability that allows a remote unauthenticated attacker to execute code or commands via specially crafted HTTP requests. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-02-16 | Unknown | https://fortiguard.fortinet.com/psirt/FG-IR-24-015 ; https://nvd.nist.gov/vuln/detail/CVE-2024-21762 | CWE-787 |
CVE-2023-4762 | Google | Chromium V8 | Google Chromium V8 Type Confusion Vulnerability | 2024-02-06 | Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-02-27 | Unknown | https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html; https://nvd.nist.gov/vuln/detail/CVE-2023-4762 | CWE-843 |
CVE-2022-48618 | Apple | Multiple Products | Apple Multiple Products Memory Corruption Vulnerability | 2024-01-31 | Apple iOS, iPadOS, macOS, tvOS, and watchOS contain a time-of-check/time-of-use (TOCTOU) memory corruption vulnerability that allows an attacker with read and write capabilities to bypass Pointer Authentication. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-02-21 | Unknown | https://support.apple.com/en-us/HT213530, https://support.apple.com/en-us/HT213532, https://support.apple.com/en-us/HT213535, https://support.apple.com/en-us/HT213536; https://nvd.nist.gov/vuln/detail/CVE-2022-48618 | CWE-367 |
CVE-2024-21893 | Ivanti | Connect Secure, Policy Secure, and Neurons | Ivanti Connect Secure, Policy Secure, and Neurons Server-Side Request Forgery (SSRF) Vulnerability | 2024-01-31 | Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure), Ivanti Policy Secure, and Ivanti Neurons contain a server-side request forgery (SSRF) vulnerability in the SAML component that allows an attacker to access certain restricted resources without authentication. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-02-02 | Unknown | https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2024-21893 | CWE-918 |
CVE-2023-22527 | Atlassian | Confluence Data Center and Server | Atlassian Confluence Data Center and Server Template Injection Vulnerability | 2024-01-24 | Atlassian Confluence Data Center and Server contain an unauthenticated OGNL template injection vulnerability that can lead to remote code execution. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-02-14 | Known | https://confluence.atlassian.com/security/cve-2023-22527-rce-remote-code-execution-vulnerability-in-confluence-data-center-and-confluence-server-1333990257.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22527 | CWE-74 |
CVE-2024-23222 | Apple | Multiple Products | Apple Multiple Products WebKit Type Confusion Vulnerability | 2024-01-23 | Apple iOS, iPadOS, macOS, tvOS, and Safari WebKit contain a type confusion vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for H... | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-02-13 | Unknown | https://support.apple.com/en-us/HT214055, https://support.apple.com/en-us/HT214056, https://support.apple.com/en-us/HT214057, https://support.apple.com/en-us/HT214058, https://support.apple.com/en-us/HT214059, https://support.apple.com/en-us/HT214061, https://support.apple.com/en-us/HT214063 ; https://nvd.nist.gov/vu... | CWE-843 |
CVE-2023-34048 | VMware | vCenter Server | VMware vCenter Server Out-of-Bounds Write Vulnerability | 2024-01-22 | VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol that allows an attacker to conduct remote code execution. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-02-12 | Unknown | https://www.vmware.com/security/advisories/VMSA-2023-0023.html; https://nvd.nist.gov/vuln/detail/CVE-2023-34048 | CWE-787 |
CVE-2023-35082 | Ivanti | Endpoint Manager Mobile (EPMM) and MobileIron Core | Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core Authentication Bypass Vulnerability | 2024-01-18 | Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core contain an authentication bypass vulnerability that allows unauthorized users to access restricted functionality or resources of the application. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-02-08 | Known | https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older; https://nvd.nist.gov/vuln/detail/CVE-2023-35082 | CWE-287 |
CVE-2024-0519 | Google | Chromium V8 | Google Chromium V8 Out-of-Bounds Memory Access Vulnerability | 2024-01-17 | Google Chromium V8 Engine contains an out-of-bounds memory access vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Ope... | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-02-07 | Unknown | https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html; https://nvd.nist.gov/vuln/detail/CVE-2024-0519 | CWE-787 |
CVE-2023-6549 | Citrix | NetScaler ADC and NetScaler Gateway | Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability | 2024-01-17 | Citrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for a denial-of-service when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-02-07 | Unknown | https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549; https://nvd.nist.gov/vuln/detail/CVE-2023-6549 | CWE-119 |
CVE-2023-6548 | Citrix | NetScaler ADC and NetScaler Gateway | Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability | 2024-01-17 | Citrix NetScaler ADC and NetScaler Gateway contain a code injection vulnerability that allows for authenticated remote code execution on the management interface with access to NSIP, CLIP, or SNIP. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-01-24 | Unknown | https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549; https://nvd.nist.gov/vuln/detail/CVE-2023-6548 | CWE-94 |
CVE-2018-15133 | Laravel | Laravel Framework | Laravel Deserialization of Untrusted Data Vulnerability | 2024-01-16 | Laravel Framework contains a deserialization of untrusted data vulnerability, allowing for remote command execution. This vulnerability may only be exploited if a malicious user has accessed the application encryption key (APP_KEY environment variable). | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-02-06 | Unknown | https://laravel.com/docs/5.6/upgrade#upgrade-5.6.30; https://nvd.nist.gov/vuln/detail/CVE-2018-15133 | CWE-502 |
CVE-2023-29357 | Microsoft | SharePoint Server | Microsoft SharePoint Server Privilege Escalation Vulnerability | 2024-01-10 | Microsoft SharePoint Server contains an unspecified vulnerability that allows an unauthenticated attacker, who has gained access to spoofed JWT authentication tokens, to use them for executing a network attack. This attack bypasses authentication, enabling the attacker to gain administrator privileges. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-01-31 | Known | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29357; https://nvd.nist.gov/vuln/detail/CVE-2023-29357 | CWE-303 |
CVE-2023-46805 | Ivanti | Connect Secure and Policy Secure | Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability | 2024-01-10 | Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure gateways contain an authentication bypass vulnerability in the web component that allows an attacker to access restricted resources by bypassing control checks. This vulnerability can be leveraged in conjunction with CVE-2024-2... | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-01-22 | Unknown | Please apply mitigations per vendor instructions. For more information, please see: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-46805 | CWE-287 |
CVE-2024-21887 | Ivanti | Connect Secure and Policy Secure | Ivanti Connect Secure and Policy Secure Command Injection Vulnerability | 2024-01-10 | Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure contain a command injection vulnerability in the web components of these products, which can allow an authenticated administrator to send crafted requests to execute code on affected appliances. This vulnerability can be levera... | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-01-22 | Unknown | Please apply mitigations per vendor instructions. For more information, please see: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2024-21887 | CWE-77 |
CVE-2023-23752 | Joomla! | Joomla! | Joomla! Improper Access Control Vulnerability | 2024-01-08 | Joomla! contains an improper access control vulnerability that allows unauthorized access to webservice endpoints. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-01-29 | Unknown | https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html; https://nvd.nist.gov/vuln/detail/CVE-2023-23752 | CWE-284 |
CVE-2016-20017 | D-Link | DSL-2750B Devices | D-Link DSL-2750B Devices Command Injection Vulnerability | 2024-01-08 | D-Link DSL-2750B devices contain a command injection vulnerability that allows remote, unauthenticated command injection via the login.cgi cli parameter. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-01-29 | Unknown | https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10088; https://nvd.nist.gov/vuln/detail/CVE-2016-20017 | CWE-77 |
CVE-2023-41990 | Apple | Multiple Products | Apple Multiple Products Code Execution Vulnerability | 2024-01-08 | Apple iOS, iPadOS, macOS, tvOS, and watchOS contain an unspecified vulnerability that allows for code execution when processing a font file. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-01-29 | Unknown | https://support.apple.com/en-us/HT213599, https://support.apple.com/en-us/HT213601, https://support.apple.com/en-us/HT213605, https://support.apple.com/en-us/HT213606, https://support.apple.com/en-us/HT213842, https://support.apple.com/en-us/HT213844, https://support.apple.com/en-us/HT213845 ; https://nvd.nist.gov/vul... | null |
CVE-2023-27524 | Apache | Superset | Apache Superset Insecure Default Initialization of Resource Vulnerability | 2024-01-08 | Apache Superset contains an insecure default initialization of a resource vulnerability that allows an attacker to authenticate and access unauthorized resources on installations that have not altered the default configured SECRET_KEY according to installation instructions. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-01-29 | Unknown | https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk; https://nvd.nist.gov/vuln/detail/CVE-2023-27524 | CWE-1188 |
CVE-2023-29300 | Adobe | ColdFusion | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | 2024-01-08 | Adobe ColdFusion contains a deserialization of untrusted data vulnerability that allows for code execution. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-01-29 | Known | https://helpx.adobe.com/security/products/coldfusion/apsb23-40.html; https://nvd.nist.gov/vuln/detail/CVE-2023-29300 | CWE-502 |
CVE-2023-38203 | Adobe | ColdFusion | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | 2024-01-08 | Adobe ColdFusion contains a deserialization of untrusted data vulnerability that allows for code execution. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-01-29 | Known | https://helpx.adobe.com/security/products/coldfusion/apsb23-41.html ; https://nvd.nist.gov/vuln/detail/CVE-2023-38203 | CWE-502 |
CVE-2023-7101 | Spreadsheet::ParseExcel | Spreadsheet::ParseExcel | Spreadsheet::ParseExcel Remote Code Execution Vulnerability | 2024-01-02 | Spreadsheet::ParseExcel contains a remote code execution vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings within the Excel parsing logic. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-01-23 | Unknown | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://metacpan.org/dist/Spreadsheet-ParseExcel and Barracuda's specific implementation and ... | CWE-95 |
CVE-2023-7024 | Google | Chromium WebRTC | Google Chromium WebRTC Heap Buffer Overflow Vulnerability | 2024-01-02 | Google Chromium WebRTC, an open-source project providing web browsers with real-time communication, contains a heap buffer overflow vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could impact web browsers using WebRTC, including but not lim... | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-01-23 | Unknown | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html; htt... | CWE-787 |
CVE-2023-49897 | FXC | AE1021, AE1021PE | FXC AE1021, AE1021PE OS Command Injection Vulnerability | 2023-12-21 | FXC AE1021 and AE1021PE contain an OS command injection vulnerability that allows authenticated users to execute commands via a network. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-01-11 | Unknown | https://www.fxc.jp/news/20231206 ; https://nvd.nist.gov/vuln/detail/CVE-2023-49897 | CWE-78 |
CVE-2023-47565 | QNAP | VioStor NVR | QNAP VioStor NVR OS Command Injection Vulnerability | 2023-12-21 | QNAP VioStar NVR contains an OS command injection vulnerability that allows authenticated users to execute commands via a network. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2024-01-11 | Unknown | https://www.qnap.com/en/security-advisory/qsa-23-48 ; https://nvd.nist.gov/vuln/detail/CVE-2023-47565 | CWE-78 |
CVE-2023-6448 | Unitronics | Vision PLC and HMI | Unitronics Vision PLC and HMI Insecure Default Password Vulnerability | 2023-12-11 | Unitronics Vision Series PLCs and HMIs ship with an insecure default password, which if left unchanged, can allow attackers to execute remote commands. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-12-18 | Unknown | Note that while it is possible to change the default password, implementors are encouraged to remove affected controllers from public networks and update the affected firmware: https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf; https://nvd.nis... | CWE-1188 |
CVE-2023-41266 | Qlik | Sense | Qlik Sense Path Traversal Vulnerability | 2023-12-07 | Qlik Sense contains a path traversal vulnerability that allows a remote, unauthenticated attacker to create an anonymous session by sending maliciously crafted HTTP requests. This anonymous session could allow the attacker to send further requests to unauthorized endpoints. | Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | 2023-12-28 | Known | https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41266 | CWE-20 |
CVE-2023-41265 | Qlik | Sense | Qlik Sense HTTP Tunneling Vulnerability | 2023-12-07 | Qlik Sense contains an HTTP tunneling vulnerability that allows an attacker to escalate privileges and execute HTTP requests on the backend server hosting the software. | Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | 2023-12-28 | Known | https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801; https://nvd.nist.gov/vuln/detail/CVE-2023-41265 | CWE-444 |
CVE-2023-33107 | Qualcomm | Multiple Chipsets | Qualcomm Multiple Chipsets Integer Overflow Vulnerability | 2023-12-05 | Multiple Qualcomm chipsets contain an integer overflow vulnerability due to memory corruption in Graphics Linux while assigning shared virtual memory region during IOCTL call. | Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | 2023-12-26 | Unknown | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.codelinaro.org/clo/la/kernel/msm-4.19/-/commit/d66b799c804083ea5226cfffac6d6c4e7a... | CWE-190 |
CVE-2023-33106 | Qualcomm | Multiple Chipsets | Qualcomm Multiple Chipsets Use of Out-of-Range Pointer Offset Vulnerability | 2023-12-05 | Multiple Qualcomm chipsets contain a use of out-of-range pointer offset vulnerability due to memory corruption in Graphics while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND. | Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | 2023-12-26 | Unknown | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.codelinaro.org/clo/la/kernel/msm-4.19/-/commit/1e46e81dbeb69aafd5842ce779f07e6176... | CWE-823 |
CVE-2023-33063 | Qualcomm | Multiple Chipsets | Qualcomm Multiple Chipsets Use-After-Free Vulnerability | 2023-12-05 | Multiple Qualcomm chipsets contain a use-after-free vulnerability due to memory corruption in DSP Services during a remote call from HLOS to DSP. | Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | 2023-12-26 | Unknown | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.codelinaro.org/clo/la/kernel/msm-5.15/-/commit/2643808ddbedfaabbb334741873fb2857f... | CWE-416 |
CVE-2022-22071 | Qualcomm | Multiple Chipsets | Qualcomm Multiple Chipsets Use-After-Free Vulnerability | 2023-12-05 | Multiple Qualcomm chipsets contain a use-after-free vulnerability when process shell memory is freed using IOCTL munmap call and process initialization is in progress. | Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | 2023-12-26 | Unknown | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.codelinaro.org/clo/la/kernel/msm-5.4/-/commit/586840fde350d7b8563df9889c8ce397e2c... | CWE-416 |
CVE-2023-42917 | Apple | Multiple Products | Apple Multiple Products WebKit Memory Corruption Vulnerability | 2023-12-04 | Apple iOS, iPadOS, macOS, and Safari WebKit contain a memory corruption vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML... | Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | 2023-12-25 | Unknown | https://support.apple.com/en-us/HT214031, https://support.apple.com/en-us/HT214032, https://support.apple.com/en-us/HT214033 ; https://nvd.nist.gov/vuln/detail/CVE-2023-42917 | CWE-787 |
CVE-2023-42916 | Apple | Multiple Products | Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability | 2023-12-04 | Apple iOS, iPadOS, macOS, and Safari WebKit contain an out-of-bounds read vulnerability that may disclose sensitive information when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on We... | Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | 2023-12-25 | Unknown | https://support.apple.com/en-us/HT214031, https://support.apple.com/en-us/HT214032, https://support.apple.com/en-us/HT214033 ; https://nvd.nist.gov/vuln/detail/CVE-2023-42916 | CWE-125 |
CVE-2023-6345 | Google | Chromium Skia | Google Skia Integer Overflow Vulnerability | 2023-11-30 | Google Chromium Skia contains an integer overflow vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a malicious file. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-12-21 | Unknown | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html ; ht... | CWE-190 |
CVE-2023-49103 | ownCloud | ownCloud graphapi | ownCloud graphapi Information Disclosure Vulnerability | 2023-11-30 | ownCloud graphapi contains an information disclosure vulnerability that can reveal sensitive data stored in phpinfo() via GetPhpInfo.php, including administrative credentials. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-12-21 | Unknown | https://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-49103 | null |
CVE-2023-4911 | GNU | GNU C Library | GNU C Library Buffer Overflow Vulnerability | 2023-11-21 | GNU C Library's dynamic loader ld.so contains a buffer overflow vulnerability when processing the GLIBC_TUNABLES environment variable, allowing a local attacker to execute code with elevated privileges. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-12-12 | Unknown | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=1056e5b4c3f2d90ed2b4a55f96add28da2f4c8... | CWE-122 |
CVE-2023-36584 | Microsoft | Windows | Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability | 2023-11-16 | Microsoft Windows Mark of the Web (MOTW) contains a security feature bypass vulnerability resulting in a limited loss of integrity and availability of security features. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-12-07 | Unknown | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36584 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36584 | null |
CVE-2023-1671 | Sophos | Web Appliance | Sophos Web Appliance Command Injection Vulnerability | 2023-11-16 | Sophos Web Appliance contains a command injection vulnerability in the warn-proceed handler that allows for remote code execution. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-12-07 | Unknown | https://www.sophos.com/en-us/security-advisories/sophos-sa-20230404-swa-rce; https://nvd.nist.gov/vuln/detail/CVE-2023-1671 | CWE-77 |
CVE-2020-2551 | Oracle | Fusion Middleware | Oracle Fusion Middleware Unspecified Vulnerability | 2023-11-16 | Oracle Fusion Middleware contains an unspecified vulnerability in the WLS Core Components that allows an unauthenticated attacker with network access via IIOP to compromise the WebLogic Server. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-12-07 | Unknown | https://www.oracle.com/security-alerts/cpujan2020.html; https://nvd.nist.gov/vuln/detail/CVE-2020-2551 | null |
CVE-2023-36033 | Microsoft | Windows | Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability | 2023-11-14 | Microsoft Windows Desktop Window Manager (DWM) Core Library contains an unspecified vulnerability that allows for privilege escalation. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-12-05 | Unknown | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36033 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36033 | CWE-822 |
CVE-2023-36025 | Microsoft | Windows | Microsoft Windows SmartScreen Security Feature Bypass Vulnerability | 2023-11-14 | Microsoft Windows SmartScreen contains a security feature bypass vulnerability that could allow an attacker to bypass Windows Defender SmartScreen checks and their associated prompts. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-12-05 | Unknown | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36025; https://nvd.nist.gov/vuln/detail/CVE-2023-36025 | null |
CVE-2023-36036 | Microsoft | Windows | Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability | 2023-11-14 | Microsoft Windows Cloud Files Mini Filter Driver contains a privilege escalation vulnerability that could allow an attacker to gain SYSTEM privileges. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-12-05 | Unknown | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36036 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36036 | CWE-122 |
CVE-2023-47246 | SysAid | SysAid Server | SysAid Server Path Traversal Vulnerability | 2023-11-13 | SysAid Server (on-premises version) contains a path traversal vulnerability that leads to code execution. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-12-04 | Known | https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification; https://nvd.nist.gov/vuln/detail/CVE-2023-47246 | CWE-22 |
CVE-2023-36844 | Juniper | Junos OS | Juniper Junos OS EX Series PHP External Variable Modification Vulnerability | 2023-11-13 | Juniper Junos OS on EX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables, leading to partial loss of integr... | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-11-17 | Unknown | https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36844 | CWE-473 |
CVE-2023-36845 | Juniper | Junos OS | Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability | 2023-11-13 | Juniper Junos OS on EX Series and SRX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control an important environment variable. Using a crafted request, which sets the variable PHPRC, an attacker is able to modify the PHP execution environmen... | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-11-17 | Unknown | https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36845 | CWE-473 |
CVE-2023-36846 | Juniper | Junos OS | Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability | 2023-11-13 | Juniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication, an attacker is able to upload arbitra... | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-11-17 | Unknown | https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36846 | CWE-306 |
CVE-2023-36847 | Juniper | Junos OS | Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability | 2023-11-13 | Juniper Junos OS on EX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to installAppPackage.php that doesn't require authentication, an attacker is able to up... | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-11-17 | Unknown | https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2023-36847 | CWE-306 |
CVE-2023-36851 | Juniper | Junos OS | Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability | 2023-11-13 | Juniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to u... | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-11-17 | Unknown | https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36851 | CWE-306 |
CVE-2023-29552 | IETF | Service Location Protocol (SLP) | Service Location Protocol (SLP) Denial-of-Service Vulnerability | 2023-11-08 | The Service Location Protocol (SLP) contains a denial-of-service (DoS) vulnerability that could allow an unauthenticated, remote attacker to register services and use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant amplification factor. | Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems running on untrusted networks, including those directly connected to the Internet. | 2023-11-29 | Unknown | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on the patching status. For more information please see https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-ser... | null |
CVE-2023-22518 | Atlassian | Confluence Data Center and Server | Atlassian Confluence Data Center and Server Improper Authorization Vulnerability | 2023-11-07 | Atlassian Confluence Data Center and Server contain an improper authorization vulnerability that can result in significant data loss when exploited by an unauthenticated attacker. There is no impact on confidentiality since the attacker cannot exfiltrate any data. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-11-28 | Known | https://confluence.atlassian.com/security/cve-2023-22518-improper-authorization-vulnerability-in-confluence-data-center-and-server-1311473907.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22518 | CWE-863 |
CVE-2023-46604 | Apache | ActiveMQ | Apache ActiveMQ Deserialization of Untrusted Data Vulnerability | 2023-11-02 | Apache ActiveMQ contains a deserialization of untrusted data vulnerability that may allow a remote attacker with network access to a broker to run shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-11-23 | Known | https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt; https://nvd.nist.gov/vuln/detail/CVE-2023-46604 | CWE-502 |
CVE-2023-46748 | F5 | BIG-IP Configuration Utility | F5 BIG-IP Configuration Utility SQL Injection Vulnerability | 2023-10-31 | F5 BIG-IP Configuration utility contains an SQL injection vulnerability that may allow an authenticated attacker with network access through the BIG-IP management port and/or self IP addresses to execute system commands. This vulnerability can be used in conjunction with CVE-2023-46747. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-11-21 | Unknown | https://my.f5.com/manage/s/article/K000137365 ; https://nvd.nist.gov/vuln/detail/CVE-2023-46748 | CWE-89 |
CVE-2023-46747 | F5 | BIG-IP Configuration Utility | F5 BIG-IP Configuration Utility Authentication Bypass Vulnerability | 2023-10-31 | F5 BIG-IP Configuration utility contains an authentication bypass using an alternate path or channel vulnerability due to undisclosed requests that may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute system commands. This vulnera... | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-11-21 | Known | https://my.f5.com/manage/s/article/K000137353; https://nvd.nist.gov/vuln/detail/CVE-2023-46747 | CWE-288 |
CVE-2023-5631 | Roundcube | Webmail | Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability | 2023-10-26 | Roundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that allows a remote attacker to run malicious JavaScript code. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-11-16 | Unknown | https://roundcube.net/news/2023/10/16/security-update-1.6.4-released, https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15 ; https://nvd.nist.gov/vuln/detail/CVE-2023-5631 | CWE-79 |
CVE-2023-20273 | Cisco | Cisco IOS XE Web UI | Cisco IOS XE Web UI Command Injection Vulnerability | 2023-10-23 | Cisco IOS XE contains a command injection vulnerability in the web user interface. When chained with CVE-2023-20198, the attacker can leverage the new local user to elevate privilege to root and write the implant to the file system. Cisco identified CVE-2023-20273 as the vulnerability exploited to deploy the implant. C... | Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report ... | 2023-10-27 | Unknown | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z; https://nvd.nist.gov/vuln/detail/CVE-2023-20273 | CWE-78 |
CVE-2023-4966 | Citrix | NetScaler ADC and NetScaler Gateway | Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability | 2023-10-18 | Citrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for sensitive information disclosure when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. | Apply mitigations and kill all active and persistent sessions per vendor instructions [https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/] OR discontinue use of the product if mitigations are unavailable. | 2023-11-08 | Known | https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/, https://support.citrix.com/article/CTX579459/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967 ; https://nvd.nist.gov/vuln/detail/CVE-2023-4966 | CWE-119 |
CVE-2023-20198 | Cisco | IOS XE Web UI | Cisco IOS XE Web UI Privilege Escalation Vulnerability | 2023-10-16 | Cisco IOS XE Web UI contains a privilege escalation vulnerability in the web user interface that could allow a remote, unauthenticated attacker to create an account with privilege level 15 access. The attacker can then use that account to gain control of the affected device. | Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report ... | 2023-10-20 | Unknown | https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-dublin-17121/221128-software-fix-availability-for-cisco-ios.html; https://nvd.nist.gov/vuln/detail/CVE-2023-20198 | CWE-420 |
CVE-2023-21608 | Adobe | Acrobat and Reader | Adobe Acrobat and Reader Use-After-Free Vulnerability | 2023-10-10 | Adobe Acrobat and Reader contains a use-after-free vulnerability that allows for code execution in the context of the current user. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-10-31 | Unknown | https://helpx.adobe.com/security/products/acrobat/apsb23-01.html; https://nvd.nist.gov/vuln/detail/CVE-2023-21608 | CWE-416 |
CVE-2023-20109 | Cisco | IOS and IOS XE | Cisco IOS and IOS XE Group Encrypted Transport VPN Out-of-Bounds Write Vulnerability | 2023-10-10 | Cisco IOS and IOS XE contain an out-of-bounds write vulnerability in the Group Encrypted Transport VPN (GET VPN) feature that could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute malicious code or cause a device to crash. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-10-31 | Unknown | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-getvpn-rce-g8qR68sx; https://nvd.nist.gov/vuln/detail/CVE-2023-20109 | CWE-787 |
CVE-2023-41763 | Microsoft | Skype for Business | Microsoft Skype for Business Privilege Escalation Vulnerability | 2023-10-10 | Microsoft Skype for Business contains an unspecified vulnerability that allows for privilege escalation. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-10-31 | Unknown | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-41763; https://nvd.nist.gov/vuln/detail/CVE-2023-41763 | CWE-918 |
CVE-2023-36563 | Microsoft | WordPad | Microsoft WordPad Information Disclosure Vulnerability | 2023-10-10 | Microsoft WordPad contains an unspecified vulnerability that allows for information disclosure. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-10-31 | Unknown | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36563; https://nvd.nist.gov/vuln/detail/CVE-2023-36563 | CWE-20 |
CVE-2023-44487 | IETF | HTTP/2 | HTTP/2 Rapid Reset Attack Vulnerability | 2023-10-10 | HTTP/2 contains a rapid reset vulnerability that allows for a distributed denial-of-service attack (DDoS). | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-10-31 | Unknown | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/ ; https://nv... | CWE-400 |
CVE-2023-22515 | Atlassian | Confluence Data Center and Server | Atlassian Confluence Data Center and Server Broken Access Control Vulnerability | 2023-10-05 | Atlassian Confluence Data Center and Server contains a broken access control vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA. | 2023-10-13 | Known | https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22515 | null |
CVE-2023-40044 | Progress | WS_FTP Server | Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability | 2023-10-05 | Progress WS_FTP Server contains a deserialization of untrusted data vulnerability in the Ad Hoc Transfer module that allows an authenticated attacker to execute remote commands on the underlying operating system. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-10-26 | Known | https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023; https://nvd.nist.gov/vuln/detail/CVE-2023-40044 | CWE-502 |
CVE-2023-42824 | Apple | iOS and iPadOS | Apple iOS and iPadOS Kernel Privilege Escalation Vulnerability | 2023-10-05 | Apple iOS and iPadOS contain an unspecified vulnerability that allows for local privilege escalation. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-10-26 | Unknown | https://support.apple.com/en-us/HT213961; https://nvd.nist.gov/vuln/detail/CVE-2023-42824 | null |
CVE-2023-42793 | JetBrains | TeamCity | JetBrains TeamCity Authentication Bypass Vulnerability | 2023-10-04 | JetBrains TeamCity contains an authentication bypass vulnerability that allows for remote code execution on TeamCity Server. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-10-25 | Known | https://blog.jetbrains.com/teamcity/2023/09/critical-security-issue-affecting-teamcity-on-premises-update-to-2023-05-4-now/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-42793 | CWE-288 |
CVE-2023-28229 | Microsoft | Windows CNG Key Isolation Service | Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability | 2023-10-04 | Microsoft Windows Cryptographic Next Generation (CNG) Key Isolation Service contains an unspecified vulnerability that allows an attacker to gain specific limited SYSTEM privileges. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-10-25 | Unknown | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28229; https://nvd.nist.gov/vuln/detail/CVE-2023-28229 | CWE-591 |
CVE-2023-4211 | Arm | Mali GPU Kernel Driver | Arm Mali GPU Kernel Driver Use-After-Free Vulnerability | 2023-10-03 | Arm Mali GPU Kernel Driver contains a use-after-free vulnerability that allows a local, non-privileged user to make improper GPU memory processing operations to gain access to already freed memory. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-10-24 | Unknown | https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2023-4211 | CWE-416 |
CVE-2023-5217 | Google | Chromium libvpx | Google Chromium libvpx Heap Buffer Overflow Vulnerability | 2023-10-02 | Google Chromium libvpx contains a heap buffer overflow vulnerability in vp8 encoding that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could impact web browsers using libvpx, including but not limited to Google Chrome. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-10-23 | Unknown | https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html; https://nvd.nist.gov/vuln/detail/CVE-2023-5217 | CWE-787 |
CVE-2018-14667 | Red Hat | JBoss RichFaces Framework | Red Hat JBoss RichFaces Framework Expression Language Injection Vulnerability | 2023-09-28 | Red Hat JBoss RichFaces Framework contains an expression language injection vulnerability via the UserResource resource. A remote, unauthenticated attacker could exploit this vulnerability to execute malicious code using a chain of Java serialized objects via org.ajax4jsf.resource.UserResource$UriData. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-10-19 | Unknown | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14667; https://nvd.nist.gov/vuln/detail/CVE-2018-14667 | CWE-94 |
CVE-2023-41991 | Apple | Multiple Products | Apple Multiple Products Improper Certificate Validation Vulnerability | 2023-09-25 | Apple iOS, iPadOS, macOS, and watchOS contain an improper certificate validation vulnerability that can allow a malicious app to bypass signature validation. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-10-16 | Unknown | https://support.apple.com/en-us/HT213926, https://support.apple.com/en-us/HT213927, https://support.apple.com/en-us/HT213928, https://support.apple.com/en-us/HT213929, https://support.apple.com/en-us/HT213931 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41991 | CWE-295 |
CVE-2023-41992 | Apple | Multiple Products | Apple Multiple Products Kernel Privilege Escalation Vulnerability | 2023-09-25 | Apple iOS, iPadOS, macOS, and watchOS contain an unspecified vulnerability that allows for local privilege escalation. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-10-16 | Unknown | https://support.apple.com/en-us/HT213926, https://support.apple.com/en-us/HT213927, https://support.apple.com/en-us/HT213928, https://support.apple.com/en-us/HT213929, https://support.apple.com/en-us/HT213931, https://support.apple.com/en-us/HT213932; https://nvd.nist.gov/vuln/detail/CVE-2023-41992 | CWE-754 |
CVE-2023-41993 | Apple | Multiple Products | Apple Multiple Products WebKit Code Execution Vulnerability | 2023-09-25 | Apple iOS, iPadOS, macOS, and Safari WebKit contain an unspecified vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML proc... | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-10-16 | Unknown | https://support.apple.com/en-us/HT213926, https://support.apple.com/en-us/HT213927, https://support.apple.com/en-us/HT213930; https://nvd.nist.gov/vuln/detail/CVE-2023-41993 | CWE-754 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.