Search and browse vulnerability records from NVD
Showing 50 of 790 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
|
CVE-2023-42917
KEV
|
8.8 HIGH |
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1. |
0.1% | 2023-11-30 | |
|
CVE-2023-36036
KEV
|
7.8 HIGH |
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
1.2% | 2023-11-14 | |
|
CVE-2023-36033
KEV
|
7.8 HIGH |
Windows DWM Core Library Elevation of Privilege Vulnerability |
0.8% | 2023-11-14 | |
|
CVE-2023-36025
KEV
|
8.8 HIGH |
Windows SmartScreen Security Feature Bypass Vulnerability |
91.4% | 2023-11-14 | |
|
CVE-2023-46748
KEV
|
8.8 HIGH |
An authenticated SQL injection vulnerability exists in the BIG-IP Configuration utility which may allow an authenticated attacker with network access to the Configuration utility through the BIG-IP management port and/or self IP addresses to execute arbitrary system commands. ย Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated |
4.3% | 2023-10-26 | |
|
CVE-2023-20273
KEV
|
7.2 HIGH |
A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands with the privileges of root. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges. |
92.5% | 2023-10-25 | |
|
CVE-2023-45727
KEV
|
7.5 HIGH |
Proself Enterprise/Standard Edition Ver5.62 and earlier, Proself Gateway Edition Ver1.65 and earlier, and Proself Mail Sanitize Edition Ver1.08 and earlier allow a remote unauthenticated attacker to conduct XML External Entity (XXE) attacks. By processing a specially crafted request containing malformed XML data, arbitrary files on the server containing account information may be read by the attacker. |
23.0% | 2023-10-18 | |
|
CVE-2023-44487
KEV
|
7.5 HIGH |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
94.4% | 2023-10-10 | |
|
CVE-2023-42824
KEV
|
7.8 HIGH |
The issue was addressed with improved checks. This issue is fixed in iOS 16.7.1 and iPadOS 16.7.1. A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.6. |
1.6% | 2023-10-04 | |
|
CVE-2023-4911
KEV
|
7.8 HIGH |
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges. |
67.8% | 2023-10-03 | |
|
CVE-2023-5217
KEV
|
8.8 HIGH |
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
3.6% | 2023-09-28 | |
|
CVE-2023-41993
KEV
|
8.8 HIGH |
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. |
21.9% | 2023-09-21 | |
|
CVE-2023-41992
KEV
|
7.8 HIGH |
The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7, iOS 16.7 and iPadOS 16.7, macOS Ventura 13.6. A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. |
1.3% | 2023-09-21 | |
|
CVE-2023-41179
KEV
|
7.2 HIGH |
A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation. Note that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability. |
1.8% | 2023-09-19 | |
|
CVE-2023-38205
KEV
|
7.5 HIGH |
Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction. |
94.3% | 2023-09-14 | |
|
CVE-2023-26369
KEV
|
7.8 HIGH |
Acrobat Reader versions 23.003.20284 (and earlier), 20.005.30516 (and earlier) and 20.005.30514 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.6% | 2023-09-13 | |
|
CVE-2023-36802
KEV
|
7.8 HIGH |
Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability |
78.9% | 2023-09-12 | |
|
CVE-2023-4863
KEV
|
8.8 HIGH |
Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical) |
94.1% | 2023-09-12 | |
|
CVE-2023-41990
KEV
|
7.8 HIGH |
The issue was addressed with improved handling of caches. This issue is fixed in tvOS 16.3, iOS 16.3 and iPadOS 16.3, macOS Monterey 12.6.8, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Ventura 13.2, watchOS 9.3. Processing a font file may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1. |
2.7% | 2023-09-12 | |
|
CVE-2023-35674
KEV
|
7.8 HIGH |
In onCreate of WindowState.java, there is a possible way to launch a background activity due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
0.1% | 2023-09-11 | |
|
CVE-2023-39780
KEV
|
8.8 HIGH |
On ASUS RT-AX55 3.0.0.4.386.51598 devices, authenticated attackers can perform OS command injection via the /start_apply.htm qos_bw_rulelist parameter. NOTE: for the similar "token-generated module" issue, see CVE-2023-41345; for the similar "token-refresh module" issue, see CVE-2023-41346; for the similar "check token module" issue, see CVE-2023-41347; and for the similar "code-authentication module" issue, see CVE-2023-41348. |
44.2% | 2023-09-11 | |
|
CVE-2023-41064
KEV
|
7.8 HIGH |
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
89.7% | 2023-09-07 | |
|
CVE-2023-41061
KEV
|
7.8 HIGH |
A validation issue was addressed with improved logic. This issue is fixed in watchOS 9.6.2, iOS 16.6.1 and iPadOS 16.6.1. A maliciously crafted attachment may result in arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
1.0% | 2023-09-07 | |
|
CVE-2023-4762
KEV
|
8.8 HIGH |
Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) |
39.4% | 2023-09-05 | |
|
CVE-2023-41266
KEV
|
8.2 HIGH |
A path traversal vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows an unauthenticated remote attacker to generate an anonymous session. This allows them to transmit HTTP requests to unauthorized endpoints. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13. |
94.3% | 2023-08-29 | |
|
CVE-2023-38831
KEV
|
7.8 HIGH |
RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023. |
93.6% | 2023-08-23 | |
|
CVE-2022-48503
KEV
|
8.8 HIGH |
The issue was addressed with improved bounds checks. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing web content may lead to arbitrary code execution. |
0.2% | 2023-08-14 | |
|
CVE-2023-38180
KEV
|
7.5 HIGH |
.NET and Visual Studio Denial of Service Vulnerability |
0.9% | 2023-08-08 | |
|
CVE-2023-38950
KEV
|
7.5 HIGH |
A path traversal vulnerability in the iclock API of ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload. This vulnerability was fixed in version 9.0.120240617.19506 of ZKBioTime. |
80.8% | 2023-08-03 | |
|
CVE-2023-35081
KEV
|
7.2 HIGH |
A path traversal vulnerability in Ivanti EPMM versions (11.10.x < 11.10.0.3, 11.9.x < 11.9.1.2 and 11.8.x < 11.8.1.2) allows an authenticated administrator to write arbitrary files onto the appliance. |
92.8% | 2023-08-03 | |
|
CVE-2023-37450
KEV
|
8.8 HIGH |
The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, Safari 16.5.2, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
0.0% | 2023-07-27 | |
|
CVE-2023-29298
KEV
|
7.5 HIGH |
Adobe ColdFusion versions 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction. |
94.3% | 2023-07-12 | |
|
CVE-2023-36884
KEV
|
7.5 HIGH |
Windows Search Remote Code Execution Vulnerability |
93.2% | 2023-07-11 | |
|
CVE-2023-36874
KEV
|
7.8 HIGH |
Windows Error Reporting Service Elevation of Privilege Vulnerability |
68.7% | 2023-07-11 | |
|
CVE-2023-35311
KEV
|
8.8 HIGH |
Microsoft Outlook Security Feature Bypass Vulnerability |
0.5% | 2023-07-11 | |
|
CVE-2023-32049
KEV
|
8.8 HIGH |
Windows SmartScreen Security Feature Bypass Vulnerability |
9.1% | 2023-07-11 | |
|
CVE-2023-32046
KEV
|
7.8 HIGH |
Windows MSHTML Platform Elevation of Privilege Vulnerability |
42.7% | 2023-07-11 | |
|
CVE-2023-32439
KEV
|
8.8 HIGH |
A type confusion issue was addressed with improved checks. This issue is fixed in iOS 16.5.1 and iPadOS 16.5.1, iOS 15.7.7 and iPadOS 15.7.7, macOS Ventura 13.4.1, Safari 16.5.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
1.0% | 2023-06-23 | |
|
CVE-2023-32435
KEV
|
8.8 HIGH |
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7. |
0.4% | 2023-06-23 | |
|
CVE-2023-32434
KEV
|
7.8 HIGH |
An integer overflow was addressed with improved input validation. This issue is fixed in watchOS 9.5.2, macOS Big Sur 11.7.8, iOS 15.7.7 and iPadOS 15.7.7, macOS Monterey 12.6.7, watchOS 8.8.1, iOS 16.5.1 and iPadOS 16.5.1, macOS Ventura 13.4.1. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7. |
64.2% | 2023-06-23 | |
|
CVE-2023-32409
KEV
|
8.6 HIGH |
The issue was addressed with improved bounds checks. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.8 and iPadOS 15.7.8, Safari 16.5, iOS 16.5 and iPadOS 16.5. A remote attacker may be able to break out of Web Content sandbox. Apple is aware of a report that this issue may have been actively exploited. |
0.2% | 2023-06-23 | |
|
CVE-2023-32373
KEV
|
8.8 HIGH |
A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
0.0% | 2023-06-23 | |
|
CVE-2023-2533
KEV
|
8.4 HIGH |
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in PaperCut NG/MF, which, under specific conditions, could potentially enable an attacker to alter security settings or execute arbitrary code. This could be exploited if the target is an admin with a current login session. Exploiting this would typically involve the possibility of deceiving an admin into clicking a specially crafted malicious link, potentially leading to unauthorized changes. |
33.9% | 2023-06-20 | |
|
CVE-2023-29360
KEV
|
8.4 HIGH |
Microsoft Streaming Service Elevation of Privilege Vulnerability |
22.1% | 2023-06-14 | |
|
CVE-2023-33538
KEV
|
8.8 HIGH |
TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm . |
91.3% | 2023-06-07 | |
|
CVE-2023-3079
KEV
|
8.8 HIGH |
Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
1.3% | 2023-06-05 | |
|
CVE-2023-32315
KEV
|
8.6 HIGH |
Openfire is an XMPP server licensed under the Open Source Apache License. Openfire's administrative console, a web-based application, was found to be vulnerable to a path traversal attack via the setup environment. This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environment in an already configured Openfire environment to access restricted pages in the Openfire Admin Console reserved for administrative users. This vulnerability affects all versions of Openfire that have been released since April 2015, starting with version 3.10.0. The problem has been patched in Openfire release 4.7.5 and 4.6.8, and further improvements will be included in the yet-to-be released first version on the 4.8 branch (which is expected to be version 4.8.0). Users are advised to upgrade. If an Openfire upgrade isnโt available for a specific release, or isnโt quickly actionable, users may see the linked github advisory (GHSA-gw42-f939-fhvm) for mitigation advice. |
94.4% | 2023-05-26 | |
|
CVE-2023-29336
KEV
|
7.8 HIGH |
Win32k Elevation of Privilege Vulnerability |
79.7% | 2023-05-09 | |
|
CVE-2023-24955
KEV
|
7.2 HIGH |
Microsoft SharePoint Server Remote Code Execution Vulnerability |
91.5% | 2023-05-09 | |
|
CVE-2023-29552
KEV
|
7.5 HIGH |
The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor. |
92.6% | 2023-04-25 |