Search and browse vulnerability records from NVD
Showing 50 of 825 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
|
CVE-2023-41064
KEV
|
7.8 HIGH |
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
85.4% | 2023-09-07 | |
|
CVE-2023-41061
KEV
|
7.8 HIGH |
A validation issue was addressed with improved logic. This issue is fixed in watchOS 9.6.2, iOS 16.6.1 and iPadOS 16.6.1. A maliciously crafted attachment may result in arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
1.0% | 2023-09-07 | |
|
CVE-2023-4762
KEV
|
8.8 HIGH |
Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) |
59.8% | 2023-09-05 | |
|
CVE-2023-41266
KEV
|
8.2 HIGH |
A path traversal vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows an unauthenticated remote attacker to generate an anonymous session. This allows them to transmit HTTP requests to unauthorized endpoints. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13. |
94.3% | 2023-08-29 | |
|
CVE-2023-38831
KEV
|
7.8 HIGH |
RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023. |
93.8% | 2023-08-23 | |
|
CVE-2022-48503
KEV
|
8.8 HIGH |
The issue was addressed with improved bounds checks. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing web content may lead to arbitrary code execution. |
0.2% | 2023-08-14 | |
|
CVE-2023-38180
KEV
|
7.5 HIGH |
.NET and Visual Studio Denial of Service Vulnerability |
0.9% | 2023-08-08 | |
|
CVE-2023-38950
KEV
|
7.5 HIGH |
A path traversal vulnerability in the iclock API of ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload. This vulnerability was fixed in version 9.0.120240617.19506 of ZKBioTime. |
80.8% | 2023-08-03 | |
|
CVE-2023-35081
KEV
|
7.2 HIGH |
A path traversal vulnerability in Ivanti EPMM versions (11.10.x < 11.10.0.3, 11.9.x < 11.9.1.2 and 11.8.x < 11.8.1.2) allows an authenticated administrator to write arbitrary files onto the appliance. |
91.0% | 2023-08-03 | |
|
CVE-2023-37450
KEV
|
8.8 HIGH |
The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, Safari 16.5.2, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
0.0% | 2023-07-27 | |
|
CVE-2023-29298
KEV
|
7.5 HIGH |
Adobe ColdFusion versions 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction. |
94.3% | 2023-07-12 | |
|
CVE-2023-36884
KEV
|
7.5 HIGH |
Windows Search Remote Code Execution Vulnerability |
93.2% | 2023-07-11 | |
|
CVE-2023-36874
KEV
|
7.8 HIGH |
Windows Error Reporting Service Elevation of Privilege Vulnerability |
71.2% | 2023-07-11 | |
|
CVE-2023-35311
KEV
|
8.8 HIGH |
Microsoft Outlook Security Feature Bypass Vulnerability |
0.5% | 2023-07-11 | |
|
CVE-2023-32049
KEV
|
8.8 HIGH |
Windows SmartScreen Security Feature Bypass Vulnerability |
9.1% | 2023-07-11 | |
|
CVE-2023-32046
KEV
|
7.8 HIGH |
Windows MSHTML Platform Elevation of Privilege Vulnerability |
42.7% | 2023-07-11 | |
|
CVE-2023-32439
KEV
|
8.8 HIGH |
A type confusion issue was addressed with improved checks. This issue is fixed in iOS 16.5.1 and iPadOS 16.5.1, iOS 15.7.7 and iPadOS 15.7.7, macOS Ventura 13.4.1, Safari 16.5.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
1.0% | 2023-06-23 | |
|
CVE-2023-32435
KEV
|
8.8 HIGH |
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7. |
0.4% | 2023-06-23 | |
|
CVE-2023-32434
KEV
|
7.8 HIGH |
An integer overflow was addressed with improved input validation. This issue is fixed in watchOS 9.5.2, macOS Big Sur 11.7.8, iOS 15.7.7 and iPadOS 15.7.7, macOS Monterey 12.6.7, watchOS 8.8.1, iOS 16.5.1 and iPadOS 16.5.1, macOS Ventura 13.4.1. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7. |
68.6% | 2023-06-23 | |
|
CVE-2023-32409
KEV
|
8.6 HIGH |
The issue was addressed with improved bounds checks. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.8 and iPadOS 15.7.8, Safari 16.5, iOS 16.5 and iPadOS 16.5. A remote attacker may be able to break out of Web Content sandbox. Apple is aware of a report that this issue may have been actively exploited. |
0.2% | 2023-06-23 | |
|
CVE-2023-32373
KEV
|
8.8 HIGH |
A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
0.0% | 2023-06-23 | |
|
CVE-2023-2533
KEV
|
8.4 HIGH |
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in PaperCut NG/MF, which, under specific conditions, could potentially enable an attacker to alter security settings or execute arbitrary code. This could be exploited if the target is an admin with a current login session. Exploiting this would typically involve the possibility of deceiving an admin into clicking a specially crafted malicious link, potentially leading to unauthorized changes. |
36.3% | 2023-06-20 | |
|
CVE-2023-29360
KEV
|
8.4 HIGH |
Microsoft Streaming Service Elevation of Privilege Vulnerability |
30.3% | 2023-06-14 | |
|
CVE-2023-33538
KEV
|
8.8 HIGH |
TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm . |
91.3% | 2023-06-07 | |
|
CVE-2023-3079
KEV
|
8.8 HIGH |
Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2.0% | 2023-06-05 | |
|
CVE-2023-32315
KEV
|
8.6 HIGH |
Openfire is an XMPP server licensed under the Open Source Apache License. Openfire's administrative console, a web-based application, was found to be vulnerable to a path traversal attack via the setup environment. This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environment in an already configured Openfire environment to access restricted pages in the Openfire Admin Console reserved for administrative users. This vulnerability affects all versions of Openfire that have been released since April 2015, starting with version 3.10.0. The problem has been patched in Openfire release 4.7.5 and 4.6.8, and further improvements will be included in the yet-to-be released first version on the 4.8 branch (which is expected to be version 4.8.0). Users are advised to upgrade. If an Openfire upgrade isnβt available for a specific release, or isnβt quickly actionable, users may see the linked github advisory (GHSA-gw42-f939-fhvm) for mitigation advice. |
94.4% | 2023-05-26 | |
|
CVE-2023-29336
KEV
|
7.8 HIGH |
Win32k Elevation of Privilege Vulnerability |
79.5% | 2023-05-09 | |
|
CVE-2023-24955
KEV
|
7.2 HIGH |
Microsoft SharePoint Server Remote Code Execution Vulnerability |
91.6% | 2023-05-09 | |
|
CVE-2023-29552
KEV
|
7.5 HIGH |
The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor. |
93.0% | 2023-04-25 | |
|
CVE-2023-27524
KEV
|
8.9 HIGH |
Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config. All superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database. Add a strong SECRET_KEY to your `superset_config.py` file like: SECRET_KEY = <YOUR_OWN_RANDOM_GENERATED_SECRET_KEY> Alternatively you can set it with `SUPERSET_SECRET_KEY` environment variable. |
84.1% | 2023-04-24 | |
|
CVE-2023-2033
KEV
|
8.8 HIGH |
Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
28.7% | 2023-04-14 | |
|
CVE-2023-28252
KEV
|
7.8 HIGH |
Windows Common Log File System Driver Elevation of Privilege Vulnerability |
56.5% | 2023-04-11 | |
|
CVE-2023-28229
KEV
|
7.0 HIGH |
Windows CNG Key Isolation Service Elevation of Privilege Vulnerability |
7.2% | 2023-04-11 | |
|
CVE-2023-28206
KEV
|
8.6 HIGH |
An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1, iOS 15.7.5 and iPadOS 15.7.5, macOS Big Sur 11.7.6. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited. |
16.7% | 2023-04-10 | |
|
CVE-2023-28205
KEV
|
8.8 HIGH |
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
0.1% | 2023-04-10 | |
|
CVE-2022-43939
KEV
|
8.6 HIGH |
Hitachi Vantara Pentaho Business Analytics Server versions before 9.4.0.1 and 9.3.0.2, including 8.3.x contain security restrictions using non-canonical URLs which can be circumvented. |
93.4% | 2023-04-03 | |
|
CVE-2022-43769
KEV
|
8.8 HIGH |
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.1 and 9.3.0.2, including 8.3.x allow certain web services to set property values which contain Spring templates that are interpreted downstream. |
94.0% | 2023-04-03 | |
|
CVE-2023-20963
KEV
|
7.8 HIGH |
In WorkSource, there is a possible parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-220302519 |
1.9% | 2023-03-24 | |
|
CVE-2023-26360
KEV
|
8.6 HIGH |
Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier) are affected by an Improper Access Control vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction. |
94.3% | 2023-03-23 | |
|
CVE-2023-28434
KEV
|
8.8 HIGH |
Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`. |
39.0% | 2023-03-22 | |
|
CVE-2023-28432
KEV
|
7.5 HIGH |
Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including `MINIO_SECRET_KEY` and `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z. |
94.0% | 2023-03-22 | |
|
CVE-2023-0386
KEV
|
7.8 HIGH |
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernelβs OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. |
59.2% | 2023-03-22 | |
|
CVE-2023-1389
KEV
|
8.8 HIGH |
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request. |
93.5% | 2023-03-15 | |
|
CVE-2023-27532
KEV
|
7.5 HIGH |
Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be obtained. This may lead to gaining access to the backup infrastructure hosts. |
82.4% | 2023-03-10 | |
|
CVE-2019-8720
KEV
|
8.8 HIGH |
A vulnerability was found in WebKit. The flaw is triggered when processing maliciously crafted web content that may lead to arbitrary code execution. Improved memory handling addresses the multiple memory corruption issues. |
7.8% | 2023-03-06 | |
|
CVE-2023-23529
KEV
|
8.8 HIGH |
A type confusion issue was addressed with improved checks. This issue is fixed in iOS 15.7.4 and iPadOS 15.7.4, iOS 16.3.1 and iPadOS 16.3.1, macOS Ventura 13.2.1, Safari 16.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
0.0% | 2023-02-27 | |
|
CVE-2023-21823
KEV
|
7.8 HIGH |
Windows Graphics Component Remote Code Execution Vulnerability |
5.2% | 2023-02-14 | |
|
CVE-2023-23376
KEV
|
7.8 HIGH |
Windows Common Log File System Driver Elevation of Privilege Vulnerability |
21.1% | 2023-02-14 | |
|
CVE-2023-21715
KEV
|
7.3 HIGH |
Microsoft Publisher Security Feature Bypass Vulnerability |
0.7% | 2023-02-14 | |
|
CVE-2022-24990
KEV
|
7.5 HIGH |
TerraMaster NAS 4.2.29 and earlier allows remote attackers to discover the administrative password by sending "User-Agent: TNAS" to module/api.php?mobile/webNasIPS and then reading the PWD field in the response. |
94.4% | 2023-02-07 |