Search and browse vulnerability records from NVD
Showing 50 of 828 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
|
CVE-2023-23376
KEV
|
7.8 HIGH |
Windows Common Log File System Driver Elevation of Privilege Vulnerability |
21.1% | 2023-02-14 | |
|
CVE-2023-21715
KEV
|
7.3 HIGH |
Microsoft Publisher Security Feature Bypass Vulnerability |
0.7% | 2023-02-14 | |
|
CVE-2022-24990
KEV
|
7.5 HIGH |
TerraMaster NAS 4.2.29 and earlier allows remote attackers to discover the administrative password by sending "User-Agent: TNAS" to module/api.php?mobile/webNasIPS and then reading the PWD field in the response. |
94.4% | 2023-02-07 | |
|
CVE-2023-0669
KEV
|
7.2 HIGH |
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2. |
94.4% | 2023-02-06 | |
|
CVE-2023-0266
KEV
|
7.9 HIGH |
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e |
0.1% | 2023-01-30 | |
|
CVE-2023-21608
KEV
|
7.8 HIGH |
Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
84.1% | 2023-01-18 | |
|
CVE-2023-21839
KEV
|
7.5 HIGH |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). |
94.1% | 2023-01-18 | |
|
CVE-2023-22952
KEV
|
8.8 HIGH |
In SugarCRM before 12.0. Hotfix 91155, a crafted request can inject custom PHP code through the EmailTemplates because of missing input validation. |
92.8% | 2023-01-11 | |
|
CVE-2023-21674
KEV
|
8.8 HIGH |
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability |
12.4% | 2023-01-10 | |
|
CVE-2022-26485
KEV
|
8.8 HIGH |
Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0. |
5.8% | 2022-12-22 | |
|
CVE-2022-42856
KEV
|
8.8 HIGH |
A type confusion issue was addressed with improved state handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.1.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1.. |
0.2% | 2022-12-15 | |
|
CVE-2022-4262
KEV
|
8.8 HIGH |
Type confusion in V8 in Google Chrome prior to 108.0.5359.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
6.4% | 2022-12-02 | |
|
CVE-2022-40799
KEV
|
8.8 HIGH |
Data Integrity Failure in 'Backup Config' in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device. |
37.1% | 2022-11-29 | |
|
CVE-2022-23748
KEV
|
7.8 HIGH |
mDNSResponder.exe is vulnerable to DLL Sideloading attack. Executable improperly specifies how to load the DLL, from which folder and under what conditions. In these scenarios, a malicious attacker could be using the valid and legitimate executable to load malicious files. |
11.7% | 2022-11-17 | |
|
CVE-2022-41128
KEV
|
8.8 HIGH |
Windows Scripting Languages Remote Code Execution Vulnerability |
39.2% | 2022-11-09 | |
|
CVE-2022-41125
KEV
|
7.8 HIGH |
Windows CNG Key Isolation Service Elevation of Privilege Vulnerability |
0.7% | 2022-11-09 | |
|
CVE-2022-41080
KEV
|
8.8 HIGH |
Microsoft Exchange Server Elevation of Privilege Vulnerability |
93.8% | 2022-11-09 | |
|
CVE-2022-41073
KEV
|
7.8 HIGH |
Windows Print Spooler Elevation of Privilege Vulnerability |
1.9% | 2022-11-09 | |
|
CVE-2022-3723
KEV
|
8.8 HIGH |
Type confusion in V8 in Google Chrome prior to 107.0.5304.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
0.5% | 2022-11-01 | |
|
CVE-2022-42827
KEV
|
7.8 HIGH |
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, iOS 16.1 and iPadOS 16. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.. |
0.2% | 2022-11-01 | |
|
CVE-2022-38181
KEV
|
8.8 HIGH |
The Arm Mali GPU kernel driver allows unprivileged users to access freed memory because GPU memory operations are mishandled. This affects Bifrost r0p0 through r38p1, and r39p0; Valhall r19p0 through r38p1, and r39p0; and Midgard r4p0 through r32p0. |
24.5% | 2022-10-25 | |
|
CVE-2022-41033
KEV
|
7.8 HIGH |
Windows COM+ Event System Service Elevation of Privilege Vulnerability |
1.2% | 2022-10-11 | |
|
CVE-2022-38028
KEV
|
7.8 HIGH |
Windows Print Spooler Elevation of Privilege Vulnerability |
5.0% | 2022-10-11 | |
|
CVE-2022-41082
KEV
|
8.0 HIGH |
Microsoft Exchange Server Remote Code Execution Vulnerability |
91.7% | 2022-10-03 | |
|
CVE-2022-41040
KEV
|
8.8 HIGH |
Microsoft Exchange Server Elevation of Privilege Vulnerability |
94.2% | 2022-10-03 | |
|
CVE-2022-20775
KEV
|
7.8 HIGH |
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF |
0.5% | 2022-09-30 | |
|
CVE-2022-3038
KEV
|
8.8 HIGH |
Use after free in Network Service in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
36.0% | 2022-09-26 | |
|
CVE-2022-32917
KEV
|
7.8 HIGH |
The issue was addressed with improved bounds checks. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.. |
0.5% | 2022-09-20 | |
|
CVE-2022-40139
KEV
|
7.2 HIGH |
Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability. |
11.8% | 2022-09-19 | |
|
CVE-2022-37969
KEV
|
7.8 HIGH |
Windows Common Log File System Driver Elevation of Privilege Vulnerability |
12.1% | 2022-09-13 | |
|
CVE-2022-36537
KEV
|
7.5 HIGH |
ZK Framework v9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 allows attackers to access sensitive information via a crafted POST request sent to the component AuUploader. |
93.9% | 2022-08-26 | |
|
CVE-2022-36804
KEV
|
8.8 HIGH |
Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew. |
94.4% | 2022-08-25 | |
|
CVE-2022-32894
KEV
|
7.8 HIGH |
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited. |
0.2% | 2022-08-24 | |
|
CVE-2022-32893
KEV
|
8.8 HIGH |
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1, Safari 15.6.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
0.2% | 2022-08-24 | |
|
CVE-2022-0028
KEV
|
8.6 HIGH |
A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) firewall against an attacker-specified target. To be misused by an external attacker, the firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a source zone that has an external facing interface. This configuration is not typical for URL filtering and, if set, is likely unintended by the administrator. If exploited, this issue would not impact the confidentiality, integrity, or availability of our products. However, the resulting denial-of-service (DoS) attack may help obfuscate the identity of the attacker and implicate the firewall as the source of the attack. We have taken prompt action to address this issue in our PAN-OS software. All software updates for this issue are expected to be released no later than the week of August 15, 2022. This issue does not impact Panorama M-Series or Panorama virtual appliances. This issue has been resolved for all Cloud NGFW and Prisma Access customers and no additional action is required from them. |
4.7% | 2022-08-10 | |
|
CVE-2022-34713
KEV
|
7.8 HIGH |
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability |
4.5% | 2022-08-09 | |
|
CVE-2022-2294
KEV
|
8.8 HIGH |
Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
1.0% | 2022-07-28 | |
|
CVE-2022-1364
KEV
|
8.8 HIGH |
Type confusion in V8 Turbofan in Google Chrome prior to 100.0.4896.127 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
12.4% | 2022-07-26 | |
|
CVE-2022-1096
KEV
|
8.8 HIGH |
Type confusion in V8 in Google Chrome prior to 99.0.4844.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
47.3% | 2022-07-23 | |
|
CVE-2022-33891
KEV
|
8.8 HIGH |
The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1. |
93.5% | 2022-07-18 | |
|
CVE-2022-22047
KEV
|
7.8 HIGH |
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability |
1.3% | 2022-07-12 | |
|
CVE-2022-22071
KEV
|
8.4 HIGH |
Possible use after free when process shell memory is freed using IOCTL munmap call and process initialization is in progress in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music |
0.6% | 2022-06-14 | |
|
CVE-2022-30190
KEV
|
7.8 HIGH |
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability. |
93.5% | 2022-06-01 | |
|
CVE-2022-22675
KEV
|
7.8 HIGH |
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.3.1, iOS 15.4.1 and iPadOS 15.4.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.. |
1.1% | 2022-05-26 | |
|
CVE-2022-26925
KEV
|
8.1 HIGH |
Windows LSA Spoofing Vulnerability |
37.4% | 2022-05-10 | |
|
CVE-2022-26923
KEV
|
8.8 HIGH |
Active Directory Domain Services Elevation of Privilege Vulnerability |
91.4% | 2022-05-10 | |
|
CVE-2022-30333
KEV
|
7.5 HIGH |
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected. |
92.8% | 2022-05-09 | |
|
CVE-2022-27925
KEV
|
7.2 HIGH |
Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. An authenticated user with administrator rights has the ability to upload arbitrary files to the system, leading to directory traversal. |
94.3% | 2022-04-21 | |
|
CVE-2022-27924
KEV
|
7.5 HIGH |
Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 allows an unauthenticated attacker to inject arbitrary memcache commands into a targeted instance. These memcache commands becomes unescaped, causing an overwrite of arbitrary cached entries. |
91.2% | 2022-04-21 | |
|
CVE-2022-26904
KEV
|
7.0 HIGH |
Windows User Profile Service Elevation of Privilege Vulnerability |
21.6% | 2022-04-15 |