U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • CVSS Version: 3
  • CVSS V3 Severity: Critical (9-10)
There are 19,000 matching records.
Displaying matches 341 through 360.
Vuln ID Summary CVSS Severity
CVE-2023-23461

Libpeconv – access violation, before commit b076013 (30/11/2022).

Published: February 15, 2023; 2:15:12 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-23460

Priority Web version 19.1.0.68, parameter manipulation on an unspecified end-point may allow authentication bypass.

Published: February 15, 2023; 2:15:12 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-23459

Priority Windows may allow Command Execution via SQL Injection using an unspecified method.

Published: February 15, 2023; 2:15:12 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-22807

LS ELECTRIC XBC-DN32U with operating system version 01.80 does not properly control access to the PLC over its internal XGT protocol. An attacker could control and tamper with the PLC by sending the packets to the PLC over its XGT protocol.

Published: February 15, 2023; 1:15:12 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-22804

LS ELECTRIC XBC-DN32U with operating system version 01.80 is missing authentication to create users on the PLC. This could allow an attacker to create and use an account with elevated privileges and take control of the device.

Published: February 15, 2023; 1:15:11 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-0102

LS ELECTRIC XBC-DN32U with operating system version 01.80 is missing authentication for its deletion command. This could allow an attacker to delete arbitrary files.

Published: February 15, 2023; 1:15:11 PM -0500
V3.1: 9.1 CRITICAL
V2.0:(not available)
CVE-2022-46892

In Ampere AltraMax and Ampere Altra before 2.10c, improper access controls allows the OS to reinitialize a disabled root complex.

Published: February 15, 2023; 12:15:12 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-25156

Kiwi TCMS, an open source test management system, does not impose rate limits in versions prior to 12.0. This makes it easier to attempt brute-force attacks against the login page. Users should upgrade to v12.0 or later to receive a patch. As a workaround, users may install and configure a rate-limiting proxy in front of Kiwi TCMS.

Published: February 15, 2023; 10:15:11 AM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-25765

In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

Published: February 15, 2023; 9:15:13 AM -0500
V3.1: 9.9 CRITICAL
V2.0:(not available)
CVE-2023-21803

Windows iSCSI Discovery Service Remote Code Execution Vulnerability

Published: February 14, 2023; 3:15:15 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-21716

Microsoft Word Remote Code Execution Vulnerability

Published: February 14, 2023; 3:15:14 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-21692

Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability

Published: February 14, 2023; 3:15:12 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-21690

Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability

Published: February 14, 2023; 3:15:12 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-21689

Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability

Published: February 14, 2023; 3:15:12 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-25725

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

Published: February 14, 2023; 2:15:11 PM -0500
V3.1: 9.1 CRITICAL
V2.0:(not available)
CVE-2023-24161

TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the webWlanIdx parameter in the setWebWlanIdx function.

Published: February 14, 2023; 10:15:11 AM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-24160

TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the admuser parameter in the setPasswordCfg function.

Published: February 14, 2023; 10:15:11 AM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-24159

TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the admpass parameter in the setPasswordCfg function.

Published: February 14, 2023; 10:15:11 AM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-24482

A vulnerability has been identified in COMOS V10.2 (All versions), COMOS V10.3.3.1 (All versions < V10.3.3.1.45), COMOS V10.3.3.2 (All versions < V10.3.3.2.33), COMOS V10.3.3.3 (All versions < V10.3.3.3.9), COMOS V10.3.3.4 (All versions < V10.3.3.4.6), COMOS V10.4.0.0 (All versions < V10.4.0.0.31), COMOS V10.4.1.0 (All versions < V10.4.1.0.32), COMOS V10.4.2.0 (All versions < V10.4.2.0.25). Cache validation service in COMOS is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition.

Published: February 14, 2023; 6:15:14 AM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-24530

SAP BusinessObjects Business Intelligence Platform (CMC) - versions 420, 430, allows an authenticated admin user to upload malicious code that can be executed by the application over the network. On successful exploitation, attacker can perform operations that may completely compromise the application causing high impact on confidentiality, integrity and availability of the application.

Published: February 13, 2023; 11:15:13 PM -0500
V3.1: 9.1 CRITICAL
V2.0:(not available)