Search Results (Refine Search)
- CVSS Version: 3
- CVSS V3 Severity: Critical (9-10)
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-23461 |
Libpeconv – access violation, before commit b076013 (30/11/2022). Published: February 15, 2023; 2:15:12 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-23460 |
Priority Web version 19.1.0.68, parameter manipulation on an unspecified end-point may allow authentication bypass. Published: February 15, 2023; 2:15:12 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-23459 |
Priority Windows may allow Command Execution via SQL Injection using an unspecified method. Published: February 15, 2023; 2:15:12 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-22807 |
LS ELECTRIC XBC-DN32U with operating system version 01.80 does not properly control access to the PLC over its internal XGT protocol. An attacker could control and tamper with the PLC by sending the packets to the PLC over its XGT protocol. Published: February 15, 2023; 1:15:12 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-22804 |
LS ELECTRIC XBC-DN32U with operating system version 01.80 is missing authentication to create users on the PLC. This could allow an attacker to create and use an account with elevated privileges and take control of the device. Published: February 15, 2023; 1:15:11 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-0102 |
LS ELECTRIC XBC-DN32U with operating system version 01.80 is missing authentication for its deletion command. This could allow an attacker to delete arbitrary files. Published: February 15, 2023; 1:15:11 PM -0500 |
V3.1: 9.1 CRITICAL V2.0:(not available) |
CVE-2022-46892 |
In Ampere AltraMax and Ampere Altra before 2.10c, improper access controls allows the OS to reinitialize a disabled root complex. Published: February 15, 2023; 12:15:12 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-25156 |
Kiwi TCMS, an open source test management system, does not impose rate limits in versions prior to 12.0. This makes it easier to attempt brute-force attacks against the login page. Users should upgrade to v12.0 or later to receive a patch. As a workaround, users may install and configure a rate-limiting proxy in front of Kiwi TCMS. Published: February 15, 2023; 10:15:11 AM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-25765 |
In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. Published: February 15, 2023; 9:15:13 AM -0500 |
V3.1: 9.9 CRITICAL V2.0:(not available) |
CVE-2023-21803 |
Windows iSCSI Discovery Service Remote Code Execution Vulnerability Published: February 14, 2023; 3:15:15 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-21716 |
Microsoft Word Remote Code Execution Vulnerability Published: February 14, 2023; 3:15:14 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-21692 |
Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability Published: February 14, 2023; 3:15:12 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-21690 |
Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability Published: February 14, 2023; 3:15:12 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-21689 |
Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability Published: February 14, 2023; 3:15:12 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-25725 |
HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31. Published: February 14, 2023; 2:15:11 PM -0500 |
V3.1: 9.1 CRITICAL V2.0:(not available) |
CVE-2023-24161 |
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the webWlanIdx parameter in the setWebWlanIdx function. Published: February 14, 2023; 10:15:11 AM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-24160 |
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the admuser parameter in the setPasswordCfg function. Published: February 14, 2023; 10:15:11 AM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-24159 |
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the admpass parameter in the setPasswordCfg function. Published: February 14, 2023; 10:15:11 AM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-24482 |
A vulnerability has been identified in COMOS V10.2 (All versions), COMOS V10.3.3.1 (All versions < V10.3.3.1.45), COMOS V10.3.3.2 (All versions < V10.3.3.2.33), COMOS V10.3.3.3 (All versions < V10.3.3.3.9), COMOS V10.3.3.4 (All versions < V10.3.3.4.6), COMOS V10.4.0.0 (All versions < V10.4.0.0.31), COMOS V10.4.1.0 (All versions < V10.4.1.0.32), COMOS V10.4.2.0 (All versions < V10.4.2.0.25). Cache validation service in COMOS is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition. Published: February 14, 2023; 6:15:14 AM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-24530 |
SAP BusinessObjects Business Intelligence Platform (CMC) - versions 420, 430, allows an authenticated admin user to upload malicious code that can be executed by the application over the network. On successful exploitation, attacker can perform operations that may completely compromise the application causing high impact on confidentiality, integrity and availability of the application. Published: February 13, 2023; 11:15:13 PM -0500 |
V3.1: 9.1 CRITICAL V2.0:(not available) |