Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2023-35974 | Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2023-35975 | An authenticated path traversal vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to delete arbitrary files in the underlying operating system. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2023-35976 | Vulnerabilities exist which allow an authenticated attacker to access sensitive information on the ArubaOS command line interface. Successful exploitation could allow access to data beyond what is authorized by the users existing privilege level. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2023-35977 | Vulnerabilities exist which allow an authenticated attacker to access sensitive information on the ArubaOS command line interface. Successful exploitation could allow access to data beyond what is authorized by the users existing privilege level. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2023-35978 | A vulnerability in ArubaOS could allow an unauthenticated remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2023-35979 | There is an unauthenticated buffer overflow vulnerability in the process controlling the ArubaOS web-based management interface. Successful exploitation of this vulnerability results in a Denial-of-Service (DoS) condition affecting the web-based management interface of the controller. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2023-3598 | Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | Unknown | N/A | ||
CVE-2023-35980 | There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2023-35981 | There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2023-35982 | There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2023-35983 | This issue was addressed with improved data protection. This issue is fixed in macOS Monterey 12.6.8, macOS Ventura 13.5, macOS Big Sur 11.7.9. An app may be able to modify protected parts of the file system. | Unknown | N/A | Apple | |
CVE-2023-35984 | The issue was addressed with improved checks. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An attacker in physical proximity can cause a limited out of bounds write. | Unknown | N/A | Apple | |
CVE-2023-35985 | An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled. | Unknown | N/A | Foxit | |
CVE-2023-35986 | Sante DICOM Viewer Pro lacks proper validation of user-supplied data when parsing DICOM files. This could lead to a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. | Unknown | N/A | Santesoft | |
CVE-2023-35987 | PiiGAB M-Bus contains hard-coded credentials which it uses for authentication. | Unknown | N/A | PiiGAB | |
CVE-2023-35989 | An integer overflow vulnerability exists in the LXT2 zlib block allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability. | Unknown | N/A | GTKWave | |
CVE-2023-3599 | A vulnerability was found in SourceCodester Best Fee Management System 1.0. It has been rated as critical. Affected by this issue is the function save_user of the file admin_class.php of the component Add User Handler. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-233450 is the identifier assigned to this vulnerability. | Unknown | N/A | SourceCodester | |
CVE-2023-35990 | The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. An app may be able to identify what other apps a user has installed. | Unknown | N/A | Apple | |
CVE-2023-35991 | Hidden functionality vulnerability in LOGITEC wireless LAN routers allows an unauthenticated attacker to log in to the product's certain management console and execute arbitrary OS commands. Affected products and versions are as follows: LAN-W300N/DR all versions, LAN-WH300N/DR all versions, LAN-W300N/P all versions, LAN-WH450N/GP all versions, LAN-WH300AN/DGP all versions, LAN-WH300N/DGP all versions, and LAN-WH300ANDGPE all versions. | Unknown | N/A | LOGITEC CORPORATION | |
CVE-2023-35992 | An integer overflow vulnerability exists in the FST fstReaderIterBlocks2 vesc allocation functionality of GTKWave 3.3.115, when compiled as a 32-bit binary. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability. | Unknown | N/A | GTKWave | |
CVE-2023-35993 | A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to execute arbitrary code with kernel privileges. | Unknown | N/A | Apple | |
CVE-2023-35994 | Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta initialization part. | Unknown | N/A | GTKWave | |
CVE-2023-35995 | Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta indexing when signal_lens is 1. | Unknown | N/A | GTKWave | |
CVE-2023-35996 | Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta indexing when signal_lens is 0. | Unknown | N/A | GTKWave | |
CVE-2023-35997 | Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta indexing when signal_lens is 2 or more. | Unknown | N/A | GTKWave | |
CVE-2023-35998 | A missing authorization check in multiple SOAP endpoints of the Insider Threat Management Server enables an attacker on an adjacent network to read and write unauthorized objects. Successful exploitation requires an attacker to first obtain a valid agent authentication token. All versions before 7.14.3 are affected. | Unknown | N/A | Proofpoint | |
CVE-2023-3600 | During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. This vulnerability affects Firefox < 115.0.2, Firefox ESR < 115.0.2, and Thunderbird < 115.0.1. | Unknown | N/A | Mozilla | |
CVE-2023-36000 | A missing authorization check in the MacOS agent configuration endpoint of the Insider Threat Management Server enables an anonymous attacker on an adjacent network to obtain sensitive information. Successful exploitation requires an attacker to first obtain a valid agent authentication token. All versions before 7.14.3 are affected. | Unknown | N/A | Proofpoint | |
CVE-2023-36002 | A missing authorization check in multiple URL validation endpoints of the Insider Threat Management Server enables an anonymous attacker on an adjacent network to smuggle content via DNS lookups. All versions before 7.14.3 are affected. | Unknown | N/A | Proofpoint | |
CVE-2023-36003 | XAML Diagnostics Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36004 | Windows DPAPI (Data Protection Application Programming Interface) Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36005 | Windows Telephony Server Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36006 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36007 | Microsoft Send Customer Voice survey from Dynamics 365 Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36008 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36009 | Microsoft Word Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-3601 | The Simple Author Box WordPress plugin before 2.52 does not verify a user ID before outputting information about that user, leading to arbitrary user information disclosure to users with a role as low as Contributor. | Unknown | N/A | Unknown | |
CVE-2023-36010 | Microsoft Defender Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36011 | Win32k Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36012 | DHCP Server Service Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36013 | PowerShell Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36014 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36016 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36017 | Windows Scripting Engine Memory Corruption Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36018 | Visual Studio Code Jupyter Extension Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36019 | Microsoft Power Platform Connector Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36020 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36021 | Microsoft On-Prem Data Gateway Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36022 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36024 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36025 | Windows SmartScreen Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36026 | Microsoft Edge (Chromium-based) Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36027 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36028 | Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36029 | Microsoft Edge (Chromium-based) Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-3603 | A missing allocation check in sftp server processing read requests may cause a NULL dereference on low-memory conditions. The malicious client can request up to 4GB SFTP reads, causing allocation of up to 4GB buffers, which was not being checked for failure. This will likely crash the authenticated user's sftp server connection (if implemented as forking as recommended). For thread-based servers, this might also cause DoS for legitimate users. Given this code is not in any released versions, no security releases have been issued. | Unknown | N/A | n/a | |
CVE-2023-36030 | Microsoft Dynamics 365 Sales Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36031 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36033 | Windows DWM Core Library Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36034 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36035 | Microsoft Exchange Server Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36036 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36037 | Microsoft Excel Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36038 | ASP.NET Core Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36039 | Microsoft Exchange Server Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-3604 | The Change WP Admin Login WordPress plugin before 1.1.4 discloses the URL of the hidden login page when accessing a crafted URL, bypassing the protection offered. | Unknown | N/A | Unknown | |
CVE-2023-36041 | Microsoft Excel Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36042 | Visual Studio Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36043 | Open Management Infrastructure Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36045 | Microsoft Office Graphics Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36046 | Windows Authentication Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36047 | Windows Authentication Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36049 | .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-3605 | A vulnerability was found in PHPGurukul Online Shopping Portal 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Registration Page. The manipulation leads to improper restriction of excessive authentication attempts. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-233467. | Unknown | N/A | PHPGurukul | |
CVE-2023-36050 | Microsoft Exchange Server Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36052 | Azure CLI REST Command Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-36053 | In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs. | Unknown | N/A | n/a | |
CVE-2023-36054 | lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count. | Unknown | N/A | n/a | |
CVE-2023-3606 | A vulnerability was found in TamronOS up to 20230703. It has been classified as critical. This affects an unknown part of the file /api/ping. The manipulation of the argument host leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233475. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | Unknown | N/A | n/a | |
CVE-2023-3607 | A vulnerability was found in kodbox 1.26. It has been declared as critical. This vulnerability affects the function Execute of the file webconsole.php.txt of the component WebConsole Plug-In. The manipulation leads to os command injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-233476. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | Unknown | N/A | n/a | |
CVE-2023-36076 | SQL Injection vulnerability in smanga version 3.1.9 and earlier, allows remote attackers to execute arbitrary code and gain sensitive information via mediaId, mangaId, and userId parameters in php/history/add.php. | Unknown | N/A | n/a | |
CVE-2023-3608 | A vulnerability was found in Ruijie BCR810W 2.5.10. It has been rated as critical. This issue affects some unknown processing of the component Tracert Page. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-233477 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | Unknown | N/A | Ruijie | |
CVE-2023-36081 | Cross Site Scripting vulnerability in GatesAIr Flexiva FM Transmitter/Exciter v.FAX 150W allows a remote attacker to execute arbitrary code via a crafted script to the web application dashboard. | Unknown | N/A | n/a | |
CVE-2023-36082 | An isssue in GatesAIr Flexiva FM Transmitter/Exiter Fax 150W allows a remote attacker to gain privileges via the LDAP and SMTP credentials. | Unknown | N/A | n/a | |
CVE-2023-36085 | The sisqualWFM 7.1.319.103 thru 7.1.319.111 for Android, has a host header injection vulnerability in its "/sisqualIdentityServer/core/" endpoint. By modifying the HTTP Host header, an attacker can change webpage links and even redirect users to arbitrary or malicious locations. This can lead to phishing attacks, malware distribution, and unauthorized access to sensitive resources. | Unknown | N/A | n/a | |
CVE-2023-36088 | Server Side Request Forgery (SSRF) vulnerability in NebulaGraph Studio version 3.7.0, allows remote attackers to gain sensitive information. | Unknown | N/A | n/a | |
CVE-2023-36089 | Authentication Bypass vulnerability in D-Link DIR-645 firmware version 1.03 allows remote attackers to gain escalated privileges via function phpcgi_main in cgibin. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | Unknown | N/A | n/a | |
CVE-2023-3609 | A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc. | Unknown | N/A | Linux | |
CVE-2023-36090 | Authentication Bypass vulnerability in D-Link DIR-885L FW102b01 allows remote attackers to gain escalated privileges via phpcgi. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | Unknown | N/A | n/a | |
CVE-2023-36091 | Authentication Bypass vulnerability in D-Link DIR-895 FW102b07 allows remote attackers to gain escalated privileges via via function phpcgi_main in cgibin. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | Unknown | N/A | n/a | |
CVE-2023-36092 | Authentication Bypass vulnerability in D-Link DIR-859 FW105b03 allows remote attackers to gain escalated privileges via via phpcgi_main. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | Unknown | N/A | n/a | |
CVE-2023-36093 | There is a storage type cross site scripting (XSS) vulnerability in the filing number of the Basic Information tab on the backend management page of EyouCMS v1.6.3 | Unknown | N/A | n/a | |
CVE-2023-36095 | An issue in Harrison Chase langchain v.0.0.194 allows an attacker to execute arbitrary code via the python exec calls in the PALChain, affected functions include from_math_prompt and from_colored_object_prompt. | Unknown | N/A | n/a | |
CVE-2023-36097 | funadmin v3.3.2 and v3.3.3 are vulnerable to Insecure file upload via the plugins install. | Unknown | N/A | n/a | |
CVE-2023-3610 | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered. We recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795. | Unknown | N/A | Linux | |
CVE-2023-36100 | An issue was discovered in IceCMS version 2.0.1, allows attackers to escalate privileges and gain sensitive information via UserID parameter in api/User/ChangeUser. | Unknown | N/A | n/a | |
CVE-2023-36103 | Command Injection vulnerability in goform/SetIPTVCfg interface of Tenda AC15 V15.03.05.20 allows remote attackers to run arbitrary commands via crafted POST request. | Unknown | N/A | n/a | |
CVE-2023-36106 | An incorrect access control vulnerability in powerjob 4.3.2 and earlier allows remote attackers to obtain sensitive information via the interface for querying via appId parameter to /container/list. | Unknown | N/A | n/a | |
CVE-2023-36109 | Buffer Overflow vulnerability in JerryScript version 3.0, allows remote attackers to execute arbitrary code via ecma_stringbuilder_append_raw component at /jerry-core/ecma/base/ecma-helpers-string.c. | Unknown | N/A | n/a | |
CVE-2023-3611 | An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks. We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64. | Unknown | N/A | Linux |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v