Show filters
94,096 Total Results
Displaying 331-340 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Very Low

CVE-2023-35618

Disclosure Date: December 07, 2023 (last updated February 25, 2025)
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
Attacker Value
Very High

CVE-2023-6448

Disclosure Date: December 05, 2023 (last updated February 25, 2025)
Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.
Attacker Value
Unknown

CVE-2021-35975

Disclosure Date: November 30, 2023 (last updated February 25, 2025)
Absolute path traversal vulnerability in the Systematica SMTP Adapter component (up to v2.0.1.101) in Systematica Radius (up to v.3.9.256.777) allows remote attackers to read arbitrary files via a full pathname in GET parameter "file" in URL. Also: affected components in same product - HTTP Adapter (up to v.1.8.0.15), MSSQL MessageBus Proxy (up to v.1.1.06), Financial Calculator (up to v.1.3.05), FIX Adapter (up to v.2.4.0.25)
Attacker Value
Low

CVE-2023-6209

Disclosure Date: November 21, 2023 (last updated February 25, 2025)
Relative URLs starting with three slashes were incorrectly parsed, and a path-traversal "/../" part in the path could be used to override the specified host. This could contribute to security problems in web sites. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.
Attacker Value
Unknown

CVE-2023-38547

Disclosure Date: November 07, 2023 (last updated March 07, 2025)
A vulnerability in Veeam ONE allows an unauthenticated user to gain information about the SQL server connection Veeam ONE uses to access its configuration database. This may lead to remote code execution on the SQL server hosting the Veeam ONE configuration database.
Attacker Value
High

CVE-2023-5360

Disclosure Date: October 31, 2023 (last updated February 25, 2025)
The Royal Elementor Addons and Templates WordPress plugin before 1.3.79 does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE.
Attacker Value
Moderate

CVE-2023-46748

Disclosure Date: October 26, 2023 (last updated February 25, 2025)
An authenticated SQL injection vulnerability exists in the BIG-IP Configuration utility which may allow an authenticated attacker with network access to the Configuration utility through the BIG-IP management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Attacker Value
Very High

CVE-2023-20273

Disclosure Date: October 25, 2023 (last updated February 25, 2025)
A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands with the privileges of root. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
Attacker Value
High

CVE-2023-43654

Disclosure Date: September 28, 2023 (last updated February 25, 2025)
TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper input validation, enabling third parties to invoke remote HTTP download requests and write files to the disk. This issue could be taken advantage of to compromise the integrity of the system and sensitive data. This issue is present in versions 0.1.0 to 0.8.1. A user is able to load the model of their choice from any URL that they would like to use. The user of TorchServe is responsible for configuring both the allowed_urls and specifying the model URL to be used. A pull request to warn the user when the default value for allowed_urls is used has been merged in PR #2534. TorchServe release 0.8.2 includes this change. Users are advised to upgrade. There are no known workarounds for this issue.
Attacker Value
Very High

CVE-2023-42820

Disclosure Date: September 27, 2023 (last updated February 25, 2025)
JumpServer is an open source bastion host. This vulnerability is due to exposing the random number seed to the API, potentially allowing the randomly generated verification codes to be replayed, which could lead to password resets. If MFA is enabled users are not affect. Users not using local authentication are also not affected. Users are advised to upgrade to either version 2.28.19 or to 3.6.5. There are no known workarounds or this issue.