Show filters
94,108 Total Results
Displaying 371-380 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Moderate

CVE-2022-43939

Disclosure Date: April 03, 2023 (last updated February 24, 2025)
Hitachi Vantara Pentaho Business Analytics Server versions before 9.4.0.1 and 9.3.0.2, including 8.3.x contain security restrictions using non-canonical URLs which can be circumvented.
Attacker Value
High

CVE-2022-43769

Disclosure Date: April 03, 2023 (last updated February 24, 2025)
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.1 and 9.3.0.2, including 8.3.x allow certain web services to set property values which contain Spring templates that are interpreted downstream.
Attacker Value
High

CVE-2023-28879

Disclosure Date: March 31, 2023 (last updated February 24, 2025)
In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written.
Attacker Value
Low

CVE-2023-27253

Disclosure Date: March 17, 2023 (last updated February 24, 2025)
A command injection vulnerability in the function restore_rrddata() of Netgate pfSense v2.7.0 allows authenticated attackers to execute arbitrary commands via manipulating the contents of an XML file supplied to the component config.xml.
Attacker Value
High

CVE-2023-24892

Disclosure Date: March 14, 2023 (last updated March 01, 2025)
Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability
2
Attacker Value
Moderate

CVE-2023-23396

Disclosure Date: March 14, 2023 (last updated February 24, 2025)
Microsoft Excel Denial of Service Vulnerability
Attacker Value
High

CVE-2023-26035

Disclosure Date: February 25, 2023 (last updated February 24, 2025)
ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are vulnerable to Unauthenticated Remote Code Execution via Missing Authorization. There are no permissions check on the snapshot action, which expects an id to fetch an existing monitor but can be passed an object to create a new one instead. TriggerOn ends up calling shell_exec using the supplied Id. This issue is fixed in This issue is fixed in versions 1.36.33 and 1.37.33.
Attacker Value
Low

CVE-2023-25194

Disclosure Date: February 07, 2023 (last updated February 24, 2025)
A possible security vulnerability has been identified in Apache Kafka Connect API. This requires access to a Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka Connect clusters since Apache Kafka Connect 2.3.0. When configuring the connector via the Kafka Connect REST API, an authenticated operator can set the `sasl.jaas.config` property for any of the connector's Kafka clients to "com.sun.security.auth.module.JndiLoginModule", which can be done via the `producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config`, or `admin.override.sasl.jaas.config` properties. This will allow the server to connect to the attacker's LDAP server and deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafka connect server. Attacker can cause unrestricted deserialization of untrusted data (or) RC…
Attacker Value
Very High

CVE-2023-23333

Disclosure Date: February 06, 2023 (last updated February 24, 2025)
There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.
Attacker Value
High

CVE-2023-25135

Disclosure Date: February 03, 2023 (last updated February 24, 2025)
vBulletin before 5.6.9 PL1 allows an unauthenticated remote attacker to execute arbitrary code via a crafted HTTP request that triggers deserialization. This occurs because verify_serialized checks that a value is serialized by calling unserialize and then checking for errors. The fixed versions are 5.6.7 PL1, 5.6.8 PL1, and 5.6.9 PL1.