Vulnerabilities (CVE)

Filtered by NVD-CWE-noinfo
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-2638 3 Netapp, Oracle, Redhat 24 Active Iq Unified Manager, Cloud Backup, E-series Santricity Management Plug-ins and 21 more 2023-11-21 5.1 MEDIUM 8.3 HIGH
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u152 and 9.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2018-2639 2 Oracle, Redhat 7 Jdk, Jre, Enterprise Linux Desktop and 4 more 2023-11-21 6.8 MEDIUM 8.3 HIGH
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u152 and 9.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2023-45161 1 1e 1 Platform 2023-11-21 N/A 7.2 HIGH
The 1E-Exchange-URLResponseTime instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the URL parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients. To remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-URLResponseTime instruction to v20.1 by uploading it through the 1E Platform instruction upload UI
CVE-2023-5964 1 1e 1 Platform 2023-11-21 N/A 7.2 HIGH
The 1E-Exchange-DisplayMessageinstruction that is part of the End-User Interaction product pack available on the 1E Exchange does not properly validate the Caption or Message parameters, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients. To remediate this issue DELETE the instruction “Show dialogue with caption %Caption% and message %Message%” from the list of instructions in the Settings UI, and replace it with the new instruction 1E-Exchange-ShowNotification instruction available in the updated End-User Interaction product pack. The new instruction should show as “Show %Type% type notification with header %Header% and message %Message%” with a version of 7.1 or above.
CVE-2023-45163 1 1e 1 Platform 2023-11-21 N/A 7.2 HIGH
The 1E-Exchange-CommandLinePing instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the input parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients. To remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-CommandLinePing instruction to v18.1 by uploading it through the 1E Platform instruction upload UI
CVE-2018-2637 6 Canonical, Debian, Hp and 3 more 16 Ubuntu Linux, Debian Linux, Xp7 Command View and 13 more 2023-11-21 5.8 MEDIUM 7.4 HIGH
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
CVE-2023-31203 1 Intel 1 Openvino Model Server 2023-11-21 N/A 7.5 HIGH
Improper input validation in some OpenVINO Model Server software before version 2022.3 for Intel Distribution of OpenVINO toolkit may allow an unauthenticated user to potentially enable denial of service via network access.
CVE-2023-43591 1 Zoom 1 Rooms 2023-11-21 N/A 7.8 HIGH
Improper privilege management in Zoom Rooms for macOS before version 5.16.0 may allow an authenticated user to conduct an escalation of privilege via local access.
CVE-2023-48089 1 Xuxueli 1 Xxl-job 2023-11-21 N/A 8.8 HIGH
xxl-job-admin 2.4.0 is vulnerable to Remote Code Execution (RCE) via /xxl-job-admin/jobcode/save.
CVE-2023-36021 1 Microsoft 1 On-prem Data Gateway 2023-11-21 N/A 8.0 HIGH
Microsoft On-Prem Data Gateway Security Feature Bypass Vulnerability
CVE-2023-36025 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2023-11-21 N/A 8.8 HIGH
Windows SmartScreen Security Feature Bypass Vulnerability
CVE-2023-39203 1 Zoom 2 Virtual Desktop Infrastructure, Zoom 2023-11-21 N/A 7.5 HIGH
Uncontrolled resource consumption in Zoom Team Chat for Zoom Desktop Client for Windows and Zoom VDI Client may allow an unauthenticated user to conduct a disclosure of information via network access.
CVE-2023-36422 1 Microsoft 1 Windows Defender 2023-11-20 N/A 7.8 HIGH
Microsoft Windows Defender Elevation of Privilege Vulnerability
CVE-2023-36423 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2023-11-20 N/A 8.8 HIGH
Microsoft Remote Registry Service Remote Code Execution Vulnerability
CVE-2023-36439 1 Microsoft 1 Exchange Server 2023-11-20 N/A 8.0 HIGH
Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2023-36560 1 Microsoft 14 .net Framework, Windows 10 1507, Windows 10 1607 and 11 more 2023-11-20 N/A 8.8 HIGH
ASP.NET Security Feature Bypass Vulnerability
CVE-2023-36400 1 Microsoft 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more 2023-11-20 N/A 8.8 HIGH
Windows HMAC Key Derivation Elevation of Privilege Vulnerability
CVE-2023-36401 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2023-11-20 N/A 7.2 HIGH
Microsoft Remote Registry Service Remote Code Execution Vulnerability
CVE-2023-36399 1 Microsoft 4 Windows 11 21h2, Windows 11 22h2, Windows 11 23h2 and 1 more 2023-11-20 N/A 7.1 HIGH
Windows Storage Elevation of Privilege Vulnerability
CVE-2023-36402 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2023-11-20 N/A 8.8 HIGH
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2023-36033 1 Microsoft 9 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 6 more 2023-11-20 N/A 7.8 HIGH
Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2023-36036 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2023-11-20 N/A 7.8 HIGH
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2023-36035 1 Microsoft 1 Exchange Server 2023-11-20 N/A 8.0 HIGH
Microsoft Exchange Server Spoofing Vulnerability
CVE-2023-36037 1 Microsoft 4 365 Apps, Excel, Office and 1 more 2023-11-20 N/A 7.8 HIGH
Microsoft Excel Security Feature Bypass Vulnerability
CVE-2023-36039 1 Microsoft 1 Exchange Server 2023-11-20 N/A 8.0 HIGH
Microsoft Exchange Server Spoofing Vulnerability
CVE-2023-38151 1 Microsoft 2 Host Integration Server, Ole Db Provider 2023-11-20 N/A 8.8 HIGH
Microsoft Host Integration Server 2020 Remote Code Execution Vulnerability
CVE-2023-36045 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2023-11-20 N/A 7.8 HIGH
Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2023-36046 1 Microsoft 4 Windows 11 21h2, Windows 11 22h2, Windows 11 23h2 and 1 more 2023-11-20 N/A 7.1 HIGH
Windows Authentication Denial of Service Vulnerability
CVE-2023-36047 1 Microsoft 8 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 5 more 2023-11-20 N/A 7.8 HIGH
Windows Authentication Elevation of Privilege Vulnerability
CVE-2023-36050 1 Microsoft 1 Exchange Server 2023-11-20 N/A 8.0 HIGH
Microsoft Exchange Server Spoofing Vulnerability
CVE-2023-36052 1 Microsoft 1 Azure Cli 2023-11-20 N/A 8.6 HIGH
Azure CLI REST Command Information Disclosure Vulnerability
CVE-2023-36392 1 Microsoft 4 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 1 more 2023-11-20 N/A 7.5 HIGH
DHCP Server Service Denial of Service Vulnerability
CVE-2023-36393 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2023-11-20 N/A 7.8 HIGH
Windows User Interface Application Core Remote Code Execution Vulnerability
CVE-2023-36394 1 Microsoft 9 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 6 more 2023-11-20 N/A 7.0 HIGH
Windows Search Service Elevation of Privilege Vulnerability
CVE-2023-36395 1 Microsoft 5 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 2 more 2023-11-20 N/A 7.5 HIGH
Windows Deployment Services Denial of Service Vulnerability
CVE-2023-36396 1 Microsoft 2 Windows 11 22h2, Windows 11 23h2 2023-11-20 N/A 7.8 HIGH
Windows Compressed Folder Remote Code Execution Vulnerability
CVE-2023-47117 1 Humansignal 1 Label Studio 2023-11-20 N/A 7.5 HIGH
Label Studio is an open source data labeling tool. In all current versions of Label Studio prior to 1.9.2post0, the application allows users to insecurely set filters for filtering tasks. An attacker can construct a filter chain to filter tasks based on sensitive fields for all user accounts on the platform by exploiting Django's Object Relational Mapper (ORM). Since the results of query can be manipulated by the ORM filter, an attacker can leak these sensitive fields character by character. In addition, Label Studio had a hard coded secret key that an attacker can use to forge a session token of any user by exploiting this ORM Leak vulnerability to leak account password hashes. This vulnerability has been addressed in commit `f931d9d129` which is included in the 1.9.2post0 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-6101 1 Maiwei Safety Production Control Platform Project 1 Maiwei Safety Production Control Platform 2023-11-20 N/A 7.5 HIGH
A vulnerability, which was classified as problematic, has been found in Maiwei Safety Production Control Platform 4.1. This issue affects some unknown processing of the file /TC/V2.7/ha.html of the component Intelligent Monitoring. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-245063. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2020-8973 1 Zigor 2 Zgr Tps200 Ng, Zgr Tps200 Ng Firmware 2023-11-20 N/A 8.1 HIGH
ZGR TPS200 NG in its 2.00 firmware version and 1.01 hardware version, does not properly accept specially constructed requests. This allows an attacker with access to the network where the affected asset is located, to operate and change several parameters without having to be registered as a user on the web that owns the device.
CVE-2014-125102 1 Bestwebsoft 1 Relevant 2023-11-18 N/A 7.5 HIGH
A vulnerability classified as problematic was found in Bestwebsoft Relevant Plugin up to 1.0.7 on WordPress. Affected by this vulnerability is an unknown functionality of the component Thumbnail Handler. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.0.8 is able to address this issue. The identifier of the patch is 860d1891025548cf0f5f97364c1f51a888f523c3. It is recommended to upgrade the affected component. The identifier VDB-230113 was assigned to this vulnerability.
CVE-2018-8863 1 Philips 1 Encoreanywhere 2023-11-17 N/A 7.5 HIGH
The HTTP header in Philips EncoreAnywhere contains data an attacker may be able to use to gain sensitive information.
CVE-2022-41076 1 Microsoft 11 Powershell, Windows 10, Windows 11 and 8 more 2023-11-17 N/A 8.5 HIGH
PowerShell Remote Code Execution Vulnerability
CVE-2022-41089 1 Microsoft 11 .net Framework, Windows 10, Windows 11 and 8 more 2023-11-17 N/A 7.8 HIGH
.NET Framework Remote Code Execution Vulnerability
CVE-2022-41121 1 Microsoft 12 Powershell, Remote Desktop, Windows 10 and 9 more 2023-11-17 N/A 7.8 HIGH
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2022-44689 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2019 and 2 more 2023-11-17 N/A 7.8 HIGH
Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability
CVE-2022-44702 1 Microsoft 3 Terminal, Windows 10, Windows 11 2023-11-17 N/A 7.8 HIGH
Windows Terminal Remote Code Execution Vulnerability
CVE-2022-44704 1 Microsoft 1 Windows Sysmon 2023-11-17 N/A 7.8 HIGH
Microsoft Windows System Monitor (Sysmon) Elevation of Privilege Vulnerability
CVE-2023-45558 1 Golden Project 1 Golden 2023-11-17 N/A 7.5 HIGH
An issue in Golden v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.
CVE-2023-45560 1 Memberscard Project 1 Memberscard 2023-11-17 N/A 7.5 HIGH
An issue in Yasukawa memberscard v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.
CVE-2023-39228 4 Apple, Google, Intel and 1 more 4 Iphone Os, Android, Unison Software and 1 more 2023-11-17 N/A 7.5 HIGH
Improper access control for some Intel Unison software may allow an unauthenticated user to potentially enable denial of service via network access.