Hub
Track the CVEs CISA says attackers are using in the wild, review remediation due dates, and pivot into the full CVE record when you need patch context.
What this page covers
This hub follows the official CISA KEV catalog and joins it to local CVE records where cached metadata is already available. Use it for a patch-now queue, then jump into the linked CVE detail pages for remediation guidance and executive summaries.
Catalog size
1583
Current KEV entries from CISA.
Visible rows
1583
After local filters are applied.
Ransomware-linked
317
Rows CISA explicitly marks as ransomware-related.
Awaiting enrichment
0
Older KEV rows without cached CVSS metadata yet.
Severity histogram
| CVE | Severity | Vendor | Product | Date added | Due date | Ransomware | Description | Details |
|---|---|---|---|---|---|---|---|---|
| CVE-2025-29635 | HIGH 7.2 | D-Link | DIR-823X | Apr 24, 2026 | May 8, 2026 | Unknown | A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function, triggering remote command execution. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-7399 | HIGH 8.8 | Samsung | MagicINFO 9 Server | Apr 24, 2026 | May 8, 2026 | Unknown | Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1050 allows attackers to write arbitrary file as system authority. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-57728 | HIGH 7.2 | SimpleHelp | SimpleHelp | Apr 24, 2026 | May 8, 2026 | Unknown | SimpleHelp remote support software v5.5.7 and before allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-57726 | CRITICAL 9.9 | SimpleHelp | SimpleHelp | Apr 24, 2026 | May 8, 2026 | Unknown | SimpleHelp remote support software v5.5.7 and before has a vulnerability that allows low-privileges technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-39987 | CRITICAL 9.3 | Marimo | Marimo | Apr 23, 2026 | May 7, 2026 | Unknown | marimo is a reactive Python notebook. Prior to 0.23.0, Marimo has a Pre-Auth RCE vulnerability. The terminal WebSocket endpoint /terminal/ws lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands. Unlike other WebSocket endpoints (e.g., /ws) that correctly call validate_auth() for authentication, the /terminal/ws endpoint only checks the running mode and platform support before accepting connections, completely skipping authentication verification. This vulnerability is fixed in 0.23.0. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-33825 | HIGH 7.8 | Microsoft | Defender | Apr 22, 2026 | May 6, 2026 | Unknown | Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to elevate privileges locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-20122 | MEDIUM 5.4 | Cisco | Catalyst SD-WAN Manger | Apr 20, 2026 | Apr 23, 2026 | Unknown | A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the attacker must have valid read-only credentials with API access on the affected system. This vulnerability is due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges. Required action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. | Open |
| CVE-2026-20133 | MEDIUM 6.5 | Cisco | Catalyst SD-WAN Manager | Apr 20, 2026 | Apr 23, 2026 | Unknown | A vulnerability in Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to view sensitive information on an affected system. This vulnerability is due to insufficient file system access restrictions. An attacker could exploit this vulnerability by accessing the API of an affected system. A successful exploit could allow the attacker to read sensitive information on the underlying operating system. Required action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. | Open |
| CVE-2025-2749 | HIGH 7.2 | Kentico | Kentico Xperience | Apr 20, 2026 | May 4, 2026 | Unknown | An authenticated remote code execution in Kentico Xperience allows authenticated users Staging Sync Server to upload arbitrary data to path relative locations. This results in path traversal and arbitrary file upload, including content that can be executed server side leading to remote code execution.This issue affects Kentico Xperience through 13.0.178. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-27351 | HIGH 7.5 | PaperCut | NG/MF | Apr 20, 2026 | May 4, 2026 | Known | This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SecurityRequestFilter class. The issue results from improper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19226. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-48700 | MEDIUM 6.1 | Synacor | Zimbra Collaboration Suite (ZCS) | Apr 20, 2026 | Apr 23, 2026 | Unknown | An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0 and 10.0 and 10.1. A Cross-Site Scripting (XSS) vulnerability in the Zimbra Classic UI allows attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information. This issue arises from insufficient sanitization of HTML content, specifically involving crafted tag structures and attribute values that include an @import directive and other script injection vectors. The vulnerability is triggered when a user views a crafted e-mail message in the Classic UI, requiring no additional user interaction. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-20128 | HIGH 7.5 | Cisco | Catalyst SD-WAN Manager | Apr 20, 2026 | Apr 23, 2026 | Unknown | A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker to gain DCA user privileges on an affected system. To exploit this vulnerability, the attacker must have valid vmanage credentials on the affected system. This vulnerability is due to the presence of a credential file for the DCA user on an affected system. An attacker could exploit this vulnerability by accessing the filesystem as a low-privileged user and reading the file that contains the DCA password from that affected system. A successful exploit could allow the attacker to access another affected system and gain DCA user privileges. Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability. Required action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. | Open |
| CVE-2025-32975 | CRITICAL 10.0 | Quest | KACE Systems Management Appliance (SMA) | Apr 20, 2026 | May 4, 2026 | Unknown | Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. The vulnerability exists in the SSO authentication handling mechanism and can lead to complete administrative takeover. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-27199 | HIGH 7.3 | JetBrains | TeamCity | Apr 20, 2026 | May 4, 2026 | Known | In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-34197 | HIGH 8.8 | Apache | ActiveMQ | Apr 16, 2026 | Apr 30, 2026 | Unknown | Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) and BrokerService.addConnector(String). An authenticated attacker can invoke these operations with a crafted discovery URI that triggers the VM transport's brokerConfig parameter to load a remote Spring XML application context using ResourceXmlApplicationContext. Because Spring's ResourceXmlApplicationContext instantiates all singleton beans before the BrokerService validates the configuration, arbitrary code execution occurs on the broker's JVM through bean factory methods such as Runtime.exec(). This issue affects Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ All: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ: before 5.19.4, from 6.0.0 before 6.2.3. Users are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the issue Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2009-0238 | HIGH 8.8 | Microsoft | Office | Apr 14, 2026 | Apr 28, 2026 | Unknown | Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP3, and 2007 SP1; Excel Viewer 2003 Gold and SP3; Excel Viewer; Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1; and Excel in Microsoft Office 2004 and 2008 for Mac allow remote attackers to execute arbitrary code via a crafted Excel document that triggers an access attempt on an invalid object, as exploited in the wild in February 2009 by Trojan.Mdropper.AC. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-32201 | MEDIUM 6.5 | Microsoft | SharePoint Server | Apr 14, 2026 | Apr 28, 2026 | Unknown | Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2012-1854 | HIGH 7.8 | Microsoft | Visual Basic for Applications (VBA) | Apr 13, 2026 | Apr 27, 2026 | Unknown | Untrusted search path vulnerability in VBE6.dll in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Microsoft Visual Basic for Applications (VBA); and Summit Microsoft Visual Basic for Applications SDK allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .docx file, aka "Visual Basic for Applications Insecure Library Loading Vulnerability," as exploited in the wild in July 2012. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-60710 | HIGH 7.8 | Microsoft | Windows | Apr 13, 2026 | Apr 27, 2026 | Unknown | Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-21529 | HIGH 8.8 | Microsoft | Exchange Server | Apr 13, 2026 | Apr 27, 2026 | Known | Microsoft Exchange Server Remote Code Execution Vulnerability Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-36424 | HIGH 7.8 | Microsoft | Windows | Apr 13, 2026 | Apr 27, 2026 | Unknown | Windows Common Log File System Driver Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2020-9715 | HIGH 7.8 | Adobe | Acrobat | Apr 13, 2026 | Apr 27, 2026 | Unknown | Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution . Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-21643 | CRITICAL 9.8 | Fortinet | FortiClient EMS | Apr 13, 2026 | Apr 16, 2026 | Unknown | An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-34621 | HIGH 8.6 | Adobe | Acrobat and Reader | Apr 13, 2026 | Apr 27, 2026 | Unknown | Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-1340 | CRITICAL 9.8 | Ivanti | Endpoint Manager Mobile (EPMM) | Apr 8, 2026 | Apr 11, 2026 | Unknown | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-35616 | CRITICAL 9.8 | Fortinet | FortiClient EMS | Apr 6, 2026 | Apr 9, 2026 | Unknown | A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-3502 | HIGH 7.8 | TrueConf | Client | Apr 2, 2026 | Apr 16, 2026 | Unknown | TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-5281 | HIGH 8.8 | Dawn | Apr 1, 2026 | Apr 15, 2026 | Unknown | Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2026-3055 | CRITICAL 9.3 | Citrix | NetScaler | Mar 30, 2026 | Apr 2, 2026 | Unknown | Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-53521 | HIGH 8.7 | F5 | BIG-IP | Mar 27, 2026 | Mar 30, 2026 | Unknown | When a BIG-IP APM Access Policy is configured on a virtual server, undisclosed traffic can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-33634 | CRITICAL 9.4 | Aquasecurity | Trivy | Mar 26, 2026 | Apr 9, 2026 | Unknown | Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credential-stealing malware, and replace all 7 tags in `aquasecurity/setup-trivy` with malicious commits. This incident is a continuation of the supply chain attack that began in late February 2026. Following the initial disclosure on March 1, credential rotation was performed but was not atomic (not all credentials were revoked simultaneously). The attacker could have use a valid token to exfiltrate newly rotated secrets during the rotation window (which lasted a few days). This could have allowed the attacker to retain access and execute the March 19 attack. Affected components include the `aquasecurity/trivy` Go / Container image version 0.69.4, the `aquasecurity/trivy-action` GitHub Action versions 0.0.1 – 0.34.2 (76/77), and the`aquasecurity/setup-trivy` GitHub Action versions 0.2.0 – 0.2.6, prior to the recreation of 0.2.6 with a safe commit. Known safe versions include versions 0.69.2 and 0.69.3 of the Trivy binary, version 0.35.0 of trivy-action, and version 0.2.6 of setup-trivy. Additionally, take other mitigations to ensure the safety of secrets. If there is any possibility that a compromised version ran in one's environment, all secrets accessible to affected pipelines must be treated as exposed and rotated immediately. Check whether one's organization pulled or executed Trivy v0.69.4 from any source. Remove any affected artifacts immediately. Review all workflows using `aquasecurity/trivy-action` or `aquasecurity/setup-trivy`. Those who referenced a version tag rather than a full commit SHA should check workflow run logs from March 19–20, 2026 for signs of compromise. Look for repositories named `tpcp-docs` in one's GitHub organization. The presence of such a repository may indicate that the fallback exfiltration mechanism was triggered and secrets were successfully stolen. Pin GitHub Actions to full, immutable commit SHA hashes, don't use mutable version tags. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-33017 | CRITICAL 9.3 | Langflow | Langflow | Mar 25, 2026 | Apr 8, 2026 | Unknown | Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored flow data from the database. This code is passed to exec() with zero sandboxing, resulting in unauthenticated remote code execution. This is distinct from CVE-2025-3248, which fixed /api/v1/validate/code by adding authentication. The build_public_tmp endpoint is designed to be unauthenticated (for public flows) but incorrectly accepts attacker-supplied flow data containing arbitrary executable code. This issue has been fixed in version 1.9.0. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-32432 | CRITICAL 10.0 | Craft CMS | Craft CMS | Mar 20, 2026 | Apr 3, 2026 | Unknown | Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-54068 | CRITICAL 9.2 | Laravel | Livewire | Mar 20, 2026 | Apr 3, 2026 | Unknown | Livewire is a full-stack framework for Laravel. In Livewire v3 up to and including v3.6.3, a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does not require authentication or user interaction. This issue has been patched in Livewire v3.6.4. All users are strongly encouraged to upgrade to this version or later as soon as possible. No known workarounds are available. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-43510 | HIGH 7.8 | Apple | Multiple Products | Mar 20, 2026 | Apr 3, 2026 | Unknown | A memory corruption issue was addressed with improved lock state checking. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A malicious application may cause unexpected changes in memory shared between processes. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-43520 | MEDIUM 5.5 | Apple | Multiple Products | Mar 20, 2026 | Apr 3, 2026 | Unknown | A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-31277 | HIGH 8.8 | Apple | Multiple Products | Mar 20, 2026 | Apr 3, 2026 | Unknown | The issue was addressed with improved memory handling. This issue is fixed in Safari 18.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing maliciously crafted web content may lead to memory corruption. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-20131 | CRITICAL 10.0 | Cisco | Secure Firewall Management Center (FMC) | Mar 19, 2026 | Mar 22, 2026 | Known | A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root. Note: If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-66376 | HIGH 7.2 | Synacor | Zimbra Collaboration Suite (ZCS) | Mar 18, 2026 | Apr 1, 2026 | Unknown | Zimbra Collaboration (ZCS) 10 before 10.0.18 and 10.1 before 10.1.13 allows Classic UI stored XSS via Cascading Style Sheets (CSS) @import directives in an HTML e-mail message. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-20963 | HIGH 8.8 | Microsoft | SharePoint | Mar 18, 2026 | Mar 21, 2026 | Unknown | Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-47813 | MEDIUM 4.3 | Wing FTP Server | Wing FTP Server | Mar 16, 2026 | Mar 30, 2026 | Unknown | loginok.html in Wing FTP Server before 7.4.4 discloses the full local installation path of the application when using a long value in the UID cookie. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-3910 | HIGH 8.8 | Chromium V8 | Mar 13, 2026 | Mar 27, 2026 | Unknown | Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2026-3909 | HIGH 8.8 | Skia | Mar 13, 2026 | Mar 27, 2026 | Unknown | Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2025-68613 | CRITICAL 9.9 | n8n | n8n | Mar 11, 2026 | Mar 25, 2026 | Unknown | n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-22054 | HIGH 7.5 | Omnissa | Workspace One UEM | Mar 9, 2026 | Mar 23, 2026 | Unknown | VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain an SSRF vulnerability. This issue may allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-26399 | CRITICAL 9.8 | SolarWinds | Web Help Desk | Mar 9, 2026 | Mar 12, 2026 | Unknown | SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-1603 | HIGH 8.6 | Ivanti | Endpoint Manager (EPM) | Mar 9, 2026 | Mar 23, 2026 | Unknown | An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2017-7921 | CRITICAL 9.8 | Hikvision | Multiple Products | Mar 5, 2026 | Mar 26, 2026 | Unknown | An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build 161125, DS-2CD4x2xFWD Series V5.2.0 build 140721 to V5.4.0 Build 160414, DS-2CD4xx5 Series V5.2.0 build 140721 to V5.4.0 Build 160421, DS-2DFx Series V5.2.0 build 140805 to V5.4.5 Build 160928, and DS-2CD63xx Series V5.0.9 build 140305 to V5.3.5 Build 160106 devices. The improper authentication vulnerability occurs when an application does not adequately or correctly authenticate users. This may allow a malicious user to escalate his or her privileges on the system and gain access to sensitive information. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-22681 | CRITICAL 9.8 | Rockwell | Multiple Products | Mar 5, 2026 | Mar 26, 2026 | Unknown | Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-43000 | HIGH 8.8 | Apple | Multiple Products | Mar 5, 2026 | Mar 26, 2026 | Unknown | A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.5, iOS 16.6 and iPadOS 16.6, Safari 16.6, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to memory corruption. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-30952 | HIGH 7.8 | Apple | Multiple Products | Mar 5, 2026 | Mar 26, 2026 | Unknown | An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-41974 | HIGH 7.8 | Apple | iOS and iPadOS | Mar 5, 2026 | Mar 26, 2026 | Unknown | A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, iOS 15.8.7 and iPadOS 15.8.7. An app may be able to execute arbitrary code with kernel privileges. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-22719 | HIGH 8.1 | Broadcom | VMware Aria Operations | Mar 3, 2026 | Mar 24, 2026 | Unknown | VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress. To remediate CVE-2026-22719, apply the patches listed in the 'Fixed Version' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001 Workarounds for CVE-2026-22719 are documented in the 'Workarounds' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001 Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-21385 | HIGH 7.8 | Qualcomm | Multiple Chipsets | Mar 3, 2026 | Mar 24, 2026 | Unknown | Memory corruption while using alignments for memory allocation. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2022-20775 | HIGH 7.8 | Cisco | SD-WAN | Feb 25, 2026 | Feb 27, 2026 | Unknown | A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Required action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. | Open |
| CVE-2026-20127 | CRITICAL 10.0 | Cisco | Catalyst SD-WAN Controller and Manager | Feb 25, 2026 | Feb 27, 2026 | Unknown | A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric. Required action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. | Open |
| CVE-2026-25108 | HIGH 8.7 | Soliton Systems K.K | FileZen | Feb 24, 2026 | Mar 17, 2026 | Unknown | FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-49113 | CRITICAL 9.9 | Roundcube | Webmail | Feb 20, 2026 | Mar 13, 2026 | Unknown | Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-68461 | HIGH 7.2 | Roundcube | Webmail | Feb 20, 2026 | Mar 13, 2026 | Unknown | Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a Cross-Site-Scripting (XSS) vulnerability via the animate tag in an SVG document. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-22175 | MEDIUM 6.8 | GitLab | GitLab | Feb 18, 2026 | Mar 11, 2026 | Unknown | When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-22769 | CRITICAL 10.0 | Dell | RecoverPoint for Virtual Machines (RP4VMs) | Feb 18, 2026 | Feb 21, 2026 | Unknown | Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgrade or apply one of the remediations as soon as possible. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2020-7796 | CRITICAL 9.8 | Synacor | Zimbra Collaboration Suite | Feb 17, 2026 | Mar 10, 2026 | Unknown | Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-7694 | HIGH 7.2 | TeamT5 | ThreatSonar Anti-Ransomware | Feb 17, 2026 | Mar 10, 2026 | Unknown | ThreatSonar Anti-Ransomware from TeamT5 does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system command on the server. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2008-0015 | HIGH 8.8 | Microsoft | Windows | Feb 17, 2026 | Mar 10, 2026 | Unknown | Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted web page, as exploited in the wild in July 2009, aka "Microsoft Video ActiveX Control Vulnerability." Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-2441 | HIGH 8.8 | Chromium | Feb 17, 2026 | Mar 10, 2026 | Unknown | Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2026-1731 | CRITICAL 9.9 | BeyondTrust | Remote Support (RS) and Privileged Remote Access (PRA) | Feb 13, 2026 | Feb 16, 2026 | Known | BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-20700 | UNKNOWN 0.0 | Apple | Multiple Products | Feb 12, 2026 | Mar 5, 2026 | Unknown | A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-43468 | CRITICAL 9.8 | Microsoft | Configuration Manager | Feb 12, 2026 | Mar 5, 2026 | Unknown | Microsoft Configuration Manager Remote Code Execution Vulnerability Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-15556 | HIGH 7.7 | Notepad++ | Notepad++ | Feb 12, 2026 | Mar 5, 2026 | Unknown | Notepad++ versions prior to 8.8.9, when using the WinGUp updater, contain an update integrity verification vulnerability where downloaded update metadata and installers are not cryptographically verified. An attacker able to intercept or redirect update traffic can cause the updater to download and execute an attacker-controlled installer, resulting in arbitrary code execution with the privileges of the user. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-40536 | HIGH 8.1 | SolarWinds | Web Help Desk | Feb 12, 2026 | Feb 15, 2026 | Unknown | SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that if exploited, could allow an unauthenticated attacker to gain access to certain restricted functionality. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-21513 | HIGH 8.8 | Microsoft | Windows | Feb 10, 2026 | Mar 3, 2026 | Unknown | Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-21525 | MEDIUM 6.2 | Microsoft | Windows | Feb 10, 2026 | Mar 3, 2026 | Unknown | Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-21510 | HIGH 8.8 | Microsoft | Windows | Feb 10, 2026 | Mar 3, 2026 | Unknown | Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-21533 | HIGH 7.8 | Microsoft | Windows | Feb 10, 2026 | Mar 3, 2026 | Unknown | Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-21519 | HIGH 7.8 | Microsoft | Windows | Feb 10, 2026 | Mar 3, 2026 | Unknown | Access of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-21514 | HIGH 7.8 | Microsoft | Office | Feb 10, 2026 | Mar 3, 2026 | Unknown | Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-11953 | CRITICAL 9.8 | React Native Community | CLI | Feb 5, 2026 | Feb 26, 2026 | Unknown | The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-24423 | CRITICAL 9.3 | SmarterTools | SmarterMail | Feb 5, 2026 | Feb 26, 2026 | Known | SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-39935 | MEDIUM 6.8 | GitLab | Community and Enterprise Editions | Feb 3, 2026 | Feb 24, 2026 | Unknown | An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.5 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Unauthorized external users could perform Server Side Requests via the CI Lint API Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-64328 | HIGH 8.6 | Sangoma | FreePBX | Feb 3, 2026 | Feb 24, 2026 | Unknown | FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions 17.0.2.36 and above before 17.0.3, the filestore module within the Administrative interface is vulnerable to a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to obtain remote access to the system as an asterisk user. This issue is fixed in version 17.0.3. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2019-19006 | CRITICAL 9.8 | Sangoma | FreePBX | Feb 3, 2026 | Feb 24, 2026 | Unknown | Sangoma FreePBX 115.0.16.26 and below, 14.0.13.11 and below, 13.0.197.13 and below have Incorrect Access Control. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-40551 | CRITICAL 9.8 | SolarWinds | Web Help Desk | Feb 3, 2026 | Feb 6, 2026 | Unknown | SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-1281 | CRITICAL 9.8 | Ivanti | Endpoint Manager Mobile (EPMM) | Jan 29, 2026 | Feb 1, 2026 | Unknown | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-24858 | CRITICAL 9.8 | Fortinet | Multiple Products | Jan 27, 2026 | Jan 30, 2026 | Unknown | An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2 all versions, FortiProxy 7.0 all versions, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2018-14634 | HIGH 7.8 | Linux | Kernel | Jan 26, 2026 | Feb 16, 2026 | Unknown | An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-52691 | CRITICAL 10.0 | SmarterTools | SmarterMail | Jan 26, 2026 | Feb 16, 2026 | Known | Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-23760 | CRITICAL 9.3 | SmarterTools | SmarterMail | Jan 26, 2026 | Feb 16, 2026 | Known | SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-24061 | CRITICAL 9.8 | GNU | InetUtils | Jan 26, 2026 | Feb 16, 2026 | Unknown | telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-21509 | HIGH 7.8 | Microsoft | Office | Jan 26, 2026 | Feb 16, 2026 | Unknown | Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-37079 | CRITICAL 9.8 | Broadcom | VMware vCenter Server | Jan 23, 2026 | Feb 13, 2026 | Unknown | vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-68645 | HIGH 8.8 | Synacor | Zimbra Collaboration Suite (ZCS) | Jan 22, 2026 | Feb 12, 2026 | Unknown | A Local File Inclusion (LFI) vulnerability exists in the Webmail Classic UI of Zimbra Collaboration (ZCS) 10.0 and 10.1 because of improper handling of user-supplied request parameters in the RestFilter servlet. An unauthenticated remote attacker can craft requests to the /h/rest endpoint to influence internal request dispatching, allowing inclusion of arbitrary files from the WebRoot directory. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-34026 | CRITICAL 9.2 | Versa | Concerto | Jan 22, 2026 | Feb 12, 2026 | Unknown | The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The internal Actuator endpoint can be leveraged for access to heap dumps and trace logs.This issue is known to affect Concerto from 12.1.2 through 12.2.0. Additional versions may be vulnerable. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-31125 | MEDIUM 5.3 | Vite | Vitejs | Jan 22, 2026 | Feb 12, 2026 | Unknown | Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-54313 | HIGH 7.5 | Prettier | eslint-config-prettier | Jan 22, 2026 | Feb 12, 2026 | Unknown | eslint-config-prettier 8.10.1, 9.1.1, 10.1.6, and 10.1.7 has embedded malicious code for a supply chain compromise. Installing an affected package executes an install.js file that launches the node-gyp.dll malware on Windows. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-20045 | HIGH 8.2 | Cisco | Unified Communications Manager | Jan 21, 2026 | Feb 11, 2026 | Unknown | A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root. Note: Cisco has assigned this security advisory a Security Impact Rating (SIR) of Critical rather than High as the score indicates. The reason is that exploitation of this vulnerability could result in an attacker elevating privileges to root. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2026-20805 | MEDIUM 5.5 | Microsoft | Windows | Jan 13, 2026 | Feb 3, 2026 | Unknown | Exposure of sensitive information to an unauthorized actor in Desktop Windows Manager allows an authorized attacker to disclose information locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-8110 | HIGH 8.7 | Gogs | Gogs | Jan 12, 2026 | Feb 2, 2026 | Unknown | Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2009-0556 | HIGH 8.8 | Microsoft | Office | Jan 7, 2026 | Jan 28, 2026 | Unknown | Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an an invalid index value that triggers memory corruption, as exploited in the wild in April 2009 by Exploit:Win32/Apptom.gen, aka "Memory Corruption Vulnerability." Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-37164 | CRITICAL 10.0 | Hewlett Packard Enterprise (HPE) | OneView | Jan 7, 2026 | Jan 28, 2026 | Unknown | A remote code execution issue exists in HPE OneView. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-14847 | HIGH 8.7 | MongoDB | MongoDB and MongoDB Server | Dec 29, 2025 | Jan 19, 2026 | Unknown | Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-52163 | HIGH 8.8 | Digiever | DS-2105 Pro | Dec 22, 2025 | Jan 12, 2026 | Unknown | Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-14733 | CRITICAL 9.3 | WatchGuard | Firebox | Dec 19, 2025 | Dec 26, 2025 | Unknown | An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.5 and 2025.1 up to and including 2025.1.3. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-59374 | CRITICAL 9.3 | ASUS | Live Update | Dec 17, 2025 | Jan 7, 2026 | Unknown | "UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has already reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected by this issue. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-40602 | MEDIUM 6.6 | SonicWall | SMA1000 appliance | Dec 17, 2025 | Dec 24, 2025 | Unknown | A local privilege escalation vulnerability due to insufficient authorization in the SonicWall SMA1000 appliance management console (AMC). Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable | Open |
| CVE-2025-20393 | CRITICAL 10.0 | Cisco | Multiple Products | Dec 17, 2025 | Dec 24, 2025 | Unknown | Cisco is aware of a potential vulnerability. Cisco is currently investigating and will update these details as appropriate as more information becomes available. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-59718 | CRITICAL 9.8 | Fortinet | Multiple Products | Dec 16, 2025 | Dec 23, 2025 | Unknown | A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-14611 | HIGH 7.1 | Gladinet | CentreStack and Triofox | Dec 15, 2025 | Jan 5, 2026 | Unknown | Gladinet CentreStack and Triofox prior to version 16.12.10420.56791 used hardcoded values for their implementation of the AES cryptoscheme. This degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication. This opens the door for future exploitation and can be leveraged with previous vulnerabilities to gain a full system compromise. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-43529 | HIGH 8.8 | Apple | Multiple Products | Dec 15, 2025 | Jan 5, 2026 | Unknown | A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 26.2, Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, tvOS 26.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2018-4063 | HIGH 8.8 | Sierra Wireless | AirLink ALEOS | Dec 12, 2025 | Jan 2, 2026 | Unknown | An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-14174 | HIGH 8.8 | Chromium | Dec 12, 2025 | Jan 2, 2026 | Unknown | Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2025-58360 | HIGH 8.2 | OSGeo | GeoServer | Dec 11, 2025 | Jan 1, 2026 | Unknown | GeoServer is an open source server that allows users to share and edit geospatial data. From version 2.26.0 to before 2.26.2 and before 2.25.6, an XML External Entity (XXE) vulnerability was identified. The application accepts XML input through a specific endpoint /geoserver/wms operation GetMap. However, this input is not sufficiently sanitized or restricted, allowing an attacker to define external entities within the XML request. This issue has been patched in GeoServer 2.25.6, GeoServer 2.26.3, and GeoServer 2.27.0. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-6218 | HIGH 7.8 | RARLAB | WinRAR | Dec 9, 2025 | Dec 30, 2025 | Unknown | RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-62221 | HIGH 7.8 | Microsoft | Windows | Dec 9, 2025 | Dec 30, 2025 | Unknown | Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2022-37055 | CRITICAL 9.8 | D-Link | Routers | Dec 8, 2025 | Dec 29, 2025 | Unknown | D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 are vulnerable to Buffer Overflow via cgibin, hnap_main, Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-66644 | HIGH 7.2 | Array Networks | ArrayOS AG | Dec 8, 2025 | Dec 29, 2025 | Unknown | Array Networks ArrayOS AG before 9.4.5.9 allows command injection, as exploited in the wild in August through December 2025. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-55182 | CRITICAL 10.0 | Meta | React Server Components | Dec 5, 2025 | Dec 12, 2025 | Known | A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-26828 | HIGH 8.8 | OpenPLC | ScadaBR | Dec 3, 2025 | Dec 24, 2025 | Unknown | OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-48633 | MEDIUM 5.5 | Android | Framework | Dec 2, 2025 | Dec 23, 2025 | Unknown | In hasAccountsOnAnyUser of DevicePolicyManagerService.java, there is a possible way to add a Device Owner after provisioning due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-48572 | HIGH 7.8 | Android | Framework | Dec 2, 2025 | Dec 23, 2025 | Unknown | In multiple locations, there is a possible way to launch activities from the background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-26829 | MEDIUM 5.4 | OpenPLC | ScadaBR | Nov 28, 2025 | Dec 19, 2025 | Unknown | OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stored XSS via system_settings.shtm. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-61757 | CRITICAL 9.8 | Oracle | Fusion Middleware | Nov 21, 2025 | Dec 12, 2025 | Unknown | Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: REST WebServices). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-13223 | HIGH 8.8 | Chromium V8 | Nov 19, 2025 | Dec 10, 2025 | Unknown | Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2025-58034 | HIGH 7.2 | Fortinet | FortiWeb | Nov 18, 2025 | Nov 25, 2025 | Unknown | An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.10, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-64446 | CRITICAL 9.8 | Fortinet | FortiWeb | Nov 14, 2025 | Nov 21, 2025 | Unknown | A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-12480 | CRITICAL 9.1 | Gladinet | Triofox | Nov 12, 2025 | Dec 3, 2025 | Unknown | Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-62215 | HIGH 7.0 | Microsoft | Windows | Nov 12, 2025 | Dec 3, 2025 | Unknown | Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-9242 | CRITICAL 9.3 | WatchGuard | Firebox | Nov 12, 2025 | Dec 3, 2025 | Unknown | An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.3 and 2025.1. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-21042 | HIGH 8.8 | Samsung | Mobile Devices | Nov 10, 2025 | Dec 1, 2025 | Unknown | Out-of-bounds write in libimagecodec.quram.so prior to SMR Apr-2025 Release 1 allows remote attackers to execute arbitrary code. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-48703 | CRITICAL 9.0 | CWP | Control Web Panel | Nov 4, 2025 | Nov 25, 2025 | Unknown | CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1205 allows unauthenticated remote code execution via shell metacharacters in the t_total parameter in a filemanager changePerm request. A valid non-root username must be known. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-11371 | HIGH 7.5 | Gladinet | CentreStack and Triofox | Nov 4, 2025 | Nov 25, 2025 | Unknown | In the default installation and configuration of Gladinet CentreStack and TrioFox, there is an unauthenticated Local File Inclusion Flaw that allows unintended disclosure of system files. Exploitation of this vulnerability has been observed in the wild. This issue impacts Gladinet CentreStack and Triofox: All versions prior to and including 16.7.10368.56560 Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-41244 | HIGH 7.8 | Broadcom | VMware Aria Operations and VMware Tools | Oct 30, 2025 | Nov 20, 2025 | Unknown | VMware Aria Operations and VMware Tools contain a local privilege escalation vulnerability. A malicious local actor with non-administrative privileges having access to a VM with VMware Tools installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the same VM. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-24893 | CRITICAL 9.8 | XWiki | Platform | Oct 30, 2025 | Nov 20, 2025 | Unknown | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any guest can perform arbitrary remote code execution through a request to `SolrSearch`. This impacts the confidentiality, integrity and availability of the whole XWiki installation. To reproduce on an instance, without being logged in, go to `<host>/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28"Hello%20from"%20%2B%20"%20search%20text%3A"%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20`. If there is an output, and the title of the RSS feed contains `Hello from search text:42`, then the instance is vulnerable. This vulnerability has been patched in XWiki 15.10.11, 16.4.1 and 16.5.0RC1. Users are advised to upgrade. Users unable to upgrade may edit `Main.SolrSearchMacros` in `SolrSearchMacros.xml` on line 955 to match the `rawResponse` macro in `macros.vm#L2824` with a content type of `application/xml`, instead of simply outputting the content of the feed. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-6204 | HIGH 8.0 | Dassault Systèmes | DELMIA Apriso | Oct 28, 2025 | Nov 18, 2025 | Unknown | An Improper Control of Generation of Code (Code Injection) vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to execute arbitrary code. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-6205 | CRITICAL 9.1 | Dassault Systèmes | DELMIA Apriso | Oct 28, 2025 | Nov 18, 2025 | Unknown | A missing authorization vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to gain privileged access to the application. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-54236 | CRITICAL 9.1 | Adobe | Commerce and Magento | Oct 24, 2025 | Nov 14, 2025 | Unknown | Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, 2.4.4-p15 and earlier are affected by an Improper Input Validation vulnerability. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue does not require user interaction. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-59287 | CRITICAL 9.8 | Microsoft | Windows | Oct 24, 2025 | Nov 14, 2025 | Unknown | Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-61932 | CRITICAL 9.3 | Motex | LANSCOPE Endpoint Manager | Oct 22, 2025 | Nov 12, 2025 | Unknown | Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) improperly verifies the origin of incoming requests, allowing an attacker to execute arbitrary code by sending specially crafted packets. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2022-48503 | HIGH 8.8 | Apple | Multiple Products | Oct 20, 2025 | Nov 10, 2025 | Unknown | The issue was addressed with improved bounds checks. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing web content may lead to arbitrary code execution. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-2746 | CRITICAL 9.8 | Kentico | Xperience CMS | Oct 20, 2025 | Nov 10, 2025 | Unknown | An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server password handling of empty SHA1 usernames in digest authentication. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.172. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-2747 | CRITICAL 9.8 | Kentico | Xperience CMS | Oct 20, 2025 | Nov 10, 2025 | Unknown | An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server component password handling for the server defined None type. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.178. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-33073 | HIGH 8.8 | Microsoft | Windows | Oct 20, 2025 | Nov 10, 2025 | Unknown | Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-61884 | HIGH 7.5 | Oracle | E-Business Suite | Oct 20, 2025 | Nov 10, 2025 | Known | Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Runtime UI). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-54253 | CRITICAL 10.0 | Adobe | Experience Manager (AEM) Forms | Oct 15, 2025 | Nov 5, 2025 | Unknown | Adobe Experience Manager versions 6.5.23 and earlier are affected by a Misconfiguration vulnerability that could result in arbitrary code execution. An attacker could leverage this vulnerability to bypass security mechanisms and execute code. Exploitation of this issue does not require user interaction and scope is changed. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-47827 | MEDIUM 4.6 | IGEL | IGEL OS | Oct 14, 2025 | Nov 4, 2025 | Unknown | In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-24990 | HIGH 7.8 | Microsoft | Windows | Oct 14, 2025 | Nov 4, 2025 | Unknown | Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. Fax modem hardware dependent on this specific driver will no longer work on Windows. Microsoft recommends removing any existing dependencies on this hardware. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-59230 | HIGH 7.8 | Microsoft | Windows | Oct 14, 2025 | Nov 4, 2025 | Unknown | Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2016-7836 | CRITICAL 9.8 | SKYSEA | Client View | Oct 14, 2025 | Nov 4, 2025 | Unknown | SKYSEA Client View Ver.11.221.03 and earlier allows remote code execution via a flaw in processing authentication on the TCP connection with the management console program. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-43798 | HIGH 7.5 | Grafana Labs | Grafana | Oct 9, 2025 | Oct 30, 2025 | Unknown | Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-27915 | MEDIUM 5.4 | Synacor | Zimbra Collaboration Suite (ZCS) | Oct 7, 2025 | Oct 28, 2025 | Unknown | An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A stored cross-site scripting (XSS) vulnerability exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a <details> tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-22555 | HIGH 8.3 | Linux | Kernel | Oct 6, 2025 | Oct 27, 2025 | Unknown | A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2010-3962 | HIGH 8.1 | Microsoft | Internet Explorer | Oct 6, 2025 | Oct 27, 2025 | Unknown | Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an "invalid flag reference" issue or "Uninitialized Memory Corruption Vulnerability," as exploited in the wild in November 2010. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-43226 | HIGH 7.8 | Microsoft | Windows | Oct 6, 2025 | Oct 27, 2025 | Unknown | Windows Common Log File System Driver Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2013-3918 | HIGH 8.8 | Microsoft | Windows | Oct 6, 2025 | Oct 27, 2025 | Unknown | The InformationCardSigninHelper Class ActiveX control in icardie.dll in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted web page that is accessed by Internet Explorer, as exploited in the wild in November 2013, aka "InformationCardSigninHelper Vulnerability." Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2011-3402 | HIGH 8.8 | Microsoft | Windows | Oct 6, 2025 | Oct 27, 2025 | Unknown | Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page, as exploited in the wild in November 2011 by Duqu, aka "TrueType Font Parsing Vulnerability." Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2010-3765 | CRITICAL 9.8 | Mozilla | Multiple Products | Oct 6, 2025 | Oct 27, 2025 | Unknown | Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-61882 | CRITICAL 9.8 | Oracle | E-Business Suite | Oct 6, 2025 | Oct 27, 2025 | Known | Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks of this vulnerability can result in takeover of Oracle Concurrent Processing. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2014-6278 | HIGH 8.8 | GNU | GNU Bash | Oct 2, 2025 | Oct 23, 2025 | Unknown | GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2017-1000353 | CRITICAL 9.8 | Jenkins | Jenkins | Oct 2, 2025 | Oct 23, 2025 | Unknown | Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2015-7755 | CRITICAL 9.8 | Juniper | ScreenOS | Oct 2, 2025 | Oct 23, 2025 | Unknown | Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-21043 | HIGH 8.8 | Samsung | Mobile Devices | Oct 2, 2025 | Oct 23, 2025 | Unknown | Out-of-bounds write in libimagecodec.quram.so prior to SMR Sep-2025 Release 1 allows remote attackers to execute arbitrary code. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-4008 | HIGH 8.7 | Smartbedded | Meteobridge | Oct 2, 2025 | Oct 23, 2025 | Unknown | The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C. This web interface exposes an endpoint that is vulnerable to command injection. Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-32463 | CRITICAL 9.3 | Sudo | Sudo | Sep 29, 2025 | Oct 20, 2025 | Unknown | Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-59689 | MEDIUM 6.1 | Libraesva | Email Security Gateway | Sep 29, 2025 | Oct 20, 2025 | Unknown | Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-10035 | CRITICAL 10.0 | Fortra | GoAnywhere MFT | Sep 29, 2025 | Oct 20, 2025 | Known | A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-20352 | HIGH 7.7 | Cisco | IOS and IOS XE | Sep 29, 2025 | Oct 20, 2025 | Unknown | A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following: An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials. An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks. This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system. Note: This vulnerability affects all versions of SNMP. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-21311 | HIGH 7.2 | Adminer | Adminer | Sep 29, 2025 | Oct 20, 2025 | Unknown | Adminer is an open-source database management in a single PHP file. In adminer from version 4.0.0 and before 4.7.9 there is a server-side request forgery vulnerability. Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. This is fixed in version 4.7.9. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-20362 | MEDIUM 6.5 | Cisco | Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense | Sep 25, 2025 | Sep 26, 2025 | Unknown | Update: On November 5, 2025, Cisco became aware of a new attack variant against devices running Cisco Secure ASA Software or Cisco Secure FTD Software releases that are affected by CVE-2025-20333 and CVE-2025-20362. This attack can cause unpatched devices to unexpectedly reload, leading to denial of service (DoS) conditions. Cisco strongly recommends that all customers upgrade to the fixed software releases that are listed in the Fixed Software ["#fs"] section of this advisory. A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication. Required action: The KEV due date refers to the deadline by which FCEB agencies are expected to review and begin implementing the guidance outlined in Emergency Directive (ED) 25-03 (URL listed below in Notes). Agencies must follow the mitigation steps provided by CISA (URL listed below in Notes) and vendor’s instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. | Open |
| CVE-2025-20333 | CRITICAL 9.9 | Cisco | Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense | Sep 25, 2025 | Sep 26, 2025 | Unknown | A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker with valid VPN user credentials could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as root, possibly resulting in the complete compromise of the affected device. Required action: The KEV due date refers to the deadline by which FCEB agencies are expected to review and begin implementing the guidance outlined in Emergency Directive (ED) 25-03 (URL listed below in Notes). Agencies must follow the mitigation steps provided by CISA (URL listed below in Notes) and vendor’s instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. | Open |
| CVE-2025-10585 | CRITICAL 9.8 | Chromium V8 | Sep 23, 2025 | Oct 14, 2025 | Unknown | Type confusion in V8 in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2025-5086 | CRITICAL 9.0 | Dassault Systèmes | DELMIA Apriso | Sep 11, 2025 | Oct 2, 2025 | Unknown | A deserialization of untrusted data vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could lead to a remote code execution. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-38352 | HIGH 7.4 | Linux | Kernel | Sep 4, 2025 | Sep 25, 2025 | Unknown | In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-48543 | HIGH 8.8 | Android | Runtime | Sep 4, 2025 | Sep 25, 2025 | Unknown | In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-53690 | CRITICAL 9.0 | Sitecore | Multiple Products | Sep 4, 2025 | Sep 25, 2025 | Unknown | Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Code Injection.This issue affects Experience Manager (XM): through 9.0; Experience Platform (XP): through 9.0. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-50224 | MEDIUM 6.5 | TP-Link | TL-WR841N | Sep 3, 2025 | Sep 24, 2025 | Unknown | TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. . Was ZDI-CAN-19899. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-9377 | HIGH 8.6 | TP-Link | Multiple Routers | Sep 3, 2025 | Sep 24, 2025 | Unknown | The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9. This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108. Both products have reached the status of EOL (end-of-life). It's recommending to purchase the new product to ensure better performance and security. If replacement is not an option in the short term, please use the second reference link to download and install the patch(es). Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2020-24363 | HIGH 8.8 | TP-Link | TL-WA855RE | Sep 2, 2025 | Sep 23, 2025 | Unknown | TP-Link TL-WA855RE V5 20200415-rel37464 devices allow an unauthenticated attacker (on the same network) to submit a TDDP_RESET POST request for a factory reset and reboot. The attacker can then obtain incorrect access control by setting a new administrative password. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-55177 | MEDIUM 5.4 | Meta Platforms | Sep 2, 2025 | Sep 23, 2025 | Unknown | Incomplete authorization of linked device synchronization messages in WhatsApp for iOS prior to v2.25.21.73, WhatsApp Business for iOS v2.25.21.78, and WhatsApp for Mac v2.25.21.78 could have allowed an unrelated user to trigger processing of content from an arbitrary URL on a target’s device. We assess that this vulnerability, in combination with an OS-level vulnerability on Apple platforms (CVE-2025-43300), may have been exploited in a sophisticated attack against specific targeted users. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2025-57819 | CRITICAL 10.0 | Sangoma | FreePBX | Aug 29, 2025 | Sep 19, 2025 | Unknown | FreePBX is an open-source web-based graphical user interface. FreePBX 15, 16, and 17 endpoints are vulnerable due to insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution. This issue has been patched in endpoint versions 15.0.66, 16.0.89, and 17.0.3. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-7775 | CRITICAL 9.2 | Citrix | NetScaler | Aug 26, 2025 | Aug 28, 2025 | Unknown | Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with IPv6 services or servicegroups bound with IPv6 servers (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with DBS IPv6 services or servicegroups bound with IPv6 DBS servers (OR) CR virtual server with type HDX Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-48384 | HIGH 8.0 | Git | Git | Aug 25, 2025 | Sep 15, 2025 | Unknown | Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-8068 | MEDIUM 5.1 | Citrix | Session Recording | Aug 25, 2025 | Sep 15, 2025 | Unknown | Privilege escalation to NetworkService Account access in Citrix Session Recording when an attacker is an authenticated user in the same Windows Active Directory domain as the session recording server domain Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-8069 | MEDIUM 5.1 | Citrix | Session Recording | Aug 25, 2025 | Sep 15, 2025 | Unknown | Limited remote code execution with privilege of a NetworkService Account access in Citrix Session Recording if the attacker is an authenticated user on the same intranet as the session recording server Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-43300 | CRITICAL 10.0 | Apple | iOS, iPadOS, and macOS | Aug 21, 2025 | Sep 11, 2025 | Unknown | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-54948 | CRITICAL 9.4 | Trend Micro | Apex One | Aug 18, 2025 | Sep 8, 2025 | Unknown | A vulnerability in Trend Micro Apex One (on-premise) management console could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-8876 | CRITICAL 9.4 | N-able | N-Central | Aug 13, 2025 | Aug 20, 2025 | Unknown | Improper Input Validation vulnerability in N-able N-central allows OS Command Injection.This issue affects N-central: before 2025.3.1. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-8875 | CRITICAL 9.4 | N-able | N-Central | Aug 13, 2025 | Aug 20, 2025 | Unknown | Deserialization of Untrusted Data vulnerability in N-able N-central allows Local Execution of Code.This issue affects N-central: before 2025.3.1. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-8088 | HIGH 8.4 | RARLAB | WinRAR | Aug 12, 2025 | Sep 2, 2025 | Unknown | A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2007-0671 | HIGH 8.8 | Microsoft | Office | Aug 12, 2025 | Sep 2, 2025 | Unknown | Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonstrated by Exploit-MSExcel.h in targeted zero-day attacks. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2013-3893 | HIGH 8.8 | Microsoft | Internet Explorer | Aug 12, 2025 | Sep 2, 2025 | Unknown | Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2020-25078 | HIGH 7.5 | D-Link | DCS-2530L and DCS-2670L Devices | Aug 5, 2025 | Aug 26, 2025 | Unknown | An issue was discovered on D-Link DCS-2530L before 1.06.01 Hotfix and DCS-2670L through 2.02 devices. The unauthenticated /config/getuser endpoint allows for remote administrator password disclosure. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2020-25079 | HIGH 8.8 | D-Link | DCS-2530L and DCS-2670L Devices | Aug 5, 2025 | Aug 26, 2025 | Unknown | An issue was discovered on D-Link DCS-2530L before 1.06.01 Hotfix and DCS-2670L through 2.02 devices. cgi-bin/ddns_enc.cgi allows authenticated command injection. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2022-40799 | HIGH 8.8 | D-Link | DNR-322L | Aug 5, 2025 | Aug 26, 2025 | Unknown | Data Integrity Failure in 'Backup Config' in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-2533 | HIGH 8.4 | PaperCut | NG/MF | Jul 28, 2025 | Aug 18, 2025 | Unknown | A Cross-Site Request Forgery (CSRF) vulnerability has been identified in PaperCut NG/MF, which, under specific conditions, could potentially enable an attacker to alter security settings or execute arbitrary code. This could be exploited if the target is an admin with a current login session. Exploiting this would typically involve the possibility of deceiving an admin into clicking a specially crafted malicious link, potentially leading to unauthorized changes. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-20337 | CRITICAL 10.0 | Cisco | Identity Services Engine | Jul 28, 2025 | Aug 18, 2025 | Unknown | A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-20281 | CRITICAL 10.0 | Cisco | Identity Services Engine | Jul 28, 2025 | Aug 18, 2025 | Unknown | A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-2775 | CRITICAL 9.3 | SysAid | SysAid On-Prem | Jul 22, 2025 | Aug 12, 2025 | Unknown | SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-2776 | CRITICAL 9.3 | SysAid | SysAid On-Prem | Jul 22, 2025 | Aug 12, 2025 | Unknown | SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Server URL processing functionality, allowing for administrator account takeover and file read primitives. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-6558 | HIGH 8.8 | Chromium | Jul 22, 2025 | Aug 12, 2025 | Unknown | Insufficient validation of untrusted input in ANGLE and GPU in Google Chrome prior to 138.0.7204.157 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2025-54309 | CRITICAL 9.0 | CrushFTP | CrushFTP | Jul 22, 2025 | Aug 12, 2025 | Unknown | CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-49704 | HIGH 8.8 | Microsoft | SharePoint | Jul 22, 2025 | Jul 23, 2025 | Known | Improper control of generation of code ('code injection') in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. Required action: Disconnect public-facing versions of SharePoint Server that have reached their end-of-life (EOL) or end-of-service (EOS) to include SharePoint Server 2013 and earlier versions. For supported versions, please follow the mitigations according to CISA (URL listed below in Notes) and vendor instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. | Open |
| CVE-2025-49706 | MEDIUM 6.5 | Microsoft | SharePoint | Jul 22, 2025 | Jul 23, 2025 | Known | Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network. Required action: Disconnect public-facing versions of SharePoint Server that have reached their end-of-life (EOL) or end-of-service (EOS) to include SharePoint Server 2013 and earlier versions. For supported versions, please follow the mitigations according to CISA (URL listed below in Notes) and vendor instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. | Open |
| CVE-2025-53770 | CRITICAL 9.8 | Microsoft | SharePoint | Jul 20, 2025 | Jul 21, 2025 | Known | Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation. Required action: Disconnect public-facing versions of SharePoint Server that have reached their end-of-life (EOL) or end-of-service (EOS) to include SharePoint Server 2013 and earlier versions. For supported versions, please follow the mitigations according to CISA (URL listed below in Notes) and vendor instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. | Open |
| CVE-2025-25257 | CRITICAL 9.8 | Fortinet | FortiWeb | Jul 18, 2025 | Aug 8, 2025 | Unknown | An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in Fortinet FortiWeb version 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2.10 and below 7.0.10 allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-47812 | CRITICAL 10.0 | Wing FTP Server | Wing FTP Server | Jul 14, 2025 | Aug 4, 2025 | Unknown | In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-5777 | CRITICAL 9.3 | Citrix | NetScaler ADC and Gateway | Jul 10, 2025 | Jul 11, 2025 | Known | Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2019-9621 | HIGH 7.5 | Synacor | Zimbra Collaboration Suite (ZCS) | Jul 7, 2025 | Jul 28, 2025 | Unknown | Zimbra Collaboration Suite before 8.6 patch 13, 8.7.x before 8.7.11 patch 10, and 8.8.x before 8.8.10 patch 7 or 8.8.x before 8.8.11 patch 3 allows SSRF via the ProxyServlet component. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2019-5418 | HIGH 7.5 | Rails | Ruby on Rails | Jul 7, 2025 | Jul 28, 2025 | Unknown | There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2016-10033 | CRITICAL 9.8 | PHP | PHPMailer | Jul 7, 2025 | Jul 28, 2025 | Unknown | The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2014-3931 | CRITICAL 9.8 | Looking Glass | Multi-Router Looking Glass (MRLG) | Jul 7, 2025 | Jul 28, 2025 | Unknown | fastping.c in MRLG (aka Multi-Router Looking Glass) before 5.5.0 allows remote attackers to cause an arbitrary memory write and memory corruption. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-6554 | HIGH 8.1 | Chromium V8 | Jul 2, 2025 | Jul 23, 2025 | Unknown | Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2025-48928 | MEDIUM 4.0 | TeleMessage | TM SGNL | Jul 1, 2025 | Jul 22, 2025 | Unknown | The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-48927 | MEDIUM 5.3 | TeleMessage | TM SGNL | Jul 1, 2025 | Jul 22, 2025 | Unknown | The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-6543 | CRITICAL 9.2 | Citrix | NetScaler ADC and Gateway | Jun 30, 2025 | Jul 21, 2025 | Unknown | Memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway when configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2019-6693 | MEDIUM 6.5 | Fortinet | FortiOS | Jun 25, 2025 | Jul 16, 2025 | Known | Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS configuration backup file may allow an attacker with access to the backup file to decipher the sensitive data, via knowledge of the hard-coded key. The aforementioned sensitive data includes users' passwords (except the administrator's password), private keys' passphrases and High Availability password (when set). Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-0769 | MEDIUM 5.3 | D-Link | DIR-859 Router | Jun 25, 2025 | Jul 16, 2025 | Unknown | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-54085 | CRITICAL 10.0 | AMI | MegaRAC SPx | Jun 25, 2025 | Jul 16, 2025 | Unknown | AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-0386 | HIGH 7.8 | Linux | Kernel | Jun 17, 2025 | Jul 8, 2025 | Unknown | A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-33538 | HIGH 8.8 | TP-Link | Multiple Routers | Jun 16, 2025 | Jul 7, 2025 | Unknown | TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm . Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-43200 | MEDIUM 4.2 | Apple | Multiple Products | Jun 16, 2025 | Jul 7, 2025 | Unknown | This issue was addressed with improved checks. This issue is fixed in watchOS 11.3.1, macOS Ventura 13.7.4, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iPadOS 17.7.5, visionOS 2.3.1, macOS Sequoia 15.3.1, iOS 18.3.1 and iPadOS 18.3.1, macOS Sonoma 14.7.4. A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-33053 | HIGH 8.8 | Microsoft | Windows | Jun 10, 2025 | Jul 1, 2025 | Unknown | External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-24016 | CRITICAL 9.9 | Wazuh | Wazuh Server | Jun 10, 2025 | Jul 1, 2025 | Unknown | Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code. The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent. Version 4.9.1 contains a fix. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-42009 | CRITICAL 9.3 | Roundcube | Webmail | Jun 9, 2025 | Jun 30, 2025 | Unknown | A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-32433 | CRITICAL 10.0 | Erlang | Erlang/OTP | Jun 9, 2025 | Jun 30, 2025 | Unknown | Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-5419 | HIGH 8.8 | Chromium V8 | Jun 5, 2025 | Jun 26, 2025 | Unknown | Out of bounds read and write in V8 in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2025-21479 | HIGH 8.6 | Qualcomm | Multiple Chipsets | Jun 3, 2025 | Jun 24, 2025 | Unknown | Memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-21480 | HIGH 8.6 | Qualcomm | Multiple Chipsets | Jun 3, 2025 | Jun 24, 2025 | Unknown | Memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-27038 | HIGH 7.5 | Qualcomm | Multiple Chipsets | Jun 3, 2025 | Jun 24, 2025 | Unknown | Memory corruption while rendering graphics using Adreno GPU drivers in Chrome. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-32030 | CRITICAL 9.8 | ASUS | Routers | Jun 2, 2025 | Jun 23, 2025 | Unknown | The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 and Lyra Mini before 3.0.0.4_384_46630 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. Note: All versions of Lyra Mini and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability, Consumers can mitigate this vulnerability by disabling the remote access features from WAN. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-3935 | HIGH 8.1 | ConnectWise | ScreenConnect | Jun 2, 2025 | Jun 23, 2025 | Unknown | ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys. It is important to note that to obtain these machine keys, privileged system level access must be obtained. If these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server. The risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior. This had no direct impact to ScreenConnect Client. ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-35939 | MEDIUM 6.9 | Craft CMS | Craft CMS | Jun 2, 2025 | Jun 23, 2025 | Unknown | Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at '/var/lib/php/sessions'. Such session files are named 'sess_[session_value]', where '[session_value]' is provided to the client in a 'Set-Cookie' response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-56145 | CRITICAL 9.3 | Craft CMS | Craft CMS | Jun 2, 2025 | Jun 23, 2025 | Unknown | Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Users of affected versions are affected by this vulnerability if their php.ini configuration has `register_argc_argv` enabled. For these users an unspecified remote code execution vector is present. Users are advised to update to version 3.9.14, 4.13.2, or 5.5.2. Users unable to upgrade should disable `register_argc_argv` to mitigate the issue. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-39780 | HIGH 8.8 | ASUS | RT-AX55 Routers | Jun 2, 2025 | Jun 23, 2025 | Unknown | On ASUS RT-AX55 3.0.0.4.386.51598 devices, authenticated attackers can perform OS command injection via the /start_apply.htm qos_bw_rulelist parameter. NOTE: for the similar "token-generated module" issue, see CVE-2023-41345; for the similar "token-refresh module" issue, see CVE-2023-41346; for the similar "check token module" issue, see CVE-2023-41347; and for the similar "code-authentication module" issue, see CVE-2023-41348. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-4632 | CRITICAL 9.8 | Samsung | MagicINFO 9 Server | May 22, 2025 | Jun 12, 2025 | Unknown | Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1052 allows attackers to write arbitrary file as system authority. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-38950 | HIGH 7.5 | ZKTeco | BioTime | May 19, 2025 | Jun 9, 2025 | Unknown | A path traversal vulnerability in the iclock API of ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload. This vulnerability was fixed in version 9.0.120240617.19506 of ZKBioTime. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-27443 | MEDIUM 6.1 | Synacor | Zimbra Collaboration Suite (ZCS) | May 19, 2025 | Jun 9, 2025 | Unknown | An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. A Cross-Site Scripting (XSS) vulnerability exists in the CalendarInvite feature of the Zimbra webmail classic user interface, because of improper input validation in the handling of the calendar header. An attacker can exploit this via an email message containing a crafted calendar header with an embedded XSS payload. When a victim views this message in the Zimbra webmail classic interface, the payload is executed in the context of the victim's session, potentially leading to execution of arbitrary JavaScript code. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-27920 | HIGH 7.2 | Srimax | Output Messenger | May 19, 2025 | Jun 9, 2025 | Unknown | Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-11182 | MEDIUM 5.3 | MDaemon | Email Server | May 19, 2025 | Jun 9, 2025 | Unknown | An XSS issue was discovered in MDaemon Email Server before version 24.5.1c. An attacker can send an HTML e-mail message with JavaScript in an img tag. This could allow a remote attacker to load arbitrary JavaScript code in the context of a webmail user's browser window. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-4428 | HIGH 7.2 | Ivanti | Endpoint Manager Mobile (EPMM) | May 19, 2025 | Jun 9, 2025 | Unknown | Remote Code Execution in API component in Ivanti Endpoint Manager Mobile 12.5.0.0 and prior on unspecified platforms allows authenticated attackers to execute arbitrary code via crafted API requests. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-4427 | MEDIUM 5.3 | Ivanti | Endpoint Manager Mobile (EPMM) | May 19, 2025 | Jun 9, 2025 | Unknown | An authentication bypass in the API component of Ivanti Endpoint Manager Mobile 12.5.0.0 and prior allows attackers to access protected resources without proper credentials via the API. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-42999 | CRITICAL 9.1 | SAP | NetWeaver | May 15, 2025 | Jun 5, 2025 | Unknown | SAP NetWeaver Visual Composer Metadata Uploader is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-12987 | MEDIUM 6.9 | DrayTek | Vigor Routers | May 15, 2025 | Jun 5, 2025 | Unknown | A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-32756 | CRITICAL 9.8 | Fortinet | Multiple Products | May 14, 2025 | Jun 4, 2025 | Unknown | A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiVoice versions 7.2.0, 7.0.0 through 7.0.6, 6.4.0 through 6.4.10, FortiRecorder versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.5, 6.4.0 through 6.4.5, FortiMail versions 7.6.0 through 7.6.2, 7.4.0 through 7.4.4, 7.2.0 through 7.2.7, 7.0.0 through 7.0.8, FortiNDR versions 7.6.0, 7.4.0 through 7.4.7, 7.2.0 through 7.2.4, 7.0.0 through 7.0.6, FortiCamera versions 2.1.0 through 2.1.3, 2.0 all versions, 1.1 all versions, allows a remote unauthenticated attacker to execute arbitrary code or commands via sending HTTP requests with specially crafted hash cookie. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-32709 | HIGH 7.8 | Microsoft | Windows | May 13, 2025 | Jun 3, 2025 | Unknown | Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-30397 | HIGH 7.5 | Microsoft | Windows | May 13, 2025 | Jun 3, 2025 | Unknown | Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-32706 | HIGH 7.8 | Microsoft | Windows | May 13, 2025 | Jun 3, 2025 | Unknown | Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-32701 | HIGH 7.8 | Microsoft | Windows | May 13, 2025 | Jun 3, 2025 | Unknown | Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-30400 | HIGH 7.8 | Microsoft | Windows | May 13, 2025 | Jun 3, 2025 | Unknown | Use after free in Windows DWM allows an authorized attacker to elevate privileges locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-47729 | LOW 1.9 | TeleMessage | TM SGNL | May 12, 2025 | Jun 2, 2025 | Unknown | The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage "End-to-End encryption from the mobile phone through to the corporate archive" documentation, as exploited in the wild in May 2025. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-11120 | CRITICAL 9.8 | GeoVision | Multiple Devices | May 7, 2025 | May 28, 2025 | Unknown | Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-6047 | CRITICAL 9.8 | GeoVision | Multiple Devices | May 7, 2025 | May 28, 2025 | Unknown | Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-27363 | HIGH 8.1 | FreeType | FreeType | May 6, 2025 | May 27, 2025 | Unknown | An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-3248 | CRITICAL 9.8 | Langflow | Langflow | May 5, 2025 | May 26, 2025 | Unknown | Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-34028 | CRITICAL 9.3 | Commvault | Command Center | May 2, 2025 | May 23, 2025 | Unknown | The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-58136 | CRITICAL 9.0 | Yiiframework | Yii | May 2, 2025 | May 23, 2025 | Unknown | Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-38475 | CRITICAL 9.1 | Apache | HTTP Server | May 1, 2025 | May 22, 2025 | Unknown | Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected. Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-44221 | HIGH 7.2 | SonicWall | SMA100 Appliances | May 1, 2025 | May 22, 2025 | Unknown | Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-31324 | CRITICAL 10.0 | SAP | NetWeaver | Apr 29, 2025 | May 20, 2025 | Known | SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-1976 | HIGH 8.6 | Broadcom | Brocade Fabric OS | Apr 28, 2025 | May 19, 2025 | Unknown | Brocade Fabric OS versions starting with 9.1.0 have root access removed, however, a local user with admin privilege can potentially execute arbitrary code with full root privileges on Fabric OS versions 9.1.0 through 9.1.1d6. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-42599 | CRITICAL 9.8 | Qualitia | Active! Mail | Apr 28, 2025 | May 19, 2025 | Unknown | Active! mail 6 BuildInfo: 6.60.05008561 and earlier contains a stack-based buffer overflow vulnerability. Receiving a specially crafted request created and sent by a remote unauthenticated attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-3928 | HIGH 8.7 | Commvault | Web Server | Apr 28, 2025 | May 19, 2025 | Unknown | Commvault Web Server has an unspecified vulnerability that can be exploited by a remote, authenticated attacker. According to the Commvault advisory: "Webservers can be compromised through bad actors creating and executing webshells." Fixed in version 11.36.46, 11.32.89, 11.28.141, and 11.20.217 for Windows and Linux platforms. This vulnerability was added to the CISA Known Exploited Vulnerabilities (KEV) Catalog on 2025-04-28. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-24054 | MEDIUM 6.5 | Microsoft | Windows | Apr 17, 2025 | May 8, 2025 | Unknown | External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-31201 | CRITICAL 9.8 | Apple | Multiple Products | Apr 17, 2025 | May 8, 2025 | Unknown | This issue was addressed by removing the vulnerable code. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-31200 | CRITICAL 9.8 | Apple | Multiple Products | Apr 17, 2025 | May 8, 2025 | Unknown | A memory corruption issue was addressed with improved bounds checking. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. Processing an audio stream in a maliciously crafted media file may result in code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-20035 | MEDIUM 6.5 | SonicWall | SMA100 Appliances | Apr 16, 2025 | May 7, 2025 | Unknown | Improper neutralization of special elements in the SMA100 management interface allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user which potentially leads to DoS. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-53150 | HIGH 7.1 | Linux | Kernel | Apr 9, 2025 | Apr 30, 2025 | Unknown | In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current USB-audio driver code doesn't check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal. When the descriptor length is shorter than expected, it's skipped in the loop. For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type. OTOH, the clock selector descriptor of UAC2 and UAC3 has an array of bNrInPins elements and two more fields at its tail, hence those have to be checked in addition to the sizeof() check. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-53197 | HIGH 7.8 | Linux | Kernel | Apr 9, 2025 | Apr 30, 2025 | Unknown | In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-29824 | HIGH 7.8 | Microsoft | Windows | Apr 8, 2025 | Apr 29, 2025 | Known | Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-30406 | CRITICAL 9.0 | Gladinet | CentreStack | Apr 8, 2025 | Apr 29, 2025 | Unknown | Gladinet CentreStack through 16.1.10296.56315 (fixed in 16.4.10315.56368) has a deserialization vulnerability due to the CentreStack portal's hardcoded machineKey use, as exploited in the wild in March 2025. This enables threat actors (who know the machineKey) to serialize a payload for server-side deserialization to achieve remote code execution. NOTE: a CentreStack admin can manually delete the machineKey defined in portal\web.config. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-31161 | CRITICAL 9.8 | CrushFTP | CrushFTP | Apr 7, 2025 | Apr 28, 2025 | Known | CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and takeover of the crushadmin account (unless a DMZ proxy instance is used), as exploited in the wild in March and April 2025, aka "Unauthenticated HTTP(S) port access." A race condition exists in the AWS4-HMAC (compatible with S3) authorization method of the HTTP component of the FTP server. The server first verifies the existence of the user by performing a call to login_user_pass() with no password requirement. This will authenticate the session through the HMAC verification process and up until the server checks for user verification once more. The vulnerability can be further stabilized, eliminating the need for successfully triggering a race condition, by sending a mangled AWS4-HMAC header. By providing only the username and a following slash (/), the server will successfully find a username, which triggers the successful anypass authentication process, but the server will fail to find the expected SignedHeaders entry, resulting in an index-out-of-bounds error that stops the code from reaching the session cleanup. Together, these issues make it trivial to authenticate as any known or guessable user (e.g., crushadmin), and can lead to a full compromise of the system by obtaining an administrative account. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-22457 | CRITICAL 9.0 | Ivanti | Connect Secure, Policy Secure, and ZTA Gateways | Apr 4, 2025 | Apr 11, 2025 | Known | A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution. Required action: Apply mitigations as set forth in the CISA instructions linked below. | Open |
| CVE-2025-24813 | CRITICAL 9.8 | Apache | Tomcat | Apr 1, 2025 | Apr 22, 2025 | Unknown | Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-20439 | CRITICAL 9.8 | Cisco | Smart Licensing Utility | Mar 31, 2025 | Apr 21, 2025 | Unknown | A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-2783 | HIGH 8.3 | Chromium Mojo | Mar 27, 2025 | Apr 17, 2025 | Unknown | Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2019-9875 | HIGH 8.8 | Sitecore | CMS and Experience Platform (XP) | Mar 26, 2025 | Apr 16, 2025 | Unknown | Deserialization of Untrusted Data in the anti CSRF module in Sitecore through 9.1 allows an authenticated attacker to execute arbitrary code by sending a serialized .NET object in an HTTP POST parameter. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2019-9874 | CRITICAL 9.8 | Sitecore | CMS and Experience Platform (XP) | Mar 26, 2025 | Apr 16, 2025 | Unknown | Deserialization of Untrusted Data in the Sitecore.Security.AntiCSRF (aka anti CSRF) module in Sitecore CMS 7.0 to 7.2 and Sitecore XP 7.5 to 8.2 allows an unauthenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-30154 | HIGH 8.6 | reviewdog | action-setup GitHub Action | Mar 24, 2025 | Apr 14, 2025 | Unknown | reviewdog/action-setup is a GitHub action that installs reviewdog. reviewdog/action-setup@v1 was compromised March 11, 2025, between 18:42 and 20:31 UTC, with malicious code added that dumps exposed secrets to Github Actions Workflow Logs. Other reviewdog actions that use `reviewdog/action-setup@v1` that would also be compromised, regardless of version or pinning method, are reviewdog/action-shellcheck, reviewdog/action-composite-template, reviewdog/action-staticcheck, reviewdog/action-ast-grep, and reviewdog/action-typos. Required action: Apply mitigations as set forth in the CISA instructions linked below. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2017-12637 | HIGH 7.5 | SAP | NetWeaver | Mar 19, 2025 | Apr 9, 2025 | Unknown | Directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS in SAP NetWeaver Application Server Java 7.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the query string, as exploited in the wild in August 2017, aka SAP Security Note 2486657. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-48248 | HIGH 8.6 | NAKIVO | Backup and Replication | Mar 19, 2025 | Apr 9, 2025 | Unknown | NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials). Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-1316 | CRITICAL 9.3 | Edimax | IC-7100 IP Camera | Mar 19, 2025 | Apr 9, 2025 | Unknown | Edimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-30066 | HIGH 8.6 | tj-actions | changed-files GitHub Action | Mar 18, 2025 | Apr 8, 2025 | Unknown | tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.) Required action: Apply mitigations as set forth in the CISA instructions linked below. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-24472 | HIGH 8.1 | Fortinet | FortiOS and FortiProxy | Mar 18, 2025 | Apr 8, 2025 | Known | An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote unauthenticated attacker with prior knowledge of upstream and downstream devices serial numbers to gain super-admin privileges on the downstream device, if the Security Fabric is enabled, via crafted CSF proxy requests. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-21590 | MEDIUM 6.7 | Juniper | Junos OS | Mar 13, 2025 | Apr 3, 2025 | Unknown | An Improper Isolation or Compartmentalization vulnerability in the kernel of Juniper Networks Junos OS allows a local attacker with high privileges to compromise the integrity of the device. A local attacker with access to the shell is able to inject arbitrary code which can compromise an affected device. This issue is not exploitable from the Junos CLI. This issue affects Junos OS: * All versions before 21.2R3-S9, * 21.4 versions before 21.4R3-S10, * 22.2 versions before 22.2R3-S6, * 22.4 versions before 22.4R3-S6, * 23.2 versions before 23.2R2-S3, * 23.4 versions before 23.4R2-S4, * 24.2 versions before 24.2R1-S2, 24.2R2. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-24201 | CRITICAL 10.0 | Apple | Multiple Products | Mar 13, 2025 | Apr 3, 2025 | Unknown | An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1, watchOS 11.4, iPadOS 17.7.6, iOS 16.7.11 and iPadOS 16.7.11, iOS 15.8.4 and iPadOS 15.8.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.). Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-24993 | HIGH 7.8 | Microsoft | Windows | Mar 11, 2025 | Apr 1, 2025 | Unknown | Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-24991 | MEDIUM 5.5 | Microsoft | Windows | Mar 11, 2025 | Apr 1, 2025 | Unknown | Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-24985 | HIGH 7.8 | Microsoft | Windows | Mar 11, 2025 | Apr 1, 2025 | Unknown | Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-24984 | MEDIUM 4.6 | Microsoft | Windows | Mar 11, 2025 | Apr 1, 2025 | Unknown | Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-24983 | HIGH 7.0 | Microsoft | Windows | Mar 11, 2025 | Apr 1, 2025 | Unknown | Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-26633 | HIGH 7.0 | Microsoft | Windows | Mar 11, 2025 | Apr 1, 2025 | Known | Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-13161 | CRITICAL 9.8 | Ivanti | Endpoint Manager (EPM) | Mar 10, 2025 | Mar 31, 2025 | Unknown | Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-13160 | CRITICAL 9.8 | Ivanti | Endpoint Manager (EPM) | Mar 10, 2025 | Mar 31, 2025 | Unknown | Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-13159 | CRITICAL 9.8 | Ivanti | Endpoint Manager (EPM) | Mar 10, 2025 | Mar 31, 2025 | Unknown | Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-57968 | CRITICAL 9.9 | Advantive | VeraCore | Mar 10, 2025 | Mar 31, 2025 | Unknown | Advantive VeraCore before 2024.4.2.1 allows remote authenticated users to upload files to unintended folders (e.g., ones that are accessible during web browsing by other users). upload.aspx can be used for this. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-25181 | MEDIUM 5.8 | Advantive | VeraCore | Mar 10, 2025 | Mar 31, 2025 | Unknown | A SQL injection vulnerability in timeoutWarning.asp in Advantive VeraCore through 2025.1.0 allows remote attackers to execute arbitrary SQL commands via the PmSess1 parameter. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-22226 | HIGH 7.1 | VMware | ESXi, Workstation, and Fusion | Mar 4, 2025 | Mar 25, 2025 | Unknown | VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-22225 | HIGH 8.2 | VMware | ESXi | Mar 4, 2025 | Mar 25, 2025 | Known | VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-22224 | CRITICAL 9.3 | VMware | ESXi and Workstation | Mar 4, 2025 | Mar 25, 2025 | Unknown | VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-50302 | MEDIUM 5.5 | Linux | Kernel | Mar 4, 2025 | Mar 25, 2025 | Unknown | In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-4885 | CRITICAL 9.8 | Progress | WhatsUp Gold | Mar 3, 2025 | Mar 24, 2025 | Unknown | In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold. The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2018-8639 | HIGH 7.8 | Microsoft | Windows | Mar 3, 2025 | Mar 24, 2025 | Known | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8641. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2022-43769 | HIGH 8.8 | Hitachi Vantara | Pentaho Business Analytics (BA) Server | Mar 3, 2025 | Mar 24, 2025 | Unknown | Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.1 and 9.3.0.2, including 8.3.x allow certain web services to set property values which contain Spring templates that are interpreted downstream. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2022-43939 | HIGH 8.6 | Hitachi Vantara | Pentaho Business Analytics (BA) Server | Mar 3, 2025 | Mar 24, 2025 | Unknown | Hitachi Vantara Pentaho Business Analytics Server versions before 9.4.0.1 and 9.3.0.2, including 8.3.x contain security restrictions using non-canonical URLs which can be circumvented. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-20118 | MEDIUM 6.5 | Cisco | Small Business RV Series Routers | Mar 3, 2025 | Mar 24, 2025 | Unknown | A vulnerability in the web-based management interface of Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device. Cisco has not and will not release software updates that address this vulnerability. However, administrators may disable the affected feature as described in the Workarounds ["#workarounds"] section. {{value}} ["%7b%7bvalue%7d%7d"])}]] Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-34192 | CRITICAL 9.0 | Synacor | Zimbra Collaboration Suite (ZCS) | Feb 25, 2025 | Mar 18, 2025 | Unknown | Cross Site Scripting vulnerability in Zimbra ZCS v.8.8.15 allows a remote authenticated attacker to execute arbitrary code via a crafted script to the /h/autoSaveDraft function. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-49035 | HIGH 8.7 | Microsoft | Partner Center | Feb 25, 2025 | Mar 18, 2025 | Unknown | An improper access control vulnerability in Partner.Microsoft.com allows an a unauthenticated attacker to elevate privileges over a network. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-20953 | HIGH 8.8 | Oracle | Agile Product Lifecycle Management (PLM) | Feb 24, 2025 | Mar 17, 2025 | Unknown | Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: Export). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM. Successful attacks of this vulnerability can result in takeover of Oracle Agile PLM. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2017-3066 | CRITICAL 9.8 | Adobe | ColdFusion | Feb 24, 2025 | Mar 17, 2025 | Unknown | Adobe ColdFusion 2016 Update 3 and earlier, ColdFusion 11 update 11 and earlier, ColdFusion 10 Update 22 and earlier have a Java deserialization vulnerability in the Apache BlazeDS library. Successful exploitation could lead to arbitrary code execution. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-24989 | HIGH 8.2 | Microsoft | Power Pages | Feb 21, 2025 | Mar 14, 2025 | Unknown | An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control. This vulnerability has already been mitigated in the service and all affected customers have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you. Required action: Apply mitigations per vendor instructions, follow BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-0111 | HIGH 7.1 | Palo Alto Networks | PAN-OS | Feb 20, 2025 | Mar 13, 2025 | Unknown | An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-23209 | HIGH 8.0 | Craft CMS | Craft CMS | Feb 20, 2025 | Mar 13, 2025 | Unknown | Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. This is an remote code execution (RCE) vulnerability that affects Craft 4 and 5 installs where your security key has already been compromised. Anyone running an unpatched version of Craft with a compromised security key is affected. This vulnerability has been patched in Craft 5.5.8 and 4.13.8. Users who cannot update to a patched version, should rotate their security keys and ensure their privacy to help migitgate the issue. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-0108 | HIGH 8.8 | Palo Alto Networks | PAN-OS | Feb 18, 2025 | Mar 11, 2025 | Unknown | An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-53704 | CRITICAL 9.8 | SonicWall | SonicOS | Feb 18, 2025 | Mar 11, 2025 | Known | An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-57727 | HIGH 7.5 | SimpleHelp | SimpleHelp | Feb 13, 2025 | Mar 6, 2025 | Known | SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-24200 | MEDIUM 6.1 | Apple | iOS and iPadOS | Feb 12, 2025 | Mar 5, 2025 | Unknown | An authorization issue was addressed with improved state management. This issue is fixed in iPadOS 17.7.5, iOS 18.3.1 and iPadOS 18.3.1. A physical attack may disable USB Restricted Mode on a locked device. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-41710 | HIGH 7.2 | Mitel | SIP Phones | Feb 12, 2025 | Mar 5, 2025 | Unknown | A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-40891 | HIGH 8.8 | Zyxel | DSL CPE Devices | Feb 11, 2025 | Mar 4, 2025 | Unknown | **UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the management commands of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device via Telnet. Required action: The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable. | Open |
| CVE-2024-40890 | HIGH 8.8 | Zyxel | DSL CPE Devices | Feb 11, 2025 | Mar 4, 2025 | Unknown | **UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the CGI program of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST request. Required action: The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable. | Open |
| CVE-2025-21418 | HIGH 7.8 | Microsoft | Windows | Feb 11, 2025 | Mar 4, 2025 | Unknown | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-21391 | HIGH 7.1 | Microsoft | Windows | Feb 11, 2025 | Mar 4, 2025 | Unknown | Windows Storage Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-0994 | HIGH 8.6 | Trimble | Cityworks | Feb 7, 2025 | Feb 28, 2025 | Unknown | Trimble Cityworks versions prior to 15.8.9 and Cityworks with office companion versions prior to 23.10 are vulnerable to a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customer’s Microsoft Internet Information Services (IIS) web server. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2020-15069 | CRITICAL 9.8 | Sophos | XG Firewall | Feb 6, 2025 | Feb 27, 2025 | Unknown | Sophos XG Firewall 17.x through v17.5 MR12 allows a Buffer Overflow and remote code execution via the HTTP/S Bookmarks feature for clientless access. Hotfix HF062020.1 was published for all firewalls running v17.x. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2020-29574 | CRITICAL 9.8 | Sophos | CyberoamOS | Feb 6, 2025 | Feb 27, 2025 | Unknown | An SQL injection vulnerability in the WebAdmin of Cyberoam OS through 2020-12-04 allows unauthenticated attackers to execute arbitrary SQL statements remotely. Required action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product. | Open |
| CVE-2024-21413 | CRITICAL 9.8 | Microsoft | Office Outlook | Feb 6, 2025 | Feb 27, 2025 | Unknown | Microsoft Outlook Remote Code Execution Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2022-23748 | HIGH 7.8 | Audinate | Dante Discovery | Feb 6, 2025 | Feb 27, 2025 | Unknown | mDNSResponder.exe is vulnerable to DLL Sideloading attack. Executable improperly specifies how to load the DLL, from which folder and under what conditions. In these scenarios, a malicious attacker could be using the valid and legitimate executable to load malicious files. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-0411 | HIGH 7.0 | 7-Zip | 7-Zip | Feb 6, 2025 | Feb 27, 2025 | Unknown | 7-Zip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, 7-Zip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-25456. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-53104 | HIGH 7.8 | Linux | Kernel | Feb 5, 2025 | Feb 26, 2025 | Unknown | In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2018-19410 | CRITICAL 9.8 | Paessler | PRTG Network Monitor | Feb 4, 2025 | Feb 25, 2025 | Unknown | PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator). Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2018-9276 | HIGH 7.2 | Paessler | PRTG Network Monitor | Feb 4, 2025 | Feb 25, 2025 | Unknown | An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-29059 | HIGH 7.5 | Microsoft | .NET Framework | Feb 4, 2025 | Feb 25, 2025 | Unknown | .NET Framework Information Disclosure Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-45195 | HIGH 7.5 | Apache | OFBiz | Feb 4, 2025 | Feb 25, 2025 | Unknown | Direct Request ('Forced Browsing') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.16. Users are recommended to upgrade to version 18.12.16, which fixes the issue. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-24085 | CRITICAL 10.0 | Apple | Multiple Products | Jan 29, 2025 | Feb 19, 2025 | Unknown | A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-23006 | CRITICAL 9.8 | SonicWall | SMA1000 Appliances | Jan 24, 2025 | Feb 14, 2025 | Known | Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2020-11023 | MEDIUM 6.9 | JQuery | JQuery | Jan 23, 2025 | Feb 13, 2025 | Unknown | In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-50603 | CRITICAL 10.0 | Aviatrix | Controllers | Jan 16, 2025 | Feb 6, 2025 | Unknown | An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-21335 | HIGH 7.8 | Microsoft | Windows | Jan 14, 2025 | Feb 4, 2025 | Unknown | Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-21334 | HIGH 7.8 | Microsoft | Windows | Jan 14, 2025 | Feb 4, 2025 | Unknown | Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-21333 | HIGH 7.8 | Microsoft | Windows | Jan 14, 2025 | Feb 4, 2025 | Unknown | Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-55591 | CRITICAL 9.8 | Fortinet | FortiOS and FortiProxy | Jan 14, 2025 | Jan 21, 2025 | Known | An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-48365 | CRITICAL 9.6 | Qlik | Sense | Jan 13, 2025 | Feb 3, 2025 | Known | Qlik Sense Enterprise for Windows before August 2023 Patch 2 allows unauthenticated remote code execution, aka QB-21683. Due to improper validation of HTTP headers, a remote attacker is able to elevate their privilege by tunneling HTTP requests, allowing them to execute HTTP requests on the backend server that hosts the repository application. The fixed versions are August 2023 Patch 2, May 2023 Patch 6, February 2023 Patch 10, November 2022 Patch 12, August 2022 Patch 14, May 2022 Patch 16, February 2022 Patch 15, and November 2021 Patch 17. NOTE: this issue exists because of an incomplete fix for CVE-2023-41265. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-12686 | MEDIUM 6.6 | BeyondTrust | Privileged Remote Access (PRA) and Remote Support (RS) | Jan 13, 2025 | Feb 3, 2025 | Unknown | A vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) which can allow an attacker with existing administrative privileges to inject commands and run as a site user. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2025-0282 | CRITICAL 9.0 | Ivanti | Connect Secure, Policy Secure, and ZTA Gateways | Jan 8, 2025 | Jan 15, 2025 | Known | A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution. Required action: Apply mitigations as set forth in the CISA instructions linked below to include conducting hunt activities, taking remediation actions if applicable, and applying updates prior to returning a device to service. | Open |
| CVE-2020-2883 | CRITICAL 9.8 | Oracle | WebLogic Server | Jan 7, 2025 | Jan 28, 2025 | Unknown | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-55550 | LOW 2.7 | Mitel | MiCollab | Jan 7, 2025 | Jan 28, 2025 | Known | Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-41713 | CRITICAL 9.1 | Mitel | MiCollab | Jan 7, 2025 | Jan 28, 2025 | Known | A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a path traversal attack, due to insufficient input validation. A successful exploit could allow unauthorized access, enabling the attacker to view, corrupt, or delete users' data and system configurations. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-3393 | HIGH 8.7 | Palo Alto Networks | PAN-OS | Dec 30, 2024 | Jan 20, 2025 | Unknown | A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-44207 | HIGH 8.1 | Acclaim Systems | USAHERDS | Dec 23, 2024 | Jan 13, 2025 | Unknown | Acclaim USAHERDS through 7.4.0.1 uses hard-coded credentials. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Please contact the product developer for support and vulnerability mitigation. | Open |
| CVE-2024-12356 | CRITICAL 9.8 | BeyondTrust | Privileged Remote Access (PRA) and Remote Support (RS) | Dec 19, 2024 | Dec 27, 2024 | Unknown | A critical vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) products which can allow an unauthenticated attacker to inject commands that are run as a site user. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-40407 | HIGH 7.2 | Reolink | RLC-410W IP Camera | Dec 18, 2024 | Jan 8, 2025 | Unknown | An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability. Required action: The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable. | Open |
| CVE-2019-11001 | HIGH 7.2 | Reolink | Multiple IP Cameras | Dec 18, 2024 | Jan 8, 2025 | Unknown | On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field. Required action: The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable. | Open |
| CVE-2022-23227 | CRITICAL 9.8 | NUUO | NVRmini2 Devices | Dec 18, 2024 | Jan 8, 2025 | Unknown | NUUO NVRmini2 through 3.11 allows an unauthenticated attacker to upload an encrypted TAR archive, which can be abused to add arbitrary users because of the lack of handle_import_user.php authentication. When combined with another flaw (CVE-2011-5325), it is possible to overwrite arbitrary files under the web root and achieve code execution as root. Required action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product. | Open |
| CVE-2018-14933 | CRITICAL 9.8 | NUUO | NVRmini Devices | Dec 18, 2024 | Jan 8, 2025 | Unknown | upgrade_handle.php on NUUO NVRmini devices allows Remote Command Execution via shell metacharacters in the uploaddir parameter for a writeuploaddir command. Required action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product. | Open |
| CVE-2024-55956 | CRITICAL 9.8 | Cleo | Multiple Products | Dec 17, 2024 | Jan 7, 2025 | Known | In Cleo Harmony before 5.8.0.24, VLTrader before 5.8.0.24, and LexiCom before 5.8.0.24, an unauthenticated user can import and execute arbitrary Bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-35250 | HIGH 7.8 | Microsoft | Windows | Dec 16, 2024 | Jan 6, 2025 | Unknown | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-20767 | HIGH 7.4 | Adobe | ColdFusion | Dec 16, 2024 | Jan 6, 2025 | Unknown | ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify restricted files. Exploitation of this issue does not require user interaction. Exploitation of this issue requires the admin panel be exposed to the internet. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-50623 | CRITICAL 9.8 | Cleo | Multiple Products | Dec 13, 2024 | Jan 3, 2025 | Known | In Cleo Harmony before 5.8.0.21, VLTrader before 5.8.0.21, and LexiCom before 5.8.0.21, there is an unrestricted file upload and download that could lead to remote code execution. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-49138 | HIGH 7.8 | Microsoft | Windows | Dec 10, 2024 | Dec 31, 2024 | Unknown | Windows Common Log File System Driver Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-51378 | CRITICAL 10.0 | CyberPersons | CyberPanel | Dec 4, 2024 | Dec 25, 2024 | Known | getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-11667 | HIGH 7.5 | Zyxel | Multiple Firewalls | Dec 3, 2024 | Dec 24, 2024 | Known | A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00 through V5.38, USG FLEX 50(W) series firmware versions V5.10 through V5.38, and USG20(W)-VPN series firmware versions V5.10 through V5.38 could allow an attacker to download or upload files via a crafted URL. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-11680 | CRITICAL 9.8 | ProjectSend | ProjectSend | Dec 3, 2024 | Dec 24, 2024 | Unknown | ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-45727 | HIGH 7.5 | North Grid | Proself | Dec 3, 2024 | Dec 24, 2024 | Unknown | Proself Enterprise/Standard Edition Ver5.62 and earlier, Proself Gateway Edition Ver1.65 and earlier, and Proself Mail Sanitize Edition Ver1.08 and earlier allow a remote unauthenticated attacker to conduct XML External Entity (XXE) attacks. By processing a specially crafted request containing malformed XML data, arbitrary files on the server containing account information may be read by the attacker. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-28461 | CRITICAL 9.8 | Array Networks | AG/vxAG ArrayOS | Nov 25, 2024 | Dec 16, 2024 | Known | Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon." Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-21287 | HIGH 7.5 | Oracle | Agile Product Lifecycle Management (PLM) | Nov 21, 2024 | Dec 12, 2024 | Unknown | Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: Software Development Kit, Process Extension). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM Framework accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-44309 | MEDIUM 6.1 | Apple | Multiple Products | Nov 21, 2024 | Dec 12, 2024 | Unknown | A cookie management issue was addressed with improved state management. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, macOS Sequoia 15.1.1, iOS 18.1.1 and iPadOS 18.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to a cross site scripting attack. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-44308 | HIGH 8.8 | Apple | Multiple Products | Nov 21, 2024 | Dec 12, 2024 | Unknown | The issue was addressed with improved checks. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, macOS Sequoia 15.1.1, iOS 18.1.1 and iPadOS 18.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-38813 | HIGH 7.5 | VMware | vCenter Server | Nov 20, 2024 | Dec 11, 2024 | Unknown | The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-38812 | CRITICAL 9.8 | VMware | vCenter Server | Nov 20, 2024 | Dec 11, 2024 | Unknown | The vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-9474 | MEDIUM 6.9 | Palo Alto Networks | PAN-OS | Nov 18, 2024 | Dec 9, 2024 | Known | A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, the management interfaces for affected devices should not be exposed to untrusted networks, including the internet. | Open |
| CVE-2024-0012 | CRITICAL 9.3 | Palo Alto Networks | PAN-OS | Nov 18, 2024 | Dec 9, 2024 | Known | An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 . The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, management interface for affected devices should not be exposed to untrusted networks, including the internet. | Open |
| CVE-2024-1212 | CRITICAL 10.0 | Progress | Kemp LoadMaster | Nov 18, 2024 | Dec 9, 2024 | Unknown | Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-9465 | CRITICAL 9.2 | Palo Alto Networks | Expedition | Nov 14, 2024 | Dec 5, 2024 | Unknown | An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-9463 | CRITICAL 9.9 | Palo Alto Networks | Expedition | Nov 14, 2024 | Dec 5, 2024 | Unknown | An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-26086 | MEDIUM 5.3 | Atlassian | Jira Server and Data Center | Nov 12, 2024 | Dec 3, 2024 | Unknown | Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. The affected versions are before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2014-2120 | MEDIUM 6.1 | Cisco | Adaptive Security Appliance (ASA) | Nov 12, 2024 | Dec 3, 2024 | Unknown | Cross-site scripting (XSS) vulnerability in the WebVPN login page in Cisco Adaptive Security Appliance (ASA) Software allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCun19025. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-41277 | CRITICAL 10.0 | Metabase | Metabase | Nov 12, 2024 | Dec 3, 2024 | Unknown | Metabase is an open source data analytics platform. In affected versions a security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. This issue is fixed in a new maintenance release (0.40.5 and 1.40.5), and any subsequent release after that. If you’re unable to upgrade immediately, you can mitigate this by including rules in your reverse proxy or load balancer or WAF to provide a validation filter before the application. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-43451 | MEDIUM 6.5 | Microsoft | Windows | Nov 12, 2024 | Dec 3, 2024 | Unknown | NTLM Hash Disclosure Spoofing Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-49039 | HIGH 8.8 | Microsoft | Windows | Nov 12, 2024 | Dec 3, 2024 | Known | Windows Task Scheduler Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2019-16278 | CRITICAL 9.8 | Nostromo | nhttpd | Nov 7, 2024 | Nov 28, 2024 | Unknown | Directory Traversal in the function http_verify in nostromo nhttpd through 1.9.6 allows an attacker to achieve remote code execution via a crafted HTTP request. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-51567 | CRITICAL 10.0 | CyberPersons | CyberPanel | Nov 7, 2024 | Nov 28, 2024 | Known | upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-43093 | HIGH 7.3 | Android | Framework | Nov 7, 2024 | Nov 28, 2024 | Unknown | In shouldHideDocument of ExternalStorageProvider.java, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-5910 | CRITICAL 9.3 | Palo Alto Networks | Expedition | Nov 7, 2024 | Nov 28, 2024 | Unknown | Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition. Note: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-8956 | CRITICAL 9.1 | PTZOptics | PT30X-SDI/NDI Cameras | Nov 4, 2024 | Nov 25, 2024 | Unknown | PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an insufficient authentication issue. The camera does not properly enforce authentication to /cgi-bin/param.cgi when requests are sent without an HTTP Authorization header. The result is a remote and unauthenticated attacker can leak sensitive data such as usernames, password hashes, and configurations details. Additionally, the attacker can update individual configuration values or overwrite the whole file. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-8957 | HIGH 7.2 | PTZOptics | PT30X-SDI/NDI Cameras | Nov 4, 2024 | Nov 25, 2024 | Unknown | PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an OS command injection issue. The camera does not sufficiently validate the ntp_addr configuration value which may lead to arbitrary command execution when ntp_client is started. When chained with CVE-2024-8956, a remote and unauthenticated attacker can execute arbitrary OS commands on affected devices. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-37383 | MEDIUM 6.1 | Roundcube | Webmail | Oct 24, 2024 | Nov 14, 2024 | Unknown | Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-20481 | MEDIUM 5.8 | Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) | Oct 24, 2024 | Nov 14, 2024 | Unknown | A vulnerability in the Remote Access VPN (RAVPN) service of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) of the RAVPN service. This vulnerability is due to resource exhaustion. An attacker could exploit this vulnerability by sending a large number of VPN authentication requests to an affected device. A successful exploit could allow the attacker to exhaust resources, resulting in a DoS of the RAVPN service on the affected device. Depending on the impact of the attack, a reload of the device may be required to restore the RAVPN service. Services that are not related to VPN are not affected. Cisco Talos discussed these attacks in the blog post Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-47575 | CRITICAL 9.8 | Fortinet | FortiManager | Oct 23, 2024 | Nov 13, 2024 | Unknown | A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-38094 | HIGH 7.2 | Microsoft | SharePoint | Oct 22, 2024 | Nov 12, 2024 | Known | Microsoft SharePoint Remote Code Execution Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-9537 | CRITICAL 9.3 | ScienceLogic | SL1 | Oct 21, 2024 | Nov 11, 2024 | Unknown | ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-40711 | CRITICAL 9.8 | Veeam | Backup & Replication | Oct 17, 2024 | Nov 7, 2024 | Known | A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE). Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-28987 | CRITICAL 9.1 | SolarWinds | Web Help Desk | Oct 15, 2024 | Nov 5, 2024 | Unknown | The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-9680 | CRITICAL 9.8 | Mozilla | Firefox | Oct 15, 2024 | Nov 5, 2024 | Known | An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-30088 | HIGH 7.0 | Microsoft | Windows | Oct 15, 2024 | Nov 5, 2024 | Known | Windows Kernel Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-9380 | HIGH 7.2 | Ivanti | Cloud Services Appliance (CSA) | Oct 9, 2024 | Oct 30, 2024 | Unknown | An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution. Required action: As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or later, of supported solution. | Open |
| CVE-2024-9379 | MEDIUM 6.5 | Ivanti | Cloud Services Appliance (CSA) | Oct 9, 2024 | Oct 30, 2024 | Unknown | SQL injection in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements. Required action: As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or later, of supported solution. | Open |
| CVE-2024-23113 | CRITICAL 9.8 | Fortinet | Multiple Products | Oct 9, 2024 | Oct 30, 2024 | Unknown | A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-43573 | MEDIUM 6.5 | Microsoft | Windows | Oct 8, 2024 | Oct 29, 2024 | Unknown | Windows MSHTML Platform Spoofing Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-43572 | HIGH 7.8 | Microsoft | Windows | Oct 8, 2024 | Oct 29, 2024 | Unknown | Microsoft Management Console Remote Code Execution Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-43047 | HIGH 7.8 | Qualcomm | Multiple Chipsets | Oct 8, 2024 | Oct 29, 2024 | Unknown | Memory corruption while maintaining memory maps of HLOS memory. Required action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | Open |
| CVE-2024-45519 | CRITICAL 10.0 | Synacor | Zimbra Collaboration Suite (ZCS) | Oct 3, 2024 | Oct 24, 2024 | Unknown | The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-29824 | HIGH 8.8 | Ivanti | Endpoint Manager (EPM) | Oct 2, 2024 | Oct 23, 2024 | Unknown | An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2019-0344 | CRITICAL 9.8 | SAP | Commerce Cloud | Sep 30, 2024 | Oct 21, 2024 | Unknown | Due to unsafe deserialization used in SAP Commerce Cloud (virtualjdbc extension), versions 6.4, 6.5, 6.6, 6.7, 1808, 1811, 1905, it is possible to execute arbitrary code on a target machine with 'Hybris' user rights, resulting in Code Injection. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2020-15415 | CRITICAL 9.8 | DrayTek | Multiple Vigor Routers | Sep 30, 2024 | Oct 21, 2024 | Unknown | On DrayTek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1, cgi-bin/mainfunction.cgi/cvmcfgupload allows remote command execution via shell metacharacters in a filename when the text/x-python-script content type is used, a different issue than CVE-2020-14472. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-25280 | CRITICAL 9.8 | D-Link | DIR-820 Router | Sep 30, 2024 | Oct 21, 2024 | Unknown | OS Command injection vulnerability in D-Link DIR820LA1_FW105B03 allows attackers to escalate privileges to root via a crafted payload with the ping_addr parameter to ping.ccp. Required action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product. | Open |
| CVE-2024-7593 | CRITICAL 9.8 | Ivanti | Virtual Traffic Manager | Sep 24, 2024 | Oct 15, 2024 | Unknown | Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-8963 | CRITICAL 9.4 | Ivanti | Cloud Services Appliance (CSA) | Sep 19, 2024 | Oct 10, 2024 | Unknown | Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality. Required action: As Ivanti CSA has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line of supported solutions, as future vulnerabilities on the 4.6.x version of CSA are unlikely to receive security updates. | Open |
| CVE-2020-14644 | CRITICAL 9.8 | Oracle | WebLogic Server | Sep 18, 2024 | Oct 9, 2024 | Unknown | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2022-21445 | CRITICAL 9.8 | Oracle | ADF Faces | Sep 18, 2024 | Oct 9, 2024 | Unknown | Vulnerability in the Oracle Application Development Framework (ADF) product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Development Framework (ADF). Successful attacks of this vulnerability can result in takeover of Oracle Application Development Framework (ADF). Note: Oracle Application Development Framework (ADF) is downloaded via Oracle JDeveloper Product. Please refer to Fusion Middleware Patch Advisor for more details. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2020-0618 | HIGH 8.8 | Microsoft | SQL Server | Sep 18, 2024 | Oct 9, 2024 | Unknown | A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests, aka 'Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability'. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-27348 | CRITICAL 9.8 | Apache | HugeGraph-Server | Sep 18, 2024 | Oct 9, 2024 | Unknown | RCE-Remote Command Execution vulnerability in Apache HugeGraph-Server.This issue affects Apache HugeGraph-Server: from 1.0.0 before 1.3.0 in Java8 & Java11 Users are recommended to upgrade to version 1.3.0 with Java11 & enable the Auth system, which fixes the issue. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2014-0502 | HIGH 8.8 | Adobe | Flash Player | Sep 17, 2024 | Oct 8, 2024 | Unknown | Double free vulnerability in Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK & Compiler before 4.0.0.1628 allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2014. Required action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product. | Open |
| CVE-2013-0648 | HIGH 8.8 | Adobe | Flash Player | Sep 17, 2024 | Oct 8, 2024 | Unknown | Unspecified vulnerability in the ExternalInterface ActionScript functionality in Adobe Flash Player before 10.3.183.67 and 11.x before 11.6.602.171 on Windows and Mac OS X, and before 10.3.183.67 and 11.x before 11.2.202.273 on Linux, allows remote attackers to execute arbitrary code via crafted SWF content, as exploited in the wild in February 2013. Required action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product. | Open |
| CVE-2013-0643 | HIGH 8.8 | Adobe | Flash Player | Sep 17, 2024 | Oct 8, 2024 | Unknown | The Firefox sandbox in Adobe Flash Player before 10.3.183.67 and 11.x before 11.6.602.171 on Windows and Mac OS X, and before 10.3.183.67 and 11.x before 11.2.202.273 on Linux, does not properly restrict privileges, which makes it easier for remote attackers to execute arbitrary code via crafted SWF content, as exploited in the wild in February 2013. Required action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product. | Open |
| CVE-2014-0497 | CRITICAL 9.8 | Adobe | Flash Player | Sep 17, 2024 | Oct 8, 2024 | Unknown | Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors. Required action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product. | Open |
| CVE-2024-6670 | CRITICAL 9.8 | Progress | WhatsUp Gold | Sep 16, 2024 | Oct 7, 2024 | Known | In WhatsUp Gold versions released before 2024.0.0, a SQL Injection vulnerability allows an unauthenticated attacker to retrieve the users encrypted password. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-43461 | HIGH 8.8 | Microsoft | Windows | Sep 16, 2024 | Oct 7, 2024 | Unknown | Windows MSHTML Platform Spoofing Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-8190 | HIGH 7.2 | Ivanti | Cloud Services Appliance | Sep 13, 2024 | Oct 4, 2024 | Unknown | An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution. The attacker must have admin level privileges to exploit this vulnerability. Required action: As Ivanti CSA has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line of supported solutions, as future vulnerabilities on the 4.6.x version of CSA are unlikely to receive future security updates. | Open |
| CVE-2024-38217 | MEDIUM 5.4 | Microsoft | Windows | Sep 10, 2024 | Oct 1, 2024 | Unknown | Windows Mark of the Web Security Feature Bypass Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-38014 | HIGH 7.8 | Microsoft | Windows | Sep 10, 2024 | Oct 1, 2024 | Unknown | Windows Installer Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-38226 | HIGH 7.3 | Microsoft | Publisher | Sep 10, 2024 | Oct 1, 2024 | Unknown | Microsoft Publisher Security Feature Bypass Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-40766 | CRITICAL 9.8 | SonicWall | SonicOS | Sep 9, 2024 | Sep 30, 2024 | Known | An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash. This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2017-1000253 | HIGH 7.8 | Linux | Kernel | Sep 9, 2024 | Sep 30, 2024 | Known | Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2016-3714 | HIGH 8.4 | ImageMagick | ImageMagick | Sep 9, 2024 | Sep 30, 2024 | Unknown | The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick." Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-7262 | CRITICAL 9.3 | Kingsoft | WPS Office | Sep 3, 2024 | Sep 24, 2024 | Unknown | Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library. The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-20124 | HIGH 7.5 | DrayTek | VigorConnect | Sep 3, 2024 | Sep 24, 2024 | Unknown | A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-20123 | HIGH 7.5 | DrayTek | VigorConnect | Sep 3, 2024 | Sep 24, 2024 | Unknown | A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-7965 | HIGH 8.8 | Chromium V8 | Aug 28, 2024 | Sep 18, 2024 | Unknown | Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2024-38856 | CRITICAL 9.8 | Apache | OFBiz | Aug 27, 2024 | Sep 17, 2024 | Unknown | Incorrect Authorization vulnerability in Apache OFBiz. This issue affects Apache OFBiz: through 18.12.14. Users are recommended to upgrade to version 18.12.15, which fixes the issue. Unauthenticated endpoints could allow execution of screen rendering code of screens if some preconditions are met (such as when the screen definitions don't explicitly check user's permissions because they rely on the configuration of their endpoints). Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-7971 | CRITICAL 9.6 | Chromium V8 | Aug 26, 2024 | Sep 16, 2024 | Unknown | Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2024-39717 | HIGH 7.2 | Versa | Director | Aug 23, 2024 | Sep 13, 2024 | Unknown | The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The “Change Favicon” (Favorite Icon) option can be mis-used to upload a malicious file ending with .png extension to masquerade as image file. This is possible only after a user with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin has successfully authenticated and logged in. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-31196 | HIGH 7.2 | Microsoft | Exchange Server | Aug 21, 2024 | Sep 11, 2024 | Unknown | Microsoft Exchange Server Remote Code Execution Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2022-0185 | HIGH 8.4 | Linux | Kernel | Aug 21, 2024 | Sep 11, 2024 | Unknown | A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. | Open |
| CVE-2021-33045 | CRITICAL 9.8 | Dahua | IP Camera Firmware | Aug 21, 2024 | Sep 11, 2024 | Unknown | The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-33044 | CRITICAL 9.8 | Dahua | IP Camera Firmware | Aug 21, 2024 | Sep 11, 2024 | Unknown | The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-23897 | CRITICAL 9.8 | Jenkins | Jenkins Command Line Interface (CLI) | Aug 19, 2024 | Sep 9, 2024 | Known | Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-28986 | CRITICAL 9.8 | SolarWinds | Web Help Desk | Aug 15, 2024 | Sep 5, 2024 | Unknown | SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-38107 | HIGH 7.8 | Microsoft | Windows | Aug 13, 2024 | Sep 3, 2024 | Unknown | Windows Power Dependency Coordinator Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-38106 | HIGH 7.0 | Microsoft | Windows | Aug 13, 2024 | Sep 3, 2024 | Unknown | Windows Kernel Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-38193 | HIGH 7.8 | Microsoft | Windows | Aug 13, 2024 | Sep 3, 2024 | Unknown | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-38213 | MEDIUM 6.5 | Microsoft | Windows | Aug 13, 2024 | Sep 3, 2024 | Unknown | Windows Mark of the Web Security Feature Bypass Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-38178 | HIGH 7.5 | Microsoft | Windows | Aug 13, 2024 | Sep 3, 2024 | Unknown | Scripting Engine Memory Corruption Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-38189 | HIGH 8.8 | Microsoft | Project | Aug 13, 2024 | Sep 3, 2024 | Unknown | Microsoft Project Remote Code Execution Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-32113 | CRITICAL 9.8 | Apache | OFBiz | Aug 7, 2024 | Aug 28, 2024 | Unknown | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13. Users are recommended to upgrade to version 18.12.13, which fixes the issue. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-36971 | HIGH 7.8 | Android | Kernel | Aug 7, 2024 | Aug 28, 2024 | Unknown | In the Linux kernel, the following vulnerability has been resolved: net: fix __dst_negative_advice() race __dst_negative_advice() does not enforce proper RCU rules when sk->dst_cache must be cleared, leading to possible UAF. RCU rules are that we must first clear sk->sk_dst_cache, then call dst_release(old_dst). Note that sk_dst_reset(sk) is implementing this protocol correctly, while __dst_negative_advice() uses the wrong order. Given that ip6_negative_advice() has special logic against RTF_CACHE, this means each of the three ->negative_advice() existing methods must perform the sk_dst_reset() themselves. Note the check against NULL dst is centralized in __dst_negative_advice(), there is no need to duplicate it in various callbacks. Many thanks to Clement Lecigne for tracking this issue. This old bug became visible after the blamed commit, using UDP sockets. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2018-0824 | HIGH 8.8 | Microsoft | Windows | Aug 5, 2024 | Aug 26, 2024 | Unknown | A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects, aka "Microsoft COM for Windows Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-37085 | MEDIUM 6.8 | VMware | ESXi | Jul 30, 2024 | Aug 20, 2024 | Known | VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-45249 | CRITICAL 9.8 | Acronis | Cyber Infrastructure (ACI) | Jul 29, 2024 | Aug 19, 2024 | Unknown | Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-5217 | CRITICAL 9.2 | ServiceNow | Utah, Vancouver, and Washington DC Now Platform | Jul 29, 2024 | Aug 19, 2024 | Unknown | ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-4879 | CRITICAL 9.3 | ServiceNow | Utah, Vancouver, and Washington DC Now Platform | Jul 29, 2024 | Aug 19, 2024 | Unknown | ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-39891 | MEDIUM 5.3 | Twilio | Authy | Jul 23, 2024 | Aug 13, 2024 | Unknown | In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.) Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2012-4792 | HIGH 8.8 | Microsoft | Internet Explorer | Jul 23, 2024 | Aug 13, 2024 | Unknown | Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2022-22948 | MEDIUM 6.5 | VMware | vCenter Server | Jul 17, 2024 | Aug 7, 2024 | Unknown | The vCenter Server contains an information disclosure vulnerability due to improper permission of files. A malicious actor with non-administrative access to the vCenter Server may exploit this issue to gain access to sensitive information. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-28995 | HIGH 8.6 | SolarWinds | Serv-U | Jul 17, 2024 | Aug 7, 2024 | Unknown | SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-34102 | CRITICAL 9.8 | Adobe | Commerce and Magento Open Source | Jul 17, 2024 | Aug 7, 2024 | Unknown | Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-36401 | CRITICAL 9.8 | OSGeo | GeoServer | Jul 15, 2024 | Aug 5, 2024 | Unknown | GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code. Versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-23692 | CRITICAL 9.8 | Rejetto | HTTP File Server | Jul 9, 2024 | Jul 30, 2024 | Unknown | Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-38080 | HIGH 7.8 | Microsoft | Windows | Jul 9, 2024 | Jul 30, 2024 | Unknown | Windows Hyper-V Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-38112 | HIGH 7.5 | Microsoft | Windows | Jul 9, 2024 | Jul 30, 2024 | Unknown | Windows MSHTML Platform Spoofing Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-20399 | MEDIUM 6.0 | Cisco | NX-OS | Jul 2, 2024 | Jul 23, 2024 | Unknown | A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root. Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. The following Cisco devices already allow administrative users to access the underlying operating system through the bash-shell feature, so, for these devices, this vulnerability does not grant any additional privileges: Nexus 3000 Series Switches Nexus 7000 Series Switches that are running Cisco NX-OS Software releases 8.1(1) and later Nexus 9000 Series Switches in standalone NX-OS mode Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2020-13965 | MEDIUM 6.1 | Roundcube | Webmail | Jun 26, 2024 | Jul 17, 2024 | Unknown | An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. There is XSS via a malicious XML attachment because text/xml is among the allowed types for a preview. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2022-2586 | MEDIUM 5.3 | Linux | Kernel | Jun 26, 2024 | Jul 17, 2024 | Unknown | It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. | Open |
| CVE-2022-24816 | CRITICAL 10.0 | OSGeo | JAI-EXT | Jun 26, 2024 | Jul 17, 2024 | Unknown | JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project. Version 1.2.22 will contain a patch that disables the ability to inject malicious code into the resulting script. Users unable to upgrade may negate the ability to compile Jiffle scripts from the final application, by removing janino-x.y.z.jar from the classpath. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-4358 | CRITICAL 9.8 | Progress | Telerik Report Server | Jun 13, 2024 | Jul 4, 2024 | Unknown | In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-26169 | HIGH 7.8 | Microsoft | Windows | Jun 13, 2024 | Jul 4, 2024 | Known | Windows Error Reporting Service Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. | Open |
| CVE-2024-32896 | HIGH 7.8 | Android | Pixel | Jun 13, 2024 | Jul 4, 2024 | Unknown | there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-4577 | CRITICAL 9.8 | PHP Group | PHP | Jun 12, 2024 | Jul 3, 2024 | Known | In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-4610 | HIGH 7.8 | Arm | Mali GPU Kernel Driver | Jun 12, 2024 | Jul 3, 2024 | Unknown | Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r34p0 through r40p0; Valhall GPU Kernel Driver: from r34p0 through r40p0. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2017-3506 | HIGH 7.4 | Oracle | WebLogic Server | Jun 3, 2024 | Jun 24, 2024 | Unknown | Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1 and 12.2.1.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data as well as unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-1086 | HIGH 7.8 | Linux | Kernel | May 30, 2024 | Jun 20, 2024 | Known | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-24919 | HIGH 8.6 | Check Point | Quantum Security Gateways | May 30, 2024 | Jun 20, 2024 | Known | Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-4978 | HIGH 8.7 | Justice AV Solutions | Viewer | May 29, 2024 | Jun 19, 2024 | Unknown | Justice AV Solutions Viewer Setup 8.3.7.250-1 contains a malicious binary when executed and is signed with an unexpected authenticode signature. A remote, privileged threat actor may exploit this vulnerability to execute of unauthorized PowerShell commands. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-5274 | CRITICAL 9.6 | Chromium V8 | May 28, 2024 | Jun 18, 2024 | Unknown | Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2020-17519 | HIGH 7.5 | Apache | Flink | May 23, 2024 | Jun 13, 2024 | Unknown | A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-4947 | CRITICAL 9.6 | Chromium V8 | May 20, 2024 | Jun 10, 2024 | Unknown | Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2023-43208 | CRITICAL 9.8 | NextGen Healthcare | Mirth Connect | May 20, 2024 | Jun 10, 2024 | Known | NextGen Healthcare Mirth Connect before version 4.4.1 is vulnerable to unauthenticated remote code execution. Note that this vulnerability is caused by the incomplete patch of CVE-2023-37679. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-4761 | HIGH 8.8 | Chromium V8 | May 16, 2024 | Jun 6, 2024 | Unknown | Out of bounds write in V8 in Google Chrome prior to 124.0.6367.207 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2021-40655 | HIGH 7.5 | D-Link | DIR-605 Router | May 16, 2024 | Jun 6, 2024 | Unknown | An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page Required action: This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions. | Open |
| CVE-2014-100005 | HIGH 8.8 | D-Link | DIR-600 Router | May 16, 2024 | Jun 6, 2024 | Unknown | Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev. Bx) with firmware before 2.17b02 allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator account or (2) enable remote management via a crafted configuration module to hedwig.cgi, (3) activate new configuration settings via a SETCFG,SAVE,ACTIVATE action to pigwidgeon.cgi, or (4) send a ping via a ping action to diagnostic.php. Required action: This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions. | Open |
| CVE-2024-30040 | HIGH 8.8 | Microsoft | Windows | May 14, 2024 | Jun 4, 2024 | Unknown | Windows MSHTML Platform Security Feature Bypass Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-30051 | HIGH 7.8 | Microsoft | DWM Core Library | May 14, 2024 | Jun 4, 2024 | Known | Windows DWM Core Library Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-4671 | CRITICAL 9.6 | Chromium | May 13, 2024 | Jun 3, 2024 | Unknown | Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2023-7028 | CRITICAL 10.0 | GitLab | GitLab CE/EE | May 1, 2024 | May 22, 2024 | Unknown | An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-29988 | HIGH 8.8 | Microsoft | SmartScreen Prompt | Apr 30, 2024 | May 21, 2024 | Unknown | SmartScreen Prompt Security Feature Bypass Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-4040 | CRITICAL 9.8 | CrushFTP | CrushFTP | Apr 24, 2024 | May 1, 2024 | Unknown | A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-20359 | MEDIUM 6.0 | Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) | Apr 24, 2024 | May 1, 2024 | Unknown | A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability. This vulnerability is due to improper validation of a file when it is read from system flash memory. An attacker could exploit this vulnerability by copying a crafted file to the disk0: file system of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-20353 | HIGH 8.6 | Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) | Apr 24, 2024 | May 1, 2024 | Unknown | A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to incomplete error checking when parsing an HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted web server on a device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2022-38028 | HIGH 7.8 | Microsoft | Windows | Apr 23, 2024 | May 14, 2024 | Unknown | Windows Print Spooler Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-3400 | CRITICAL 10.0 | Palo Alto Networks | PAN-OS | Apr 12, 2024 | Apr 19, 2024 | Known | A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. Required action: Apply mitigations per vendor instructions as they become available. Otherwise, users with vulnerable versions of affected devices should enable Threat Prevention IDs available from the vendor. See the vendor bulletin for more details and a patch release schedule. | Open |
| CVE-2024-3273 | HIGH 7.3 | D-Link | Multiple NAS Devices | Apr 11, 2024 | May 2, 2024 | Unknown | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. Required action: This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions. | Open |
| CVE-2024-3272 | CRITICAL 9.8 | D-Link | Multiple NAS Devices | Apr 11, 2024 | May 2, 2024 | Unknown | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259283. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. Required action: This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions. | Open |
| CVE-2024-29748 | HIGH 7.8 | Android | Pixel | Apr 4, 2024 | Apr 25, 2024 | Unknown | there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-29745 | MEDIUM 5.5 | Android | Pixel | Apr 4, 2024 | Apr 25, 2024 | Unknown | there is a possible Information Disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-24955 | HIGH 7.2 | Microsoft | SharePoint Server | Mar 26, 2024 | Apr 16, 2024 | Known | Microsoft SharePoint Server Remote Code Execution Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2019-7256 | CRITICAL 9.8 | Nice | Linear eMerge E3-Series | Mar 25, 2024 | Apr 15, 2024 | Unknown | Linear eMerge E3-Series devices allow Command Injections. Required action: Contact the vendor for guidance on remediating firmware, per their advisory. | Open |
| CVE-2021-44529 | CRITICAL 9.8 | Ivanti | Endpoint Manager Cloud Service Appliance (EPM CSA) | Mar 25, 2024 | Apr 15, 2024 | Known | A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody). Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-48788 | CRITICAL 9.8 | Fortinet | FortiClient EMS | Mar 25, 2024 | Apr 15, 2024 | Known | A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-27198 | CRITICAL 9.8 | JetBrains | TeamCity | Mar 7, 2024 | Mar 28, 2024 | Known | In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-23225 | HIGH 7.8 | Apple | Multiple Products | Mar 6, 2024 | Mar 27, 2024 | Unknown | A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-23296 | HIGH 7.8 | Apple | Multiple Products | Mar 6, 2024 | Mar 27, 2024 | Unknown | A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-21237 | MEDIUM 5.5 | Android | Pixel | Mar 5, 2024 | Mar 26, 2024 | Unknown | In applyRemoteView of NotificationContentInflater.java, there is a possible way to hide foreground service notification due to misleading or insufficient UI. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-251586912 Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-36380 | CRITICAL 9.8 | Sunhillo | SureLine | Mar 5, 2024 | Mar 26, 2024 | Unknown | Sunhillo SureLine before 8.7.0.1.1 allows Unauthenticated OS Command Injection via shell metacharacters in ipAddr or dnsAddr /cgi/networkDiag.cgi. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-21338 | HIGH 7.8 | Microsoft | Windows | Mar 4, 2024 | Mar 25, 2024 | Known | Windows Kernel Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-29360 | HIGH 8.4 | Microsoft | Streaming Service | Feb 29, 2024 | Mar 21, 2024 | Unknown | Microsoft Streaming Service Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-1709 | CRITICAL 10.0 | ConnectWise | ScreenConnect | Feb 22, 2024 | Feb 29, 2024 | Known | ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2020-3259 | HIGH 7.5 | Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) | Feb 15, 2024 | Mar 7, 2024 | Known | A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve memory contents on an affected device, which could lead to the disclosure of confidential information. The vulnerability is due to a buffer tracking issue when the software parses invalid URLs that are requested from the web services interface. An attacker could exploit this vulnerability by sending a crafted GET request to the web services interface. A successful exploit could allow the attacker to retrieve memory contents, which could lead to the disclosure of confidential information. Note: This vulnerability affects only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-21410 | CRITICAL 9.8 | Microsoft | Exchange Server | Feb 15, 2024 | Mar 7, 2024 | Unknown | Microsoft Exchange Server Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-21412 | HIGH 8.1 | Microsoft | Windows | Feb 13, 2024 | Mar 5, 2024 | Known | Internet Shortcut Files Security Feature Bypass Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-21351 | HIGH 7.6 | Microsoft | Windows | Feb 13, 2024 | Mar 5, 2024 | Unknown | Windows SmartScreen Security Feature Bypass Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-43770 | MEDIUM 6.1 | Roundcube | Webmail | Feb 12, 2024 | Mar 4, 2024 | Unknown | Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-21762 | CRITICAL 9.8 | Fortinet | FortiOS | Feb 9, 2024 | Feb 16, 2024 | Known | A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-4762 | HIGH 8.8 | Chromium V8 | Feb 6, 2024 | Feb 27, 2024 | Unknown | Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2022-48618 | HIGH 7.0 | Apple | Multiple Products | Jan 31, 2024 | Feb 21, 2024 | Unknown | The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-21893 | HIGH 8.2 | Ivanti | Connect Secure, Policy Secure, and Neurons | Jan 31, 2024 | Feb 2, 2024 | Known | A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-22527 | CRITICAL 9.8 | Atlassian | Confluence Data Center and Server | Jan 24, 2024 | Feb 14, 2024 | Known | A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action. Most recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-23222 | HIGH 8.8 | Apple | Multiple Products | Jan 23, 2024 | Feb 13, 2024 | Unknown | A type confusion issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-34048 | CRITICAL 9.8 | VMware | vCenter Server | Jan 22, 2024 | Feb 12, 2024 | Unknown | vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-35082 | CRITICAL 9.8 | Ivanti | Endpoint Manager Mobile (EPMM) and MobileIron Core | Jan 18, 2024 | Feb 8, 2024 | Known | An authentication bypass vulnerability in Ivanti EPMM 11.10 and older, allows unauthorized users to access restricted functionality or resources of the application without proper authentication. This vulnerability is unique to CVE-2023-35078 announced earlier. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-0519 | HIGH 8.8 | Chromium V8 | Jan 17, 2024 | Feb 7, 2024 | Unknown | Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2023-6549 | HIGH 8.2 | Citrix | NetScaler ADC and NetScaler Gateway | Jan 17, 2024 | Feb 7, 2024 | Unknown | Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service and Out-Of-Bounds Memory Read Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-6548 | MEDIUM 5.5 | Citrix | NetScaler ADC and NetScaler Gateway | Jan 17, 2024 | Jan 24, 2024 | Unknown | Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2018-15133 | HIGH 8.1 | Laravel | Laravel Framework | Jan 16, 2024 | Feb 6, 2024 | Unknown | In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-29357 | CRITICAL 9.8 | Microsoft | SharePoint Server | Jan 10, 2024 | Jan 31, 2024 | Known | Microsoft SharePoint Server Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-46805 | HIGH 8.2 | Ivanti | Connect Secure and Policy Secure | Jan 10, 2024 | Jan 22, 2024 | Known | An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2024-21887 | CRITICAL 9.1 | Ivanti | Connect Secure and Policy Secure | Jan 10, 2024 | Jan 22, 2024 | Known | A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-23752 | MEDIUM 5.3 | Joomla! | Joomla! | Jan 8, 2024 | Jan 29, 2024 | Unknown | An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2016-20017 | CRITICAL 9.8 | D-Link | DSL-2750B Devices | Jan 8, 2024 | Jan 29, 2024 | Unknown | D-Link DSL-2750B devices before 1.05 allow remote unauthenticated command injection via the login.cgi cli parameter, as exploited in the wild in 2016 through 2022. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-41990 | HIGH 7.8 | Apple | Multiple Products | Jan 8, 2024 | Jan 29, 2024 | Unknown | The issue was addressed with improved handling of caches. This issue is fixed in tvOS 16.3, iOS 16.3 and iPadOS 16.3, macOS Monterey 12.6.8, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Ventura 13.2, watchOS 9.3. Processing a font file may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-27524 | HIGH 8.9 | Apache | Superset | Jan 8, 2024 | Jan 29, 2024 | Unknown | Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config. All superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database. Add a strong SECRET_KEY to your `superset_config.py` file like: SECRET_KEY = <YOUR_OWN_RANDOM_GENERATED_SECRET_KEY> Alternatively you can set it with `SUPERSET_SECRET_KEY` environment variable. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-29300 | CRITICAL 9.8 | Adobe | ColdFusion | Jan 8, 2024 | Jan 29, 2024 | Known | Adobe ColdFusion versions 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-38203 | CRITICAL 9.8 | Adobe | ColdFusion | Jan 8, 2024 | Jan 29, 2024 | Known | Adobe ColdFusion versions 2018u17 (and earlier), 2021u7 (and earlier) and 2023u1 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-7101 | HIGH 7.8 | Spreadsheet::ParseExcel | Spreadsheet::ParseExcel | Jan 2, 2024 | Jan 23, 2024 | Unknown | Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-7024 | HIGH 8.8 | Chromium WebRTC | Jan 2, 2024 | Jan 23, 2024 | Unknown | Heap buffer overflow in WebRTC in Google Chrome prior to 120.0.6099.129 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2023-49897 | HIGH 8.8 | FXC | AE1021, AE1021PE | Dec 21, 2023 | Jan 11, 2024 | Unknown | An OS command injection vulnerability exists in AE1021PE firmware version 2.0.9 and earlier and AE1021 firmware version 2.0.9 and earlier. If this vulnerability is exploited, an arbitrary OS command may be executed by an attacker who can log in to the product. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-47565 | HIGH 8.0 | QNAP | VioStor NVR | Dec 21, 2023 | Jan 11, 2024 | Unknown | An OS command injection vulnerability has been found to affect legacy QNAP VioStor NVR models running QVR Firmware 4.x. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following versions: QVR Firmware 5.0.0 and later Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-6448 | CRITICAL 9.8 | Unitronics | Vision PLC and HMI | Dec 11, 2023 | Dec 18, 2023 | Unknown | Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-41266 | HIGH 8.2 | Qlik | Sense | Dec 7, 2023 | Dec 28, 2023 | Known | A path traversal vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows an unauthenticated remote attacker to generate an anonymous session. This allows them to transmit HTTP requests to unauthorized endpoints. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13. Required action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | Open |
| CVE-2023-41265 | CRITICAL 9.6 | Qlik | Sense | Dec 7, 2023 | Dec 28, 2023 | Known | An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attacker to elevate their privilege by tunneling HTTP requests in the raw HTTP request. This allows them to send requests that get executed by the backend server hosting the repository application. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13. Required action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | Open |
| CVE-2023-33107 | HIGH 8.4 | Qualcomm | Multiple Chipsets | Dec 5, 2023 | Dec 26, 2023 | Unknown | Memory corruption in Graphics Linux while assigning shared virtual memory region during IOCTL call. Required action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | Open |
| CVE-2023-33106 | HIGH 8.4 | Qualcomm | Multiple Chipsets | Dec 5, 2023 | Dec 26, 2023 | Unknown | Memory corruption while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND. Required action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | Open |
| CVE-2023-33063 | HIGH 7.8 | Qualcomm | Multiple Chipsets | Dec 5, 2023 | Dec 26, 2023 | Unknown | Memory corruption in DSP Services during a remote call from HLOS to DSP. Required action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | Open |
| CVE-2022-22071 | HIGH 8.4 | Qualcomm | Multiple Chipsets | Dec 5, 2023 | Dec 26, 2023 | Unknown | Possible use after free when process shell memory is freed using IOCTL munmap call and process initialization is in progress in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music Required action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | Open |
| CVE-2023-42917 | HIGH 8.8 | Apple | Multiple Products | Dec 4, 2023 | Dec 25, 2023 | Unknown | A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1. Required action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | Open |
| CVE-2023-42916 | MEDIUM 6.5 | Apple | Multiple Products | Dec 4, 2023 | Dec 25, 2023 | Unknown | An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1. Required action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable. | Open |
| CVE-2023-6345 | CRITICAL 9.6 | Chromium Skia | Nov 30, 2023 | Dec 21, 2023 | Unknown | Integer overflow in Skia in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2023-49103 | CRITICAL 10.0 | ownCloud | ownCloud graphapi | Nov 30, 2023 | Dec 21, 2023 | Unknown | An issue was discovered in ownCloud owncloud/graphapi 0.2.x before 0.2.1 and 0.3.x before 0.3.1. The graphapi app relies on a third-party GetPhpInfo.php library that provides a URL. When this URL is accessed, it reveals the configuration details of the PHP environment (phpinfo). This information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key. Simply disabling the graphapi app does not eliminate the vulnerability. Additionally, phpinfo exposes various other potentially sensitive configuration details that could be exploited by an attacker to gather information about the system. Therefore, even if ownCloud is not running in a containerized environment, this vulnerability should still be a cause for concern. Note that Docker containers from before February 2023 are not vulnerable to the credential disclosure. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-4911 | HIGH 7.8 | GNU | GNU C Library | Nov 21, 2023 | Dec 12, 2023 | Unknown | A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-36584 | MEDIUM 5.4 | Microsoft | Windows | Nov 16, 2023 | Dec 7, 2023 | Unknown | Windows Mark of the Web Security Feature Bypass Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-1671 | CRITICAL 9.8 | Sophos | Web Appliance | Nov 16, 2023 | Dec 7, 2023 | Unknown | A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2020-2551 | CRITICAL 9.8 | Oracle | Fusion Middleware | Nov 16, 2023 | Dec 7, 2023 | Unknown | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-36033 | HIGH 7.8 | Microsoft | Windows | Nov 14, 2023 | Dec 5, 2023 | Unknown | Windows DWM Core Library Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-36025 | HIGH 8.8 | Microsoft | Windows | Nov 14, 2023 | Dec 5, 2023 | Unknown | Windows SmartScreen Security Feature Bypass Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-36036 | HIGH 7.8 | Microsoft | Windows | Nov 14, 2023 | Dec 5, 2023 | Unknown | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-47246 | CRITICAL 9.8 | SysAid | SysAid Server | Nov 13, 2023 | Dec 4, 2023 | Known | In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-36844 | MEDIUM 5.3 | Juniper | Junos OS | Nov 13, 2023 | Nov 17, 2023 | Unknown | A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on EX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R3-S1; * 22.4 versions prior to 22.4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-36845 | CRITICAL 9.8 | Juniper | Junos OS | Nov 13, 2023 | Nov 17, 2023 | Unknown | A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-36846 | MEDIUM 5.3 | Juniper | Junos OS | Nov 13, 2023 | Nov 17, 2023 | Unknown | A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-36847 | MEDIUM 5.3 | Juniper | Junos OS | Nov 13, 2023 | Nov 17, 2023 | Unknown | A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to installAppPackage.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on EX Series: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S4; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S1; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-36851 | MEDIUM 5.3 | Juniper | Junos OS | Nov 13, 2023 | Nov 17, 2023 | Unknown | A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to upload and download arbitrary files via J-Web, leading to a loss of integrity or confidentiality, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * 21.2 versions prior to 21.2R3-S8; * 21.4 versions prior to 21.4R3-S6; * 22.1 versions prior to 22.1R3-S5; * 22.2 versions prior to 22.2R3-S3; * 22.3 versions prior to 22.3R3-S2; * 22.4 versions prior to 22,4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R1-S2, 23.2R2. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-29552 | HIGH 7.5 | IETF | Service Location Protocol (SLP) | Nov 8, 2023 | Nov 29, 2023 | Unknown | The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor. Required action: Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems running on untrusted networks, including those directly connected to the Internet. | Open |
| CVE-2023-22518 | CRITICAL 9.8 | Atlassian | Confluence Data Center and Server | Nov 7, 2023 | Nov 28, 2023 | Known | All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-46604 | CRITICAL 10.0 | Apache | ActiveMQ | Nov 2, 2023 | Nov 23, 2023 | Known | The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-46748 | HIGH 8.8 | F5 | BIG-IP Configuration Utility | Oct 31, 2023 | Nov 21, 2023 | Unknown | An authenticated SQL injection vulnerability exists in the BIG-IP Configuration utility which may allow an authenticated attacker with network access to the Configuration utility through the BIG-IP management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-46747 | CRITICAL 9.8 | F5 | BIG-IP Configuration Utility | Oct 31, 2023 | Nov 21, 2023 | Known | Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-5631 | MEDIUM 6.1 | Roundcube | Webmail | Oct 26, 2023 | Nov 16, 2023 | Unknown | Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-20273 | HIGH 7.2 | Cisco | Cisco IOS XE Web UI | Oct 23, 2023 | Oct 27, 2023 | Unknown | A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands with the privileges of root. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges. Required action: Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report positive findings to CISA. | Open |
| CVE-2023-4966 | CRITICAL 9.4 | Citrix | NetScaler ADC and NetScaler Gateway | Oct 18, 2023 | Nov 8, 2023 | Known | Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. Required action: Apply mitigations and kill all active and persistent sessions per vendor instructions [https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/] OR discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-20198 | CRITICAL 10.0 | Cisco | IOS XE Web UI | Oct 16, 2023 | Oct 20, 2023 | Unknown | Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343. Required action: Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report positive findings to CISA. | Open |
| CVE-2023-21608 | HIGH 7.8 | Adobe | Acrobat and Reader | Oct 10, 2023 | Oct 31, 2023 | Unknown | Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-20109 | MEDIUM 6.6 | Cisco | IOS and IOS XE | Oct 10, 2023 | Oct 31, 2023 | Unknown | A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute arbitrary code on an affected device or cause the device to crash. This vulnerability is due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could exploit this vulnerability by either compromising an installed key server or modifying the configuration of a group member to point to a key server that is controlled by the attacker. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a denial of service (DoS) condition. For more information, see the Details ["#details"] section of this advisory. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-41763 | MEDIUM 5.3 | Microsoft | Skype for Business | Oct 10, 2023 | Oct 31, 2023 | Unknown | Skype for Business Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-36563 | MEDIUM 6.5 | Microsoft | WordPad | Oct 10, 2023 | Oct 31, 2023 | Unknown | Microsoft WordPad Information Disclosure Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-44487 | HIGH 7.5 | IETF | HTTP/2 | Oct 10, 2023 | Oct 31, 2023 | Unknown | The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-22515 | CRITICAL 9.8 | Atlassian | Confluence Data Center and Server | Oct 5, 2023 | Oct 13, 2023 | Known | Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA. | Open |
| CVE-2023-40044 | CRITICAL 10.0 | Progress | WS FTP Server | Oct 5, 2023 | Oct 26, 2023 | Known | In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-42824 | HIGH 7.8 | Apple | iOS and iPadOS | Oct 5, 2023 | Oct 26, 2023 | Unknown | The issue was addressed with improved checks. This issue is fixed in iOS 16.7.1 and iPadOS 16.7.1. A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.6. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-42793 | CRITICAL 9.8 | JetBrains | TeamCity | Oct 4, 2023 | Oct 25, 2023 | Known | In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-28229 | HIGH 7.0 | Microsoft | Windows CNG Key Isolation Service | Oct 4, 2023 | Oct 25, 2023 | Unknown | Windows CNG Key Isolation Service Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-4211 | MEDIUM 5.5 | Arm | Mali GPU Kernel Driver | Oct 3, 2023 | Oct 24, 2023 | Unknown | A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-5217 | HIGH 8.8 | Chromium libvpx | Oct 2, 2023 | Oct 23, 2023 | Unknown | Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2018-14667 | CRITICAL 9.8 | Red Hat | JBoss RichFaces Framework | Sep 28, 2023 | Oct 19, 2023 | Unknown | The RichFaces Framework 3.X through 3.3.4 is vulnerable to Expression Language (EL) injection via the UserResource resource. A remote, unauthenticated attacker could exploit this to execute arbitrary code using a chain of java serialized objects via org.ajax4jsf.resource.UserResource$UriData. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-41991 | MEDIUM 5.5 | Apple | Multiple Products | Sep 25, 2023 | Oct 16, 2023 | Unknown | A certificate validation issue was addressed. This issue is fixed in macOS Ventura 13.6, iOS 16.7 and iPadOS 16.7. A malicious app may be able to bypass signature validation. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-41992 | HIGH 7.8 | Apple | Multiple Products | Sep 25, 2023 | Oct 16, 2023 | Unknown | The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7, iOS 16.7 and iPadOS 16.7, macOS Ventura 13.6. A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-41993 | HIGH 8.8 | Apple | Multiple Products | Sep 25, 2023 | Oct 16, 2023 | Unknown | The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-41179 | HIGH 7.2 | Trend Micro | Apex One and Worry-Free Business Security | Sep 21, 2023 | Oct 12, 2023 | Unknown | A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation. Note that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-28434 | HIGH 8.8 | MinIO | MinIO | Sep 19, 2023 | Oct 10, 2023 | Unknown | Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2022-22265 | MEDIUM 5.0 | Samsung | Mobile Devices | Sep 18, 2023 | Oct 9, 2023 | Unknown | An improper check or handling of exceptional conditions in NPU driver prior to SMR Jan-2022 Release 1 allows arbitrary memory write and code execution. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2014-8361 | CRITICAL 9.8 | Realtek | SDK | Sep 18, 2023 | Oct 9, 2023 | Unknown | The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2017-6884 | HIGH 8.8 | Zyxel | EMG2926 Routers | Sep 18, 2023 | Oct 9, 2023 | Known | A command injection vulnerability was discovered on the Zyxel EMG2926 home router with firmware V1.00(AAQT.4)b8. The vulnerability is located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute arbitrary commands on the router, such as the ping_ip parameter to the expert/maintenance/diagnostic/nslookup URI. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2021-3129 | CRITICAL 9.8 | Laravel | Ignition | Sep 18, 2023 | Oct 9, 2023 | Known | Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-26369 | HIGH 7.8 | Adobe | Acrobat and Reader | Sep 14, 2023 | Oct 5, 2023 | Unknown | Acrobat Reader versions 23.003.20284 (and earlier), 20.005.30516 (and earlier) and 20.005.30514 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-35674 | HIGH 7.8 | Android | Framework | Sep 13, 2023 | Oct 4, 2023 | Unknown | In onCreate of WindowState.java, there is a possible way to launch a background activity due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-20269 | MEDIUM 5.0 | Cisco | Adaptive Security Appliance and Firepower Threat Defense | Sep 13, 2023 | Oct 4, 2023 | Known | A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user. This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following: Identify valid credentials that could then be used to establish an unauthorized remote access VPN session. Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier). Notes: Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured. This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured. Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability. Required action: Apply mitigations per vendor instructions for group-lock and vpn-simultaneous-logins or discontinue use of the product for unsupported devices. | Open |
| CVE-2023-4863 | HIGH 8.8 | Chromium WebP | Sep 13, 2023 | Oct 4, 2023 | Unknown | Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical) Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open | |
| CVE-2023-36761 | MEDIUM 6.5 | Microsoft | Word | Sep 12, 2023 | Oct 3, 2023 | Unknown | Microsoft Word Information Disclosure Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-36802 | HIGH 7.8 | Microsoft | Streaming Service Proxy | Sep 12, 2023 | Oct 3, 2023 | Unknown | Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-41064 | HIGH 7.8 | Apple | iOS, iPadOS, and macOS | Sep 11, 2023 | Oct 2, 2023 | Unknown | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-41061 | HIGH 7.8 | Apple | iOS, iPadOS, and watchOS | Sep 11, 2023 | Oct 2, 2023 | Unknown | A validation issue was addressed with improved logic. This issue is fixed in watchOS 9.6.2, iOS 16.6.1 and iPadOS 16.6.1. A maliciously crafted attachment may result in arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-33246 | CRITICAL 9.8 | Apache | RocketMQ | Sep 6, 2023 | Sep 27, 2023 | Unknown | For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution. Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content. To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x . Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-38831 | HIGH 7.8 | RARLAB | WinRAR | Aug 24, 2023 | Sep 14, 2023 | Known | RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-32315 | HIGH 8.6 | Ignite Realtime | Openfire | Aug 24, 2023 | Sep 14, 2023 | Unknown | Openfire is an XMPP server licensed under the Open Source Apache License. Openfire's administrative console, a web-based application, was found to be vulnerable to a path traversal attack via the setup environment. This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environment in an already configured Openfire environment to access restricted pages in the Openfire Admin Console reserved for administrative users. This vulnerability affects all versions of Openfire that have been released since April 2015, starting with version 3.10.0. The problem has been patched in Openfire release 4.7.5 and 4.6.8, and further improvements will be included in the yet-to-be released first version on the 4.8 branch (which is expected to be version 4.8.0). Users are advised to upgrade. If an Openfire upgrade isn’t available for a specific release, or isn’t quickly actionable, users may see the linked github advisory (GHSA-gw42-f939-fhvm) for mitigation advice. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-38035 | CRITICAL 9.8 | Ivanti | Sentry | Aug 22, 2023 | Sep 12, 2023 | Known | A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-27532 | HIGH 7.5 | Veeam | Backup & Replication | Aug 22, 2023 | Sep 12, 2023 | Known | Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be obtained. This may lead to gaining access to the backup infrastructure hosts. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-26359 | CRITICAL 9.8 | Adobe | ColdFusion | Aug 21, 2023 | Sep 11, 2023 | Unknown | Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-24489 | CRITICAL 9.8 | Citrix | Content Collaboration | Aug 16, 2023 | Sep 6, 2023 | Unknown | A vulnerability has been discovered in the customer-managed ShareFile storage zones controller which, if exploited, could allow an unauthenticated attacker to remotely compromise the customer-managed ShareFile storage zones controller. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-38180 | HIGH 7.5 | Microsoft | .NET Core and Visual Studio | Aug 9, 2023 | Aug 30, 2023 | Unknown | .NET and Visual Studio Denial of Service Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2017-18368 | CRITICAL 9.8 | Zyxel | P660HN-T1A Routers | Aug 7, 2023 | Aug 28, 2023 | Unknown | The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-35081 | HIGH 7.2 | Ivanti | Endpoint Manager Mobile (EPMM) | Jul 31, 2023 | Aug 21, 2023 | Unknown | A path traversal vulnerability in Ivanti EPMM versions (11.10.x < 11.10.0.3, 11.9.x < 11.9.1.2 and 11.8.x < 11.8.1.2) allows an authenticated administrator to write arbitrary files onto the appliance. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-37580 | MEDIUM 6.1 | Synacor | Zimbra Collaboration Suite (ZCS) | Jul 27, 2023 | Aug 17, 2023 | Unknown | Zimbra Collaboration (ZCS) 8 before 8.8.15 Patch 41 allows XSS in the Zimbra Classic Web Client. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-38606 | MEDIUM 5.5 | Apple | Multiple Products | Jul 26, 2023 | Aug 16, 2023 | Unknown | This issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to modify sensitive kernel state. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-35078 | CRITICAL 9.8 | Ivanti | Endpoint Manager Mobile (EPMM) | Jul 25, 2023 | Aug 15, 2023 | Known | An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-29298 | HIGH 7.5 | Adobe | ColdFusion | Jul 20, 2023 | Aug 10, 2023 | Unknown | Adobe ColdFusion versions 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-38205 | HIGH 7.5 | Adobe | ColdFusion | Jul 20, 2023 | Aug 10, 2023 | Unknown | Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-3519 | CRITICAL 9.8 | Citrix | NetScaler ADC and NetScaler Gateway | Jul 19, 2023 | Aug 9, 2023 | Known | Unauthenticated remote code execution Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2023-36884 | HIGH 7.5 | Microsoft | Windows | Jul 17, 2023 | Aug 29, 2023 | Known | Windows Search Remote Code Execution Vulnerability Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Open |
| CVE-2022-29303 | CRITICAL 9.8 | SolarView | Compact | Jul 13, 2023 | Aug 3, 2023 | Unknown | SolarView Compact ver.6.00 was discovered to contain a command injection vulnerability via conf_mail.php. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. | Open |
| CVE-2023-37450 | HIGH 8.8 | Apple | Multiple Products | Jul 13, 2023 | Aug 3, 2023 | Unknown | The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, Safari 16.5.2, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. | Open |
| CVE-2023-32046 | HIGH 7.8 | Microsoft | Windows | Jul 11, 2023 | Aug 1, 2023 | Unknown | Windows MSHTML Platform Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. | Open |
| CVE-2023-32049 | HIGH 8.8 | Microsoft | Windows | Jul 11, 2023 | Aug 1, 2023 | Unknown | Windows SmartScreen Security Feature Bypass Vulnerability Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. | Open |
| CVE-2023-35311 | HIGH 8.8 | Microsoft | Outlook | Jul 11, 2023 | Aug 1, 2023 | Unknown | Microsoft Outlook Security Feature Bypass Vulnerability Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. | Open |
| CVE-2023-36874 | HIGH 7.8 | Microsoft | Windows | Jul 11, 2023 | Aug 1, 2023 | Unknown | Windows Error Reporting Service Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. | Open |
| CVE-2022-31199 | CRITICAL 9.8 | Netwrix | Auditor | Jul 11, 2023 | Aug 1, 2023 | Known | Remote code execution vulnerabilities exist in the Netwrix Auditor User Activity Video Recording component affecting both the Netwrix Auditor server and agents installed on monitored systems. The remote code execution vulnerabilities exist within the underlying protocol used by the component, and potentially allow an unauthenticated remote attacker to execute arbitrary code as the NT AUTHORITY\SYSTEM user on affected systems, including on systems Netwrix Auditor monitors. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. | Open |
| CVE-2021-29256 | HIGH 8.8 | Arm | Mali Graphics Processing Unit (GPU) | Jul 7, 2023 | Jul 28, 2023 | Unknown | . The Arm Mali GPU kernel driver allows an unprivileged user to achieve access to freed memory, leading to information disclosure or root privilege escalation. This affects Bifrost r16p0 through r29p0 before r30p0, Valhall r19p0 through r29p0 before r30p0, and Midgard r28p0 through r30p0. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. | Open |
| CVE-2019-17621 | CRITICAL 9.8 | D-Link | DIR-859 Router | Jun 29, 2023 | Jul 20, 2023 | Unknown | The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. | Open |
| CVE-2019-20500 | HIGH 7.8 | D-Link | DWL-2600AP Access Point | Jun 29, 2023 | Jul 20, 2023 | Unknown | D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Save Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_save configBackup or downloadServerip parameter. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. | Open |
| CVE-2021-25487 | HIGH 7.3 | Samsung | Mobile Devices | Jun 29, 2023 | Jul 20, 2023 | Unknown | Lack of boundary checking of a buffer in set_skb_priv() of modem interface driver prior to SMR Oct-2021 Release 1 allows OOB read and it results in arbitrary code execution by dereference of invalid function pointer. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable | Open |
| CVE-2021-25489 | LOW 3.3 | Samsung | Mobile Devices | Jun 29, 2023 | Jul 20, 2023 | Unknown | Assuming radio permission is gained, missing input validation in modem interface driver prior to SMR Oct-2021 Release 1 results in format string bug leading to kernel panic. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable | Open |
| CVE-2021-25394 | MEDIUM 6.4 | Samsung | Mobile Devices | Jun 29, 2023 | Jul 20, 2023 | Unknown | A use after free vulnerability via race condition in MFC charger driver prior to SMR MAY-2021 Release 1 allows arbitrary write given a radio privilege is compromised. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable | Open |
| CVE-2021-25395 | MEDIUM 6.4 | Samsung | Mobile Devices | Jun 29, 2023 | Jul 20, 2023 | Unknown | A race condition in MFC charger driver prior to SMR MAY-2021 Release 1 allows local attackers to bypass signature check given a radio privilege is compromised. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable | Open |
| CVE-2021-25371 | MEDIUM 6.1 | Samsung | Mobile Devices | Jun 29, 2023 | Jul 20, 2023 | Unknown | A vulnerability in DSP driver prior to SMR Mar-2021 Release 1 allows attackers load arbitrary ELF libraries inside DSP. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable | Open |
| CVE-2021-25372 | MEDIUM 6.1 | Samsung | Mobile Devices | Jun 29, 2023 | Jul 20, 2023 | Unknown | An improper boundary check in DSP driver prior to SMR Mar-2021 Release 1 allows out of bounds memory access. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable | Open |
| CVE-2023-32434 | HIGH 7.8 | Apple | Multiple Products | Jun 23, 2023 | Jul 14, 2023 | Unknown | An integer overflow was addressed with improved input validation. This issue is fixed in watchOS 9.5.2, macOS Big Sur 11.7.8, iOS 15.7.7 and iPadOS 15.7.7, macOS Monterey 12.6.7, watchOS 8.8.1, iOS 16.5.1 and iPadOS 16.5.1, macOS Ventura 13.4.1. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-32435 | HIGH 8.8 | Apple | Multiple Products | Jun 23, 2023 | Jul 14, 2023 | Unknown | A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-32439 | HIGH 8.8 | Apple | Multiple Products | Jun 23, 2023 | Jul 14, 2023 | Unknown | A type confusion issue was addressed with improved checks. This issue is fixed in iOS 16.5.1 and iPadOS 16.5.1, iOS 15.7.7 and iPadOS 15.7.7, macOS Ventura 13.4.1, Safari 16.5.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-20867 | LOW 3.9 | VMware | Tools | Jun 23, 2023 | Jul 14, 2023 | Unknown | A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-27992 | CRITICAL 9.8 | Zyxel | Multiple Network-Attached Storage (NAS) Devices | Jun 23, 2023 | Jul 14, 2023 | Unknown | The pre-authentication command injection vulnerability in the Zyxel NAS326 firmware versions prior to V5.21(AAZF.14)C0, NAS540 firmware versions prior to V5.21(AATB.11)C0, and NAS542 firmware versions prior to V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands remotely by sending a crafted HTTP request. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-20887 | CRITICAL 9.8 | VMware | Aria Operations for Networks | Jun 22, 2023 | Jul 13, 2023 | Unknown | Aria Operations for Networks contains a command injection vulnerability. A malicious actor with network access to VMware Aria Operations for Networks may be able to perform a command injection attack resulting in remote code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-35730 | MEDIUM 6.1 | Roundcube | Roundcube Webmail | Jun 22, 2023 | Jul 13, 2023 | Unknown | An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-12641 | CRITICAL 9.8 | Roundcube | Roundcube Webmail | Jun 22, 2023 | Jul 13, 2023 | Unknown | rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-44026 | CRITICAL 9.8 | Roundcube | Roundcube Webmail | Jun 22, 2023 | Jul 13, 2023 | Unknown | Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search_params. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-9079 | HIGH 7.5 | Mozilla | Firefox, Firefox ESR, and Thunderbird | Jun 22, 2023 | Jul 13, 2023 | Unknown | A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerability affects Firefox < 50.0.2, Firefox ESR < 45.5.1, and Thunderbird < 45.5.1. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-0165 | HIGH 7.8 | Microsoft | Win32k | Jun 22, 2023 | Jul 13, 2023 | Unknown | The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0143 and CVE-2016-0167. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-27997 | CRITICAL 9.8 | Fortinet | FortiOS and FortiProxy SSL-VPN | Jun 13, 2023 | Jul 4, 2023 | Known | A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-3079 | HIGH 8.8 | Chromium V8 | Jun 7, 2023 | Jun 28, 2023 | Unknown | Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Required action: Apply updates per vendor instructions. | Open | |
| CVE-2023-33009 | CRITICAL 9.8 | Zyxel | Multiple Firewalls | Jun 5, 2023 | Jun 26, 2023 | Unknown | A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions 4.60 through 5.36 Patch 1, USG FLEX series firmware versions 4.60 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.60 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.60 through 5.36 Patch 1, VPN series firmware versions 4.60 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.60 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-33010 | CRITICAL 9.8 | Zyxel | Multiple Firewalls | Jun 5, 2023 | Jun 26, 2023 | Unknown | A buffer overflow vulnerability in the ID processing function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-34362 | CRITICAL 9.8 | Progress | MOVEit Transfer | Jun 2, 2023 | Jun 23, 2023 | Known | In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-28771 | CRITICAL 9.8 | Zyxel | Multiple Firewalls | May 31, 2023 | Jun 21, 2023 | Unknown | Improper error message handling in Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73, VPN series firmware versions 4.60 through 5.35, USG FLEX series firmware versions 4.60 through 5.35, and ATP series firmware versions 4.60 through 5.35, which could allow an unauthenticated attacker to execute some OS commands remotely by sending crafted packets to an affected device. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-2868 | CRITICAL 9.4 | Barracuda Networks | Email Security Gateway (ESG) Appliance | May 26, 2023 | Jun 16, 2023 | Unknown | A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-32409 | HIGH 8.6 | Apple | Multiple Products | May 22, 2023 | Jun 12, 2023 | Unknown | The issue was addressed with improved bounds checks. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.8 and iPadOS 15.7.8, Safari 16.5, iOS 16.5 and iPadOS 16.5. A remote attacker may be able to break out of Web Content sandbox. Apple is aware of a report that this issue may have been actively exploited. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-28204 | MEDIUM 6.5 | Apple | Multiple Products | May 22, 2023 | Jun 12, 2023 | Unknown | An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-32373 | HIGH 8.8 | Apple | Multiple Products | May 22, 2023 | Jun 12, 2023 | Unknown | A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Required action: Apply updates per vendor instructions. | Open |
| CVE-2004-1464 | MEDIUM 5.9 | Cisco | IOS | May 19, 2023 | Jun 9, 2023 | Unknown | Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-6415 | HIGH 7.5 | Cisco | IOS, IOS XR, and IOS XE | May 19, 2023 | Jun 9, 2023 | Unknown | The server IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.6, IOS XE through 3.18S, IOS XR 4.3.x and 5.0.x through 5.2.x, and PIX before 7.0 allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request, aka Bug IDs CSCvb29204 and CSCvb36055 or BENIGNCERTAIN. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-21492 | MEDIUM 4.4 | Samsung | Mobile Devices | May 19, 2023 | Jun 9, 2023 | Unknown | Kernel pointers are printed in the log file prior to SMR May-2023 Release 1 allows a privileged local attacker to bypass ASLR. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-25717 | CRITICAL 9.8 | Ruckus Wireless | Multiple Products | May 12, 2023 | Jun 2, 2023 | Unknown | Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring. Required action: Apply updates per vendor instructions or disconnect product if it is end-of-life. | Open |
| CVE-2021-3560 | HIGH 7.8 | Red Hat | Polkit | May 12, 2023 | Jun 2, 2023 | Unknown | It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-0196 | MEDIUM 5.5 | Linux | Kernel | May 12, 2023 | Jun 2, 2023 | Unknown | The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2010-3904 | HIGH 7.8 | Linux | Kernel | May 12, 2023 | Jun 2, 2023 | Unknown | The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2015-5317 | HIGH 7.5 | Jenkins | Jenkins User Interface (UI) | May 12, 2023 | Jun 2, 2023 | Unknown | The Fingerprints pages in Jenkins before 1.638 and LTS before 1.625.2 might allow remote attackers to obtain sensitive job and build name information via a direct request. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-3427 | CRITICAL 9.8 | Oracle | Java SE and JRockit | May 12, 2023 | Jun 2, 2023 | Unknown | Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-8735 | CRITICAL 9.8 | Apache | Tomcat | May 12, 2023 | Jun 2, 2023 | Unknown | Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-29336 | HIGH 7.8 | Microsoft | Win32k | May 9, 2023 | May 30, 2023 | Unknown | Win32k Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-1389 | HIGH 8.8 | TP-Link | Archer AX21 | May 1, 2023 | May 22, 2023 | Unknown | TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-45046 | CRITICAL 9.0 | Apache | Log4j2 | May 1, 2023 | May 22, 2023 | Known | It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-21839 | HIGH 7.5 | Oracle | WebLogic Server | May 1, 2023 | May 22, 2023 | Unknown | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-28432 | HIGH 7.5 | MinIO | MinIO | Apr 21, 2023 | May 12, 2023 | Unknown | Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including `MINIO_SECRET_KEY` and `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-27350 | CRITICAL 9.8 | PaperCut | MF/NG | Apr 21, 2023 | May 12, 2023 | Known | This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-2136 | CRITICAL 9.6 | Chromium Skia | Apr 21, 2023 | May 12, 2023 | Unknown | Integer overflow in Skia in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) Required action: Apply updates per vendor instructions. | Open | |
| CVE-2017-6742 | HIGH 8.8 | Cisco | IOS and IOS XE Software | Apr 19, 2023 | May 10, 2023 | Unknown | A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device. The vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system. Only traffic directed to the affected system can be used to exploit this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-8526 | HIGH 7.8 | Apple | macOS | Apr 17, 2023 | May 8, 2023 | Unknown | A use after free issue was addressed with improved memory management. This issue is fixed in macOS Mojave 10.14.4. An application may be able to gain elevated privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-2033 | HIGH 8.8 | Chromium V8 | Apr 17, 2023 | May 8, 2023 | Unknown | Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Required action: Apply updates per vendor instructions. | Open | |
| CVE-2023-20963 | HIGH 7.8 | Android | Framework | Apr 13, 2023 | May 4, 2023 | Unknown | In WorkSource, there is a possible parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-220302519 Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-29492 | CRITICAL 9.8 | Novi Survey | Novi Survey | Apr 13, 2023 | May 4, 2023 | Unknown | Novi Survey before 8.9.43676 allows remote attackers to execute arbitrary code on the server in the context of the service account. This does not provide access to stored survey or response data. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-28252 | HIGH 7.8 | Microsoft | Windows | Apr 11, 2023 | May 2, 2023 | Known | Windows Common Log File System Driver Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-28205 | HIGH 8.8 | Apple | Multiple Products | Apr 10, 2023 | May 1, 2023 | Unknown | A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-28206 | HIGH 8.6 | Apple | iOS, iPadOS, and macOS | Apr 10, 2023 | May 1, 2023 | Unknown | An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1, iOS 15.7.5 and iPadOS 15.7.5, macOS Big Sur 11.7.6. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-27876 | HIGH 8.1 | Veritas | Backup Exec Agent | Apr 7, 2023 | Apr 28, 2023 | Known | An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. By using crafted input parameters in one of these commands, an attacker can access an arbitrary file on the system using System privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-27877 | HIGH 8.2 | Veritas | Backup Exec Agent | Apr 7, 2023 | Apr 28, 2023 | Known | An issue was discovered in Veritas Backup Exec before 21.2. It supports multiple authentication schemes: SHA authentication is one of these. This authentication scheme is no longer used in current versions of the product, but hadn't yet been disabled. An attacker could remotely exploit this scheme to gain unauthorized access to an Agent and execute privileged commands. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-27878 | HIGH 8.8 | Veritas | Backup Exec Agent | Apr 7, 2023 | Apr 28, 2023 | Known | An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. The attacker could use one of these commands to execute an arbitrary command on the system using system privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1388 | HIGH 7.8 | Microsoft | Windows | Apr 7, 2023 | Apr 28, 2023 | Known | An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges, aka 'Windows Certificate Dialog Elevation of Privilege Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-26083 | LOW 3.3 | Arm | Mali Graphics Processing Unit (GPU) | Apr 7, 2023 | Apr 28, 2023 | Unknown | Memory leak vulnerability in Mali GPU Kernel Driver in Midgard GPU Kernel Driver all versions from r6p0 - r32p0, Bifrost GPU Kernel Driver all versions from r0p0 - r42p0, Valhall GPU Kernel Driver all versions from r19p0 - r42p0, and Avalon GPU Kernel Driver all versions from r41p0 - r42p0 allows a non-privileged user to make valid GPU processing operations that expose sensitive kernel metadata. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-27926 | MEDIUM 6.1 | Synacor | Zimbra Collaboration Suite (ZCS) | Apr 3, 2023 | Apr 24, 2023 | Unknown | A reflected cross-site scripting (XSS) vulnerability in the /public/launchNewWindow.jsp component of Zimbra Collaboration (aka ZCS) 9.0 allows unauthenticated attackers to execute arbitrary web script or HTML via request parameters. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-3163 | HIGH 8.8 | Microsoft | Internet Explorer | Mar 30, 2023 | Apr 20, 2023 | Unknown | Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2017-7494 | CRITICAL 9.8 | Samba | Samba | Mar 30, 2023 | Apr 20, 2023 | Known | Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-42948 | CRITICAL 9.8 | Fortra | Cobalt Strike | Mar 30, 2023 | Apr 20, 2023 | Unknown | Cobalt Strike 4.7.1 fails to properly escape HTML tags when they are displayed on Swing components. By injecting crafted HTML code, it is possible to remotely execute code in the Cobalt Strike UI. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-39197 | MEDIUM 6.1 | Fortra | Cobalt Strike | Mar 30, 2023 | Apr 20, 2023 | Unknown | An XSS (Cross Site Scripting) vulnerability was found in HelpSystems Cobalt Strike through 4.7 that allowed a remote attacker to execute HTML on the Cobalt Strike teamserver. To exploit the vulnerability, one must first inspect a Cobalt Strike payload, and then modify the username field in the payload (or create a new payload with the extracted information and then modify that username field to be malformed). Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30900 | HIGH 7.8 | Apple | iOS, iPadOS, and macOS | Mar 30, 2023 | Apr 20, 2023 | Unknown | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 14.8.1 and iPadOS 14.8.1, iOS 15.1 and iPadOS 15.1. A malicious application may be able to execute arbitrary code with kernel privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-38181 | HIGH 8.8 | Arm | Mali Graphics Processing Unit (GPU) | Mar 30, 2023 | Apr 20, 2023 | Unknown | The Arm Mali GPU kernel driver allows unprivileged users to access freed memory because GPU memory operations are mishandled. This affects Bifrost r0p0 through r38p1, and r39p0; Valhall r19p0 through r38p1, and r39p0; and Midgard r4p0 through r32p0. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-0266 | HIGH 7.9 | Linux | Kernel | Mar 30, 2023 | Apr 20, 2023 | Unknown | A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-3038 | HIGH 8.8 | Chromium Network Service | Mar 30, 2023 | Apr 20, 2023 | Unknown | Use after free in Network Service in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2022-22706 | HIGH 7.8 | Arm | Mali Graphics Processing Unit (GPU) | Mar 30, 2023 | Apr 20, 2023 | Unknown | Arm Mali GPU Kernel Driver allows a non-privileged user to achieve write access to read-only memory pages. This affects Midgard r26p0 through r31p0, Bifrost r0p0 through r35p0, and Valhall r19p0 through r35p0. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-26360 | HIGH 8.6 | Adobe | ColdFusion | Mar 15, 2023 | Apr 5, 2023 | Unknown | Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier) are affected by an Improper Access Control vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-23397 | CRITICAL 9.8 | Microsoft | Office | Mar 14, 2023 | Apr 4, 2023 | Unknown | Microsoft Outlook Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-24880 | MEDIUM 4.4 | Microsoft | Windows | Mar 14, 2023 | Apr 4, 2023 | Known | Windows SmartScreen Security Feature Bypass Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-41328 | MEDIUM 6.7 | Fortinet | FortiOS | Mar 14, 2023 | Apr 4, 2023 | Unknown | A improper limitation of a pathname to a restricted directory vulnerability ('path traversal') [CWE-22] in Fortinet FortiOS version 7.2.0 through 7.2.3, 7.0.0 through 7.0.9 and before 6.4.11 allows a privileged attacker to read and write files on the underlying Linux system via crafted CLI commands. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-39144 | HIGH 8.5 | XStream | XStream | Mar 10, 2023 | Mar 31, 2023 | Unknown | XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-5741 | HIGH 7.2 | Plex | Media Server | Mar 10, 2023 | Mar 31, 2023 | Unknown | Deserialization of Untrusted Data in Plex Media Server on Windows allows a remote, authenticated attacker to execute arbitrary Python code. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-28810 | MEDIUM 6.8 | Zoho | ManageEngine | Mar 7, 2023 | Mar 28, 2023 | Unknown | Zoho ManageEngine ADSelfService Plus before build 6122 allows a remote authenticated administrator to execute arbitrary operating OS commands as SYSTEM via the policy custom script feature. Due to the use of a default administrator password, attackers may be able to abuse this functionality with minimal effort. Additionally, a remote and partially authenticated attacker may be able to inject arbitrary commands into the custom script due to an unsanitized password field. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-33891 | HIGH 8.8 | Apache | Spark | Mar 7, 2023 | Mar 28, 2023 | Unknown | The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-35914 | CRITICAL 9.8 | Teclib | GLPI | Mar 7, 2023 | Mar 28, 2023 | Unknown | /vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-36537 | HIGH 7.5 | ZK Framework | AuUploader | Feb 27, 2023 | Mar 20, 2023 | Known | ZK Framework v9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 allows attackers to access sensitive information via a crafted POST request sent to the component AuUploader. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-47986 | CRITICAL 9.8 | IBM | Aspera Faspex | Feb 21, 2023 | Mar 14, 2023 | Known | IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker to execute arbitrary code on the system, caused by a YAML deserialization flaw. By sending a specially crafted obsolete API call, an attacker could exploit this vulnerability to execute arbitrary code on the system. The obsolete API call was removed in Faspex 4.4.2 PL2. IBM X-Force ID: 243512. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-41223 | MEDIUM 6.8 | Mitel | MiVoice Connect | Feb 21, 2023 | Mar 14, 2023 | Known | The Director database component of MiVoice Connect through 19.3 (22.22.6100.0) could allow an authenticated attacker to conduct a code-injection attack via crafted data due to insufficient restrictions on the database data type. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-40765 | MEDIUM 6.8 | Mitel | MiVoice Connect | Feb 21, 2023 | Mar 14, 2023 | Known | A vulnerability in the Edge Gateway component of Mitel MiVoice Connect through 19.3 (22.22.6100.0) could allow an authenticated attacker with internal network access to conduct a command-injection attack, due to insufficient restriction of URL parameters. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-46169 | CRITICAL 9.8 | Cacti | Cacti | Feb 16, 2023 | Mar 9, 2023 | Unknown | Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the `remote_agent.php` file. This file can be accessed without authentication. This function retrieves the IP address of the client via `get_client_addr` and resolves this IP address to the corresponding hostname via `gethostbyaddr`. After this, it is verified that an entry within the `poller` table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns `true` and the client is authorized. This authorization can be bypassed due to the implementation of the `get_client_addr` function. The function is defined in the file `lib/functions.php` and checks serval `$_SERVER` variables to determine the IP address of the client. The variables beginning with `HTTP_` can be arbitrarily set by an attacker. Since there is a default entry in the `poller` table with the hostname of the server running Cacti, an attacker can bypass the authentication e.g. by providing the header `Forwarded-For: <TARGETIP>`. This way the function `get_client_addr` returns the IP address of the server running Cacti. The following call to `gethostbyaddr` will resolve this IP address to the hostname of the server, which will pass the `poller` hostname check because of the default entry. After the authorization of the `remote_agent.php` file is bypassed, an attacker can trigger different actions. One of these actions is called `polldata`. The called function `poll_for_data` retrieves a few request parameters and loads the corresponding `poller_item` entries from the database. If the `action` of a `poller_item` equals `POLLER_ACTION_SCRIPT_PHP`, the function `proc_open` is used to execute a PHP script. The attacker-controlled parameter `$poller_id` is retrieved via the function `get_nfilter_request_var`, which allows arbitrary strings. This variable is later inserted into the string passed to `proc_open`, which leads to a command injection vulnerability. By e.g. providing the `poller_id=;id` the `id` command is executed. In order to reach the vulnerable call, the attacker must provide a `host_id` and `local_data_id`, where the `action` of the corresponding `poller_item` is set to `POLLER_ACTION_SCRIPT_PHP`. Both of these ids (`host_id` and `local_data_id`) can easily be bruteforced. The only requirement is that a `poller_item` with an `POLLER_ACTION_SCRIPT_PHP` action exists. This is very likely on a productive instance because this action is added by some predefined templates like `Device - Uptime` or `Device - Polling Time`. This command injection vulnerability allows an unauthenticated user to execute arbitrary commands if a `poller_item` with the `action` type `POLLER_ACTION_SCRIPT_PHP` (`2`) is configured. The authorization bypass should be prevented by not allowing an attacker to make `get_client_addr` (file `lib/functions.php`) return an arbitrary IP address. This could be done by not honoring the `HTTP_...` `$_SERVER` variables. If these should be kept for compatibility reasons it should at least be prevented to fake the IP address of the server running Cacti. This vulnerability has been addressed in both the 1.2.x and 1.3.x release branches with `1.2.23` being the first release containing the patch. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-21715 | HIGH 7.3 | Microsoft | Office | Feb 14, 2023 | Mar 7, 2023 | Unknown | Microsoft Publisher Security Feature Bypass Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-23376 | HIGH 7.8 | Microsoft | Windows | Feb 14, 2023 | Mar 7, 2023 | Known | Windows Common Log File System Driver Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-23529 | HIGH 8.8 | Apple | Multiple Products | Feb 14, 2023 | Mar 7, 2023 | Unknown | A type confusion issue was addressed with improved checks. This issue is fixed in iOS 15.7.4 and iPadOS 15.7.4, iOS 16.3.1 and iPadOS 16.3.1, macOS Ventura 13.2.1, Safari 16.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-21823 | HIGH 7.8 | Microsoft | Windows | Feb 14, 2023 | Mar 7, 2023 | Unknown | Windows Graphics Component Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-2291 | HIGH 7.8 | Intel | Ethernet Diagnostics Driver for Windows | Feb 10, 2023 | Mar 3, 2023 | Known | (1) IQVW32.sys before 1.3.1.0 and (2) IQVW64.sys before 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8086200F, or (d) 0x80862007 IOCTL call. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-24990 | HIGH 7.5 | TerraMaster | TerraMaster OS | Feb 10, 2023 | Mar 3, 2023 | Known | TerraMaster NAS 4.2.29 and earlier allows remote attackers to discover the administrative password by sending "User-Agent: TNAS" to module/api.php?mobile/webNasIPS and then reading the PWD field in the response. Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-0669 | HIGH 7.2 | Fortra | GoAnywhere MFT | Feb 10, 2023 | Mar 3, 2023 | Known | Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-21587 | CRITICAL 9.8 | Oracle | E-Business Suite | Feb 2, 2023 | Feb 23, 2023 | Known | Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-22952 | HIGH 8.8 | SugarCRM | Multiple Products | Feb 2, 2023 | Feb 23, 2023 | Unknown | In SugarCRM before 12.0. Hotfix 91155, a crafted request can inject custom PHP code through the EmailTemplates because of missing input validation. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-11357 | CRITICAL 9.8 | Telerik | User Interface (UI) for ASP.NET AJAX | Jan 26, 2023 | Feb 16, 2023 | Known | Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-47966 | CRITICAL 9.8 | Zoho | ManageEngine | Jan 23, 2023 | Feb 13, 2023 | Known | Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through 14003, allow remote code execution due to use of Apache Santuario xmlsec (aka XML Security for Java) 1.4.1, because the xmlsec XSLT features, by design in that version, make the application responsible for certain security protections, and the ManageEngine applications did not provide those protections. This affects Access Manager Plus before 4308, Active Directory 360 before 4310, ADAudit Plus before 7081, ADManager Plus before 7162, ADSelfService Plus before 6211, Analytics Plus before 5150, Application Control Plus before 10.1.2220.18, Asset Explorer before 6983, Browser Security Plus before 11.1.2238.6, Device Control Plus before 10.1.2220.18, Endpoint Central before 10.1.2228.11, Endpoint Central MSP before 10.1.2228.11, Endpoint DLP before 10.1.2137.6, Key Manager Plus before 6401, OS Deployer before 1.1.2243.1, PAM 360 before 5713, Password Manager Pro before 12124, Patch Manager Plus before 10.1.2220.18, Remote Access Plus before 10.1.2228.11, Remote Monitoring and Management (RMM) before 10.1.41. ServiceDesk Plus before 14004, ServiceDesk Plus MSP before 13001, SupportCenter Plus before 11026, and Vulnerability Manager Plus before 10.1.2220.18. Exploitation is only possible if SAML SSO has ever been configured for a product (for some products, exploitation requires that SAML SSO is currently active). Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-44877 | CRITICAL 9.8 | CWP | Control Web Panel | Jan 17, 2023 | Feb 7, 2023 | Unknown | login/index.php in CWP (aka Control Web Panel or CentOS Web Panel) 7 before 0.9.8.1147 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the login parameter. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-41080 | HIGH 8.8 | Microsoft | Exchange Server | Jan 10, 2023 | Jan 31, 2023 | Known | Microsoft Exchange Server Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2023-21674 | HIGH 8.8 | Microsoft | Windows | Jan 10, 2023 | Jan 31, 2023 | Unknown | Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-5430 | HIGH 8.8 | TIBCO | JasperReports | Dec 29, 2022 | Jan 19, 2023 | Unknown | The Spring web flows of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contain a vulnerability which may allow any authenticated user read-only access to the contents of the web application, including key configuration files. Affected releases include TIBCO Software Inc.'s TIBCO JasperReports Server: versions up to and including 6.2.4; 6.3.0; 6.3.2; 6.3.3;6.4.0; 6.4.2, TIBCO JasperReports Server Community Edition: versions up to and including 6.4.2, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.2, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 6.4.2, TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 6.4.2. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-18809 | MEDIUM 6.5 | TIBCO | JasperReports | Dec 29, 2022 | Jan 19, 2023 | Unknown | The default server implementation of TIBCO Software Inc.'s TIBCO JasperReports Library, TIBCO JasperReports Library Community Edition, TIBCO JasperReports Library for ActiveMatrix BPM, TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a directory-traversal vulnerability that may theoretically allow web server users to access contents of the host system. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Library: versions up to and including 6.3.4; 6.4.1; 6.4.2; 6.4.21; 7.1.0; 7.2.0, TIBCO JasperReports Library Community Edition: versions up to and including 6.7.0, TIBCO JasperReports Library for ActiveMatrix BPM: versions up to and including 6.4.21, TIBCO JasperReports Server: versions up to and including 6.3.4; 6.4.0; 6.4.1; 6.4.2; 6.4.3; 7.1.0, TIBCO JasperReports Server Community Edition: versions up to and including 6.4.3; 7.1.0, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.3, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 7.1.0, TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 7.1.0. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-42856 | HIGH 8.8 | Apple | iOS | Dec 14, 2022 | Jan 4, 2023 | Unknown | A type confusion issue was addressed with improved state handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.1.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-42475 | CRITICAL 9.8 | Fortinet | FortiOS | Dec 13, 2022 | Jan 3, 2023 | Known | A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-44698 | MEDIUM 5.4 | Microsoft | Defender | Dec 13, 2022 | Jan 3, 2023 | Known | Windows SmartScreen Security Feature Bypass Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-27518 | CRITICAL 9.8 | Citrix | Application Delivery Controller (ADC) and Gateway | Dec 13, 2022 | Jan 3, 2023 | Unknown | Unauthenticated remote arbitrary code execution Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-26500 | HIGH 8.8 | Veeam | Backup & Replication | Dec 13, 2022 | Jan 3, 2023 | Known | Improper limitation of path names in Veeam Backup & Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-26501 | CRITICAL 9.8 | Veeam | Backup & Replication | Dec 13, 2022 | Jan 3, 2023 | Known | Veeam Backup & Replication 10.x and 11.x has Incorrect Access Control (issue 1 of 2). Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-4262 | HIGH 8.8 | Chromium V8 | Dec 5, 2022 | Dec 26, 2022 | Unknown | Type confusion in V8 in Google Chrome prior to 108.0.5359.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-35587 | CRITICAL 9.8 | Oracle | Fusion Middleware | Nov 28, 2022 | Dec 19, 2022 | Unknown | Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: OpenSSO Agent). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in takeover of Oracle Access Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-4135 | CRITICAL 9.6 | Chromium GPU | Nov 28, 2022 | Dec 19, 2022 | Unknown | Heap buffer overflow in GPU in Google Chrome prior to 107.0.5304.121 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) Required action: Apply updates per vendor instructions. | Open | |
| CVE-2022-41049 | MEDIUM 5.4 | Microsoft | Windows | Nov 14, 2022 | Dec 9, 2022 | Unknown | Windows Mark of the Web Security Feature Bypass Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-41091 | MEDIUM 5.4 | Microsoft | Windows | Nov 8, 2022 | Dec 9, 2022 | Known | Windows Mark of the Web Security Feature Bypass Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-41073 | HIGH 7.8 | Microsoft | Windows | Nov 8, 2022 | Dec 9, 2022 | Known | Windows Print Spooler Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-41125 | HIGH 7.8 | Microsoft | Windows | Nov 8, 2022 | Dec 9, 2022 | Unknown | Windows CNG Key Isolation Service Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-41128 | HIGH 8.8 | Microsoft | Windows | Nov 8, 2022 | Dec 9, 2022 | Unknown | Windows Scripting Languages Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-25337 | MEDIUM 4.4 | Samsung | Mobile Devices | Nov 8, 2022 | Nov 29, 2022 | Unknown | Improper access control in clipboard service in Samsung mobile devices prior to SMR Mar-2021 Release 1 allows untrusted applications to read or write certain local files. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-25369 | MEDIUM 6.2 | Samsung | Mobile Devices | Nov 8, 2022 | Nov 29, 2022 | Unknown | An improper access control vulnerability in sec_log file prior to SMR MAR-2021 Release 1 exposes sensitive kernel information to userspace. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-25370 | MEDIUM 6.1 | Samsung | Mobile Devices | Nov 8, 2022 | Nov 29, 2022 | Unknown | An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-3723 | HIGH 8.8 | Chromium V8 | Oct 28, 2022 | Nov 18, 2022 | Unknown | Type confusion in V8 in Google Chrome prior to 107.0.5304.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Required action: Apply updates per vendor instructions. | Open | |
| CVE-2022-42827 | HIGH 7.8 | Apple | iOS and iPadOS | Oct 25, 2022 | Nov 15, 2022 | Unknown | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, iOS 16.1 and iPadOS 16. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-3433 | HIGH 7.8 | Cisco | AnyConnect Secure | Oct 24, 2022 | Nov 14, 2022 | Known | A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-3153 | MEDIUM 6.5 | Cisco | AnyConnect Secure | Oct 24, 2022 | Nov 14, 2022 | Known | A vulnerability in the installer component of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated local attacker to copy user-supplied files to system level directories with system level privileges. The vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. An exploit could allow the attacker to copy malicious files to arbitrary locations with system level privileges. This could include DLL pre-loading, DLL hijacking, and other related attacks. To exploit this vulnerability, the attacker needs valid credentials on the Windows system. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-19323 | CRITICAL 9.8 | GIGABYTE | Multiple Products | Oct 24, 2022 | Nov 14, 2022 | Known | The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 exposes functionality to read and write Machine Specific Registers (MSRs). Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-19322 | HIGH 7.8 | GIGABYTE | Multiple Products | Oct 24, 2022 | Nov 14, 2022 | Known | The GPCIDrv and GDrv low-level drivers in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 expose functionality to read/write data from/to IO ports. This could be leveraged in a number of ways to ultimately run code with elevated privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-19321 | HIGH 7.8 | GIGABYTE | Multiple Products | Oct 24, 2022 | Nov 14, 2022 | Known | The GPCIDrv and GDrv low-level drivers in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 expose functionality to read and write arbitrary physical memory. This could be leveraged by a local attacker to elevate privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-19320 | HIGH 7.8 | GIGABYTE | Multiple Products | Oct 24, 2022 | Nov 14, 2022 | Known | The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 exposes ring0 memcpy-like functionality that could allow a local attacker to take complete control of the affected system. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-41352 | CRITICAL 9.8 | Synacor | Zimbra Collaboration Suite (ZCS) | Oct 20, 2022 | Nov 10, 2022 | Unknown | An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavis via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavis automatically prefers it over cpio. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-3493 | HIGH 8.8 | Linux | Kernel | Oct 20, 2022 | Nov 10, 2022 | Unknown | The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-40684 | CRITICAL 9.8 | Fortinet | Multiple Products | Oct 11, 2022 | Nov 1, 2022 | Known | An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-41033 | HIGH 7.8 | Microsoft | Windows COM+ Event System Service | Oct 11, 2022 | Nov 1, 2022 | Unknown | Windows COM+ Event System Service Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-41082 | HIGH 8.0 | Microsoft | Exchange Server | Sep 30, 2022 | Oct 21, 2022 | Known | Microsoft Exchange Server Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-41040 | HIGH 8.8 | Microsoft | Exchange Server | Sep 30, 2022 | Oct 21, 2022 | Known | Microsoft Exchange Server Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-36804 | HIGH 8.8 | Atlassian | Bitbucket Server and Data Center | Sep 30, 2022 | Oct 21, 2022 | Unknown | Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-3236 | CRITICAL 9.8 | Sophos | Firewall | Sep 23, 2022 | Oct 14, 2022 | Unknown | A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-35405 | CRITICAL 9.8 | Zoho | ManageEngine | Sep 22, 2022 | Oct 13, 2022 | Unknown | Zoho ManageEngine Password Manager Pro before 12101 and PAM360 before 5510 are vulnerable to unauthenticated remote code execution. (This also affects ManageEngine Access Manager Plus before 4303 with authentication.) Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-40139 | HIGH 7.2 | Trend Micro | Apex One and Apex One as a Service | Sep 15, 2022 | Oct 6, 2022 | Unknown | Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-6282 | HIGH 8.8 | Linux | Kernel | Sep 15, 2022 | Oct 6, 2022 | Unknown | The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-2597 | HIGH 8.4 | Code Aurora | ACDB Audio Driver | Sep 15, 2022 | Oct 6, 2022 | Unknown | Stack-based buffer overflow in the acdb_ioctl function in audio_acdb.c in the acdb audio driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via an application that leverages /dev/msm_acdb access and provides a large size value in an ioctl argument. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-2596 | HIGH 7.8 | Linux | Kernel | Sep 15, 2022 | Oct 6, 2022 | Unknown | Integer overflow in the fb_mmap function in drivers/video/fbmem.c in the Linux kernel before 3.8.9, as used in a certain Motorola build of Android 4.1.2 and other products, allows local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted /dev/graphics/fb0 mmap2 system calls, as demonstrated by the Motochopper pwn program. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-2094 | HIGH 8.4 | Linux | Kernel | Sep 15, 2022 | Oct 6, 2022 | Unknown | The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call. Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-2568 | HIGH 7.8 | Microsoft | Windows | Sep 15, 2022 | Oct 6, 2022 | Unknown | Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-37969 | HIGH 7.8 | Microsoft | Windows | Sep 14, 2022 | Oct 5, 2022 | Unknown | Windows Common Log File System Driver Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-32917 | HIGH 7.8 | Apple | iOS, iPadOS, and macOS | Sep 14, 2022 | Oct 5, 2022 | Unknown | The issue was addressed with improved bounds checks. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-3075 | CRITICAL 9.6 | Chromium Mojo | Sep 8, 2022 | Sep 29, 2022 | Unknown | Insufficient data validation in Mojo in Google Chrome prior to 105.0.5195.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2022-27593 | CRITICAL 10.0 | QNAP | Photo Station | Sep 8, 2022 | Sep 29, 2022 | Known | An externally controlled reference to a resource vulnerability has been reported to affect QNAP NAS running Photo Station. If exploited, This could allow an attacker to modify system files. We have already fixed the vulnerability in the following versions: QTS 5.0.1: Photo Station 6.1.2 and later QTS 5.0.0/4.5.x: Photo Station 6.0.22 and later QTS 4.3.6: Photo Station 5.7.18 and later QTS 4.3.3: Photo Station 5.4.15 and later QTS 4.2.6: Photo Station 5.2.14 and later Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-26258 | CRITICAL 9.8 | D-Link | DIR-820L | Sep 8, 2022 | Sep 29, 2022 | Unknown | D-Link DIR-820L 1.05B03 was discovered to contain remote command execution (RCE) vulnerability via HTTP POST to get set ccp. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2020-9934 | MEDIUM 5.5 | Apple | iOS, iPadOS, and macOS | Sep 8, 2022 | Sep 29, 2022 | Unknown | An issue existed in the handling of environment variables. This issue was addressed with improved validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6. A local user may be able to view sensitive user information. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-7445 | CRITICAL 9.8 | MikroTik | RouterOS | Sep 8, 2022 | Sep 29, 2022 | Unknown | A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 are vulnerable. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-6530 | CRITICAL 9.8 | D-Link | Multiple Routers | Sep 8, 2022 | Sep 29, 2022 | Known | OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin) in D-Link DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and previous versions, DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to execute arbitrary OS commands via the service parameter. Required action: The vendor D-Link published an advisory stating the fix under CVE-2018-20114 properly patches KEV entry CVE-2018-6530. If the device is still supported, apply updates per vendor instructions. If the affected device has since entered its end-of-life, it should be disconnected if still in use. | Open |
| CVE-2018-2628 | CRITICAL 9.8 | Oracle | WebLogic Server | Sep 8, 2022 | Sep 29, 2022 | Unknown | Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-13374 | MEDIUM 4.3 | Fortinet | FortiOS and FortiADC | Sep 8, 2022 | Sep 29, 2022 | Known | A Improper Access Control in Fortinet FortiOS 6.0.2, 5.6.7 and before, FortiADC 6.1.0, 6.0.0 to 6.0.1, 5.4.0 to 5.4.4 allows attacker to obtain the LDAP server login credentials configured in FortiGate via pointing a LDAP server connectivity test request to a rogue LDAP server instead of the configured one. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-5521 | HIGH 8.1 | NETGEAR | Multiple Devices | Sep 8, 2022 | Sep 29, 2022 | Unknown | An issue was discovered on NETGEAR R8500, R8300, R7000, R6400, R7300, R7100LG, R6300v2, WNDR3400v3, WNR3500Lv2, R6250, R6700, R6900, and R8000 devices. They are prone to password disclosure via simple crafted requests to the web management server. The bug is exploitable remotely if the remote management option is set, and can also be exploited given access to the router over LAN or WLAN. When trying to access the web panel, a user is asked to authenticate; if the authentication is canceled and password recovery is not enabled, the user is redirected to a page that exposes a password recovery token. If a user supplies the correct token to the page /passwordrecovered.cgi?id=TOKEN (and password recovery is not enabled), they will receive the admin password for the router. If password recovery is set the exploit will fail, as it will ask the user for the recovery questions that were previously set when enabling that feature. This is persistent (even after disabling the recovery option, the exploit will fail) because the router will ask for the security questions. Required action: Apply updates per vendor instructions. If the affected device has since entered end-of-life, it should be disconnected if still in use. | Open |
| CVE-2011-4723 | MEDIUM 5.7 | D-Link | DIR-300 Router | Sep 8, 2022 | Sep 29, 2022 | Unknown | The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information via unspecified vectors. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2011-1823 | HIGH 7.8 | Android | Android OS | Sep 8, 2022 | Sep 29, 2022 | Unknown | The vold volume manager daemon on Android 3.0 and 2.x before 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative index that bypasses a maximum-only signed integer check in the DirectVolume::handlePartitionAdded method, which triggers memory corruption, as demonstrated by Gingerbreak. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-26352 | CRITICAL 9.8 | dotCMS | dotCMS | Aug 25, 2022 | Sep 15, 2022 | Known | An issue was discovered in the ContentResource API in dotCMS 3.0 through 22.02. Attackers can craft a multipart form request to post a file whose filename is not initially sanitized. This allows directory traversal, in which the file is saved outside of the intended storage location. If anonymous content creation is enabled, this allows an unauthenticated attacker to upload an executable file, such as a .jsp file, that can lead to remote code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-24706 | CRITICAL 9.8 | Apache | CouchDB | Aug 25, 2022 | Sep 15, 2022 | Unknown | In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-24112 | CRITICAL 9.8 | Apache | APISIX | Aug 25, 2022 | Sep 15, 2022 | Unknown | An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-22963 | CRITICAL 9.8 | VMware Tanzu | Spring Cloud | Aug 25, 2022 | Sep 15, 2022 | Unknown | In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-2294 | HIGH 8.8 | WebRTC | WebRTC | Aug 25, 2022 | Sep 15, 2022 | Known | Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-39226 | CRITICAL 9.8 | Grafana Labs | Grafana | Aug 25, 2022 | Sep 15, 2022 | Unknown | Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot "public_mode" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot "public_mode" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-38406 | HIGH 7.8 | Delta Electronics | DOPSoft 2 | Aug 25, 2022 | Sep 15, 2022 | Unknown | Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in multiple out-of-bounds write instances. An attacker could leverage this vulnerability to execute code in the context of the current process. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2021-31010 | HIGH 7.5 | Apple | iOS, macOS, watchOS | Aug 25, 2022 | Sep 15, 2022 | Unknown | A deserialization issue was addressed through improved validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 12.5.5, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. A sandboxed process may be able to circumvent sandbox restrictions. Apple was aware of a report that this issue may have been actively exploited at the time of release.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-36193 | HIGH 7.5 | PEAR | Archive Tar | Aug 25, 2022 | Sep 15, 2022 | Unknown | Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-28949 | HIGH 7.8 | PEAR | Archive Tar | Aug 25, 2022 | Sep 15, 2022 | Unknown | Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-0028 | HIGH 8.6 | Palo Alto Networks | PAN-OS | Aug 22, 2022 | Sep 12, 2022 | Unknown | A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) firewall against an attacker-specified target. To be misused by an external attacker, the firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a source zone that has an external facing interface. This configuration is not typical for URL filtering and, if set, is likely unintended by the administrator. If exploited, this issue would not impact the confidentiality, integrity, or availability of our products. However, the resulting denial-of-service (DoS) attack may help obfuscate the identity of the attacker and implicate the firewall as the source of the attack. We have taken prompt action to address this issue in our PAN-OS software. All software updates for this issue are expected to be released no later than the week of August 15, 2022. This issue does not impact Panorama M-Series or Panorama virtual appliances. This issue has been resolved for all Cloud NGFW and Prisma Access customers and no additional action is required from them. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-22536 | CRITICAL 10.0 | SAP | Multiple Products | Aug 18, 2022 | Sep 8, 2022 | Unknown | SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-32894 | HIGH 7.8 | Apple | iOS and macOS | Aug 18, 2022 | Sep 8, 2022 | Unknown | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-32893 | HIGH 8.8 | Apple | iOS and macOS | Aug 18, 2022 | Sep 8, 2022 | Unknown | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1, Safari 15.6.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-2856 | MEDIUM 6.5 | Chromium Intents | Aug 18, 2022 | Sep 8, 2022 | Unknown | Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 104.0.5112.101 allowed a remote attacker to arbitrarily browse to a malicious website via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2022-26923 | HIGH 8.8 | Microsoft | Active Directory | Aug 18, 2022 | Sep 8, 2022 | Unknown | Active Directory Domain Services Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-21971 | HIGH 7.8 | Microsoft | Windows | Aug 18, 2022 | Sep 8, 2022 | Unknown | Windows Runtime Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-15944 | CRITICAL 9.8 | Palo Alto Networks | PAN-OS | Aug 18, 2022 | Sep 8, 2022 | Unknown | Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-27925 | HIGH 7.2 | Synacor | Zimbra Collaboration Suite (ZCS) | Aug 11, 2022 | Sep 1, 2022 | Known | Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. An authenticated user with administrator rights has the ability to upload arbitrary files to the system, leading to directory traversal. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-37042 | CRITICAL 9.8 | Synacor | Zimbra Collaboration Suite (ZCS) | Aug 11, 2022 | Sep 1, 2022 | Known | Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-34713 | HIGH 7.8 | Microsoft | Windows | Aug 9, 2022 | Aug 30, 2022 | Unknown | Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-30333 | HIGH 7.5 | RARLAB | UnRAR | Aug 9, 2022 | Aug 30, 2022 | Known | RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-27924 | HIGH 7.5 | Synacor | Zimbra Collaboration Suite (ZCS) | Aug 4, 2022 | Aug 25, 2022 | Known | Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 allows an unauthenticated attacker to inject arbitrary memcache commands into a targeted instance. These memcache commands becomes unescaped, causing an overwrite of arbitrary cached entries. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-26138 | CRITICAL 9.8 | Atlassian | Confluence | Jul 29, 2022 | Aug 19, 2022 | Unknown | The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group. This user account is created when installing versions 2.7.34, 2.7.35, and 3.0.2 of the app. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-22047 | HIGH 7.8 | Microsoft | Windows | Jul 12, 2022 | Aug 2, 2022 | Unknown | Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-26925 | HIGH 8.1 | Microsoft | Windows | Jul 1, 2022 | Jul 22, 2022 | Unknown | Windows LSA Spoofing Vulnerability Required action: Apply remediation actions outlined in CISA guidance [https://www.cisa.gov/guidance-applying-june-microsoft-patch]. | Open |
| CVE-2022-29499 | CRITICAL 9.8 | Mitel | MiVoice Connect | Jun 27, 2022 | Jul 18, 2022 | Known | The Service Appliance component in Mitel MiVoice Connect through 19.2 SP3 allows remote code execution because of incorrect data validation. The Service Appliances are SA 100, SA 400, and Virtual SA. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30533 | MEDIUM 6.5 | Chromium PopupBlocker | Jun 27, 2022 | Jul 18, 2022 | Unknown | Insufficient policy enforcement in PopupBlocker in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass navigation restrictions via a crafted iframe. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-4034 | HIGH 7.8 | Red Hat | Polkit | Jun 27, 2022 | Jul 18, 2022 | Unknown | A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30983 | HIGH 7.8 | Apple | iOS and iPadOS | Jun 27, 2022 | Jul 18, 2022 | Unknown | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 15.2 and iPadOS 15.2. An application may be able to execute arbitrary code with kernel privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-3837 | HIGH 7.8 | Apple | Multiple Products | Jun 27, 2022 | Jul 18, 2022 | Unknown | A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. An application may be able to execute arbitrary code with kernel privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-9907 | HIGH 7.8 | Apple | Multiple Products | Jun 27, 2022 | Jul 18, 2022 | Unknown | A memory corruption issue was addressed by removing the vulnerable code. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8. An application may be able to execute arbitrary code with kernel privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-8605 | HIGH 7.8 | Apple | Multiple Products | Jun 27, 2022 | Jul 18, 2022 | Unknown | A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1. A malicious application may be able to execute arbitrary code with system privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-4344 | HIGH 7.8 | Apple | Multiple Products | Jun 27, 2022 | Jul 18, 2022 | Unknown | A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-30190 | HIGH 7.8 | Microsoft | Windows | Jun 14, 2022 | Jul 5, 2022 | Known | A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-38163 | CRITICAL 9.9 | SAP | NetWeaver | Jun 9, 2022 | Jun 30, 2022 | Unknown | SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running operating system commands with the privilege of the Java Server process. These commands can be used to read or modify any information on the server or shut the server down making it unavailable. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-2386 | CRITICAL 9.8 | SAP | NetWeaver | Jun 9, 2022 | Jun 30, 2022 | Unknown | SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka SAP Security Note 2101079. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-2388 | MEDIUM 5.3 | SAP | NetWeaver | Jun 9, 2022 | Jun 30, 2022 | Unknown | The Universal Worklist Configuration in SAP NetWeaver AS JAVA 7.4 allows remote attackers to obtain sensitive user information via a crafted HTTP request, aka SAP Security Note 2256846. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-7195 | CRITICAL 9.8 | QNAP | Photo Station | Jun 8, 2022 | Jun 22, 2022 | Known | This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-7194 | CRITICAL 9.8 | QNAP | Photo Station | Jun 8, 2022 | Jun 22, 2022 | Known | This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-7193 | CRITICAL 9.8 | QNAP | QTS | Jun 8, 2022 | Jun 22, 2022 | Known | This improper input validation vulnerability allows remote attackers to inject arbitrary code to the system. To fix the vulnerability, QNAP recommend updating QTS to their latest versions. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-7192 | CRITICAL 9.8 | QNAP | Photo Station | Jun 8, 2022 | Jun 22, 2022 | Known | This improper access control vulnerability allows remote attackers to gain unauthorized access to the system. To fix these vulnerabilities, QNAP recommend updating Photo Station to their latest versions. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-5825 | MEDIUM 6.5 | Chromium V8 | Jun 8, 2022 | Jun 22, 2022 | Unknown | Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2019-15271 | HIGH 8.8 | Cisco | RV Series Routers | Jun 8, 2022 | Jun 22, 2022 | Unknown | A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-6065 | HIGH 8.8 | Chromium V8 | Jun 8, 2022 | Jun 22, 2022 | Unknown | Integer overflow in computing the required allocation size when instantiating a new javascript object in V8 in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2018-4990 | HIGH 8.8 | Adobe | Acrobat and Reader | Jun 8, 2022 | Jun 22, 2022 | Unknown | Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Double Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-17480 | HIGH 8.8 | Chromium V8 | Jun 8, 2022 | Jun 22, 2022 | Unknown | Execution of user supplied Javascript during array deserialization leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2018-17463 | HIGH 8.8 | Chromium V8 | Jun 8, 2022 | Jun 22, 2022 | Unknown | Incorrect side effect annotation in V8 in Google Chrome prior to 70.0.3538.64 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2017-6862 | CRITICAL 9.8 | NETGEAR | Multiple Devices | Jun 8, 2022 | Jun 22, 2022 | Unknown | NETGEAR WNR2000v3 devices before 1.1.2.14, WNR2000v4 devices before 1.0.0.66, and WNR2000v5 devices before 1.0.0.42 allow authentication bypass and remote code execution via a buffer overflow that uses a parameter in the administration webapp. The NETGEAR ID is PSV-2016-0261. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-5070 | HIGH 8.8 | Chromium V8 | Jun 8, 2022 | Jun 22, 2022 | Unknown | Type confusion in V8 in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2017-5030 | HIGH 8.8 | Chromium V8 | Jun 8, 2022 | Jun 22, 2022 | Unknown | Incorrect handling of complex species in V8 in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac and 57.0.2987.108 for Android allowed a remote attacker to execute arbitrary code via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2016-5198 | HIGH 8.8 | Chromium V8 | Jun 8, 2022 | Jun 22, 2022 | Unknown | V8 in Google Chrome prior to 54.0.2840.90 for Linux, and 54.0.2840.85 for Android, and 54.0.2840.87 for Windows and Mac included incorrect optimisation assumptions, which allowed a remote attacker to perform arbitrary read/write operations, leading to code execution, via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2016-1646 | HIGH 8.8 | Chromium V8 | Jun 8, 2022 | Jun 22, 2022 | Unknown | The Array.prototype.concat implementation in builtins.cc in Google V8, as used in Google Chrome before 49.0.2623.108, does not properly consider element data types, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted JavaScript code. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2013-1331 | HIGH 7.8 | Microsoft | Office | Jun 8, 2022 | Jun 22, 2022 | Unknown | Buffer overflow in Microsoft Office 2003 SP3 and Office 2011 for Mac allows remote attackers to execute arbitrary code via crafted PNG data in an Office document, leading to improper memory allocation, aka "Office Buffer Overflow Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2012-5054 | HIGH 8.8 | Adobe | Flash Player | Jun 8, 2022 | Jun 22, 2022 | Unknown | Integer overflow in the copyRawDataTo method in the Matrix3D class in Adobe Flash Player before 11.4.402.265 allows remote attackers to execute arbitrary code via malformed arguments. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2012-4969 | HIGH 8.1 | Microsoft | Internet Explorer | Jun 8, 2022 | Jun 22, 2022 | Unknown | Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in September 2012. Required action: Apply updates per vendor instructions. | Open |
| CVE-2012-1889 | HIGH 8.8 | Microsoft | XML Core Services | Jun 8, 2022 | Jun 22, 2022 | Unknown | Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site. Required action: Apply updates per vendor instructions. | Open |
| CVE-2012-0767 | MEDIUM 6.1 | Adobe | Flash Player | Jun 8, 2022 | Jun 22, 2022 | Unknown | Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)," as exploited in the wild in February 2012. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2012-0754 | HIGH 8.1 | Adobe | Flash Player | Jun 8, 2022 | Jun 22, 2022 | Unknown | Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2012-0151 | HIGH 7.8 | Microsoft | Windows | Jun 8, 2022 | Jun 22, 2022 | Unknown | The Authenticode Signature Verification function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute arbitrary code via a modified file with additional content, aka "WinVerifyTrust Signature Validation Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2011-2462 | CRITICAL 9.8 | Adobe | Reader and Acrobat | Jun 8, 2022 | Jun 22, 2022 | Unknown | Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011. Required action: Apply updates per vendor instructions. | Open |
| CVE-2011-0609 | HIGH 7.8 | Adobe | Flash Player | Jun 8, 2022 | Jun 22, 2022 | Unknown | Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2010-2883 | HIGH 7.3 | Adobe | Acrobat and Reader | Jun 8, 2022 | Jun 22, 2022 | Unknown | Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information. Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-2572 | HIGH 7.8 | Microsoft | PowerPoint | Jun 8, 2022 | Jun 22, 2022 | Unknown | Buffer overflow in Microsoft PowerPoint 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint 95 document, aka "PowerPoint Parsing Buffer Overflow Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-1297 | HIGH 7.8 | Adobe | Flash Player | Jun 8, 2022 | Jun 22, 2022 | Unknown | Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2009-4324 | HIGH 7.8 | Adobe | Acrobat and Reader | Jun 8, 2022 | Jun 22, 2022 | Unknown | Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009. Required action: Apply updates per vendor instructions. | Open |
| CVE-2009-3953 | HIGH 8.8 | Adobe | Acrobat and Reader | Jun 8, 2022 | Jun 22, 2022 | Unknown | The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF document, related to a CLODProgressiveMeshDeclaration "array boundary issue," a different vulnerability than CVE-2009-2994. Required action: Apply updates per vendor instructions. | Open |
| CVE-2009-1862 | HIGH 7.8 | Adobe | Acrobat and Reader, Flash Player | Jun 8, 2022 | Jun 22, 2022 | Unknown | Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009. Required action: For Adobe Acrobat and Reader, apply updates per vendor instructions. For Adobe Flash Player, the impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2009-0563 | HIGH 7.8 | Microsoft | Office | Jun 8, 2022 | Jun 22, 2022 | Unknown | Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; Microsoft Office Word Viewer 2003 SP3; Microsoft Office Word Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a Word document with a crafted tag containing an invalid length field, aka "Word Buffer Overflow Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2009-0557 | HIGH 7.8 | Microsoft | Office | Jun 8, 2022 | Jun 22, 2022 | Unknown | Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel Viewer 2003 SP3; Microsoft Office Excel Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Object Record Corruption Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2008-0655 | CRITICAL 9.8 | Adobe | Acrobat and Reader | Jun 8, 2022 | Jun 22, 2022 | Unknown | Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors. Required action: Apply updates per vendor instructions. | Open |
| CVE-2007-5659 | HIGH 7.8 | Adobe | Acrobat and Reader | Jun 8, 2022 | Jun 22, 2022 | Unknown | Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be subsumed by CVE-2008-0655. Required action: Apply updates per vendor instructions. | Open |
| CVE-2006-2492 | HIGH 8.8 | Microsoft | Word | Jun 8, 2022 | Jun 22, 2022 | Unknown | Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object pointer, as originally reported by ISC on 20060519 for a zero-day attack. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-26134 | CRITICAL 9.8 | Atlassian | Confluence Server/Data Center | Jun 2, 2022 | Jun 6, 2022 | Known | In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1. Required action: Immediately block all internet traffic to and from affected products AND apply the update per vendor instructions [https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html] OR remove the affected products by the due date on the right. Note: Once the update is successfully deployed, agencies can reassess the internet blocking rules. | Open |
| CVE-2019-3010 | HIGH 8.8 | Oracle | Solaris | May 25, 2022 | Jun 15, 2022 | Unknown | Vulnerability in the Oracle Solaris product of Oracle Systems (component: XScreenSaver). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-3393 | HIGH 7.8 | Microsoft | Windows | May 25, 2022 | Jun 15, 2022 | Unknown | Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Graphics Component RCE Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-7256 | HIGH 8.8 | Microsoft | Windows | May 25, 2022 | Jun 15, 2022 | Unknown | atmfd.dll in the Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka "Open Type Font Remote Code Execution Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-1010 | HIGH 8.8 | Adobe | Flash Player and AIR | May 25, 2022 | Jun 15, 2022 | Unknown | Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0963 and CVE-2016-0993. Required action: The impacted products are end-of-life and should be disconnected if still in use. | Open |
| CVE-2016-0984 | HIGH 8.8 | Adobe | Flash Player and AIR | May 25, 2022 | Jun 15, 2022 | Unknown | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0983. Required action: The impacted products are end-of-life and should be disconnected if still in use. | Open |
| CVE-2016-0034 | HIGH 8.8 | Microsoft | Silverlight | May 25, 2022 | Jun 15, 2022 | Known | Microsoft Silverlight 5 before 5.1.41212.0 mishandles negative offsets during decoding, which allows remote attackers to execute arbitrary code or cause a denial of service (object-header corruption) via a crafted web site, aka "Silverlight Runtime Remote Code Execution Vulnerability." Required action: The impacted products are end-of-life and should be disconnected if still in use. | Open |
| CVE-2015-0310 | HIGH 7.8 | Adobe | Flash Player | May 25, 2022 | Jun 15, 2022 | Unknown | Adobe Flash Player before 13.0.0.262 and 14.x through 16.x before 16.0.0.287 on Windows and OS X and before 11.2.202.438 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism on Windows, and have an unspecified impact on other platforms, via unknown vectors, as exploited in the wild in January 2015. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2015-0016 | HIGH 7.8 | Microsoft | Windows | May 25, 2022 | Jun 15, 2022 | Unknown | Directory traversal vulnerability in the TS WebProxy (aka TSWbPrxy) component in Microsoft Windows Vista SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via a crafted pathname in an executable file, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Directory Traversal Elevation of Privilege Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-0071 | MEDIUM 6.5 | Microsoft | Internet Explorer | May 25, 2022 | Jun 15, 2022 | Unknown | Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-2360 | HIGH 8.8 | Microsoft | Win32k | May 25, 2022 | Jun 15, 2022 | Unknown | win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-2425 | HIGH 8.8 | Microsoft | Internet Explorer | May 25, 2022 | Jun 15, 2022 | Unknown | Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2383 and CVE-2015-2384. Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-1769 | MEDIUM 6.6 | Microsoft | Windows | May 25, 2022 | Jun 15, 2022 | Unknown | Mount Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles symlinks, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Mount Manager Elevation of Privilege Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-4495 | HIGH 8.8 | Mozilla | Firefox | May 25, 2022 | Jun 15, 2022 | Unknown | The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015. Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-8651 | HIGH 8.8 | Adobe | Flash Player | May 25, 2022 | Jun 15, 2022 | Unknown | Integer overflow in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2015-6175 | HIGH 7.8 | Microsoft | Windows | May 25, 2022 | Jun 15, 2022 | Unknown | The kernel in Microsoft Windows 10 Gold allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Elevation of Privilege Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-1671 | HIGH 7.8 | Microsoft | Windows | May 25, 2022 | Jun 15, 2022 | Unknown | The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2; Office 2007 SP3 and 2010 SP2; Live Meeting 2007 Console; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; Lync Basic 2013 SP1; Silverlight 5 before 5.1.40416.00; and Silverlight 5 Developer Runtime before 5.1.40416.00, allows remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-4148 | HIGH 8.8 | Microsoft | Windows | May 25, 2022 | Jun 15, 2022 | Unknown | win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted TrueType font, as exploited in the wild in October 2014, aka "TrueType Font Parsing Remote Code Execution Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-8439 | HIGH 8.8 | Adobe | Flash Player | May 25, 2022 | Jun 15, 2022 | Unknown | Adobe Flash Player before 13.0.0.258 and 14.x and 15.x before 15.0.0.239 on Windows and OS X and before 11.2.202.424 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK & Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference) via unspecified vectors. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2014-4123 | HIGH 8.8 | Microsoft | Internet Explorer | May 25, 2022 | Jun 15, 2022 | Unknown | Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," as exploited in the wild in October 2014, a different vulnerability than CVE-2014-4124. Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-0546 | CRITICAL 9.8 | Adobe | Reader and Acrobat | May 25, 2022 | Jun 15, 2022 | Unknown | Adobe Reader and Acrobat 10.x before 10.1.11 and 11.x before 11.0.08 on Windows allow attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context, via unspecified vectors. Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-2817 | HIGH 8.8 | Microsoft | Internet Explorer | May 25, 2022 | Jun 15, 2022 | Unknown | Microsoft Internet Explorer 6 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-4077 | HIGH 7.8 | Microsoft | Input Method Editor (IME) Japanese | May 25, 2022 | Jun 15, 2022 | Unknown | Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Office 2007 SP3, when IMJPDCT.EXE (aka IME for Japanese) is installed, allow remote attackers to bypass a sandbox protection mechanism via a crafted PDF document, aka "Microsoft IME (Japanese) Elevation of Privilege Vulnerability," as exploited in the wild in 2014. Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-3153 | HIGH 7.8 | Linux | Kernel | May 25, 2022 | Jun 15, 2022 | Unknown | The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-7331 | MEDIUM 6.5 | Microsoft | Internet Explorer | May 25, 2022 | Jun 15, 2022 | Unknown | The Microsoft.XMLDOM ActiveX control in Microsoft Windows 8.1 and earlier allows remote attackers to determine the existence of local pathnames, UNC share pathnames, intranet hostnames, and intranet IP addresses by examining error codes, as demonstrated by a res:// URL, and exploited in the wild in February 2014. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-3993 | MEDIUM 6.5 | IBM | InfoSphere BigInsights | May 25, 2022 | Jun 15, 2022 | Known | IBM InfoSphere BigInsights before 2.1.0.3 allows remote authenticated users to bypass intended file and directory restrictions, or access untrusted data or code, via crafted parameters in unspecified API calls. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2013-3896 | MEDIUM 5.5 | Microsoft | Silverlight | May 25, 2022 | Jun 15, 2022 | Unknown | Microsoft Silverlight 5 before 5.1.20913.0 does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application, aka "Silverlight Vulnerability." Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2013-2423 | LOW 3.7 | Oracle | Java Runtime Environment (JRE) | May 25, 2022 | Jun 15, 2022 | Unknown | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown vectors related to HotSpot. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from the original researcher that this vulnerability allows remote attackers to bypass permission checks by the MethodHandles method and modify arbitrary public final fields using reflection and type confusion, as demonstrated using integer and double fields to disable the security manager. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-0431 | MEDIUM 5.3 | Oracle | Java Runtime Environment (JRE) | May 25, 2022 | Jun 15, 2022 | Known | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka "Issue 52," a different vulnerability than CVE-2013-1490. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-0422 | CRITICAL 9.8 | Oracle | Java Runtime Environment (JRE) | May 25, 2022 | Jun 15, 2022 | Unknown | Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-0074 | HIGH 7.8 | Microsoft | Silverlight | May 25, 2022 | Jun 15, 2022 | Known | Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability." Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2012-1710 | CRITICAL 9.8 | Oracle | Fusion Middleware | May 25, 2022 | Jun 15, 2022 | Known | Unspecified vulnerability in the Oracle WebCenter Forms Recognition component in Oracle Fusion Middleware 10.1.3.5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Designer, a different vulnerability than CVE-2012-1709. Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-1428 | HIGH 7.5 | Red Hat | JBoss | May 25, 2022 | Jun 15, 2022 | Known | The Web Console (aka web-console) in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to obtain sensitive information via an unspecified request that uses a different method. Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-0840 | CRITICAL 9.8 | Oracle | Java Runtime Environment (JRE) | May 25, 2022 | Jun 15, 2022 | Unknown | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-0738 | MEDIUM 5.3 | Red Hat | JBoss | May 25, 2022 | Jun 15, 2022 | Known | The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-8611 | HIGH 7.8 | Microsoft | Windows | May 24, 2022 | Jun 14, 2022 | Unknown | An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-19953 | MEDIUM 6.1 | QNAP | Network Attached Storage (NAS) | May 24, 2022 | Jun 14, 2022 | Known | If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed the issue in the following QTS versions. QTS 4.4.2.1231 on build 20200302; QTS 4.4.1.1201 on build 20200130; QTS 4.3.6.1218 on build 20200214; QTS 4.3.4.1190 on build 20200107; QTS 4.3.3.1161 on build 20200109; QTS 4.2.6 on build 20200109. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-19949 | CRITICAL 9.8 | QNAP | Network Attached Storage (NAS) | May 24, 2022 | Jun 14, 2022 | Known | If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands. QNAP has already fixed the issue in the following QTS versions. QTS 4.4.2.1231 on build 20200302; QTS 4.4.1.1201 on build 20200130; QTS 4.3.6.1218 on build 20200214; QTS 4.3.4.1190 on build 20200107; QTS 4.3.3.1161 on build 20200109; QTS 4.2.6 on build 20200109. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-19943 | HIGH 8.0 | QNAP | Network Attached Storage (NAS) | May 24, 2022 | Jun 14, 2022 | Known | If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed these issues in the following QTS versions. QTS 4.4.2.1270 build 20200410 and later QTS 4.4.1.1261 build 20200330 and later QTS 4.3.6.1263 build 20200330 and later QTS 4.3.4.1282 build 20200408 and later QTS 4.3.3.1252 build 20200409 and later QTS 4.2.6 build 20200421 and later Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0147 | HIGH 7.5 | Microsoft | SMBv1 server | May 24, 2022 | Jun 14, 2022 | Known | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted packets, aka "Windows SMB Information Disclosure Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0022 | MEDIUM 6.5 | Microsoft | XML Core Services | May 24, 2022 | Jun 14, 2022 | Unknown | Microsoft XML Core Services (MSXML) in Windows 10 Gold, 1511, and 1607; Windows 7 SP1; Windows 8.1; Windows RT 8.1; Windows Server 2008 SP2 and R2 SP1; Windows Server 2012 Gold and R2; Windows Server 2016; and Windows Vista SP2 improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site, aka "Microsoft XML Information Disclosure Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0005 | HIGH 7.8 | Microsoft | Windows | May 24, 2022 | Jun 14, 2022 | Unknown | The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka "Windows GDI Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0001, CVE-2017-0025, and CVE-2017-0047. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0149 | HIGH 8.8 | Microsoft | Internet Explorer | May 24, 2022 | Jun 14, 2022 | Unknown | Microsoft Internet Explorer 9 through 11 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0018 and CVE-2017-0037. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0210 | HIGH 8.8 | Microsoft | Internet Explorer | May 24, 2022 | Jun 14, 2022 | Unknown | An elevation of privilege vulnerability exists when Internet Explorer does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain, aka "Internet Explorer Elevation of Privilege Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-8291 | HIGH 7.8 | Artifex | Ghostscript | May 24, 2022 | Jun 14, 2022 | Unknown | Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-8543 | CRITICAL 9.8 | Microsoft | Windows | May 24, 2022 | Jun 14, 2022 | Unknown | Microsoft Windows XP SP3, Windows XP x64 XP2, Windows Server 2003 SP2, Windows Vista, Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to take control of the affected system when Windows Search fails to handle objects in memory, aka "Windows Search Remote Code Execution Vulnerability". Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-18362 | CRITICAL 9.8 | Kaseya | Virtual System/Server Administrator (VSA) | May 24, 2022 | Jun 14, 2022 | Known | ConnectWise ManagedITSync integration through 2017 for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database. In February 2019, attackers have actively exploited this in the wild to download and execute ransomware payloads on all endpoints managed by the VSA server. If the ManagedIT.asmx page is available via the Kaseya VSA web interface, anyone with access to the page is able to run arbitrary SQL queries, both read and write, without authentication. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2016-0162 | MEDIUM 4.3 | Microsoft | Internet Explorer | May 24, 2022 | Jun 14, 2022 | Unknown | Microsoft Internet Explorer 9 through 11 allows remote attackers to determine the existence of files via crafted JavaScript code, aka "Internet Explorer Information Disclosure Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-3351 | MEDIUM 6.5 | Microsoft | Internet Explorer and Edge | May 24, 2022 | Jun 14, 2022 | Known | Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to obtain sensitive information via a crafted web site, aka "Microsoft Browser Information Disclosure Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-4655 | MEDIUM 5.5 | Apple | iOS | May 24, 2022 | Jun 14, 2022 | Unknown | The kernel in Apple iOS before 9.3.5 allows attackers to obtain sensitive information from memory via a crafted app. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-4656 | HIGH 7.8 | Apple | iOS | May 24, 2022 | Jun 14, 2022 | Unknown | The kernel in Apple iOS before 9.3.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-4657 | HIGH 8.8 | Apple | iOS | May 24, 2022 | Jun 14, 2022 | Unknown | WebKit in Apple iOS before 9.3.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-6366 | HIGH 8.8 | Cisco | Adaptive Security Appliance (ASA) | May 24, 2022 | Jun 14, 2022 | Unknown | Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-6367 | HIGH 7.8 | Cisco | Adaptive Security Appliance (ASA) | May 24, 2022 | Jun 14, 2022 | Unknown | Cisco Adaptive Security Appliance (ASA) Software before 8.4(1) on ASA 5500, ASA 5500-X, PIX, and FWSM devices allows local users to gain privileges via invalid CLI commands, aka Bug ID CSCtu74257 or EPICBANANA. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-3298 | MEDIUM 6.5 | Microsoft | Internet Explorer | May 24, 2022 | Jun 14, 2022 | Unknown | Microsoft Internet Explorer 9 through 11 and the Internet Messaging API in Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote attackers to determine the existence of arbitrary files via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-20821 | MEDIUM 6.5 | Cisco | IOS XR | May 23, 2022 | Jun 13, 2022 | Unknown | A vulnerability in the health check RPM of Cisco IOS XR Software could allow an unauthenticated, remote attacker to access the Redis instance that is running within the NOSi container. This vulnerability exists because the health check RPM opens TCP port 6379 by default upon activation. An attacker could exploit this vulnerability by connecting to the Redis instance on the open port. A successful exploit could allow the attacker to write to the Redis in-memory database, write arbitrary files to the container filesystem, and retrieve information about the Redis database. Given the configuration of the sandboxed container that the Redis instance runs in, a remote attacker would be unable to execute remote code or abuse the integrity of the Cisco IOS XR Software host system. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-1048 | HIGH 7.8 | Android | Kernel | May 23, 2022 | Jun 13, 2022 | Unknown | In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007References: Upstream kernel Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-0920 | MEDIUM 6.4 | Android | Kernel | May 23, 2022 | Jun 13, 2022 | Unknown | In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30883 | HIGH 7.8 | Apple | Multiple Products | May 23, 2022 | Jun 13, 2022 | Unknown | A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 15.0.2 and iPadOS 15.0.2, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, macOS Big Sur 11.6.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-1027 | HIGH 7.8 | Microsoft | Windows | May 23, 2022 | Jun 13, 2022 | Unknown | An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0913, CVE-2020-1000, CVE-2020-1003. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-0638 | HIGH 7.8 | Microsoft | Update Notification Manager | May 23, 2022 | Jun 13, 2022 | Known | An elevation of privilege vulnerability exists in the way the Update Notification Manager handles files.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Update Notification Manager Elevation of Privilege Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-7286 | HIGH 7.8 | Apple | Multiple Products | May 23, 2022 | Jun 13, 2022 | Unknown | A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.4, macOS Mojave 10.14.3 Supplemental Update. An application may be able to gain elevated privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-7287 | HIGH 7.8 | Apple | iOS | May 23, 2022 | Jun 13, 2022 | Unknown | A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.4. An application may be able to execute arbitrary code with kernel privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-0676 | MEDIUM 6.5 | Microsoft | Internet Explorer | May 23, 2022 | Jun 13, 2022 | Unknown | An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory.An attacker who successfully exploited this vulnerability could test for the presence of files on disk, aka 'Internet Explorer Information Disclosure Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-5786 | MEDIUM 6.5 | Chrome Blink | May 23, 2022 | Jun 13, 2022 | Unknown | Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2019-0703 | MEDIUM 6.5 | Microsoft | Windows | May 23, 2022 | Jun 13, 2022 | Unknown | An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, aka 'Windows SMB Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0704, CVE-2019-0821. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-0880 | HIGH 7.8 | Microsoft | Windows | May 23, 2022 | Jun 13, 2022 | Unknown | A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls, aka 'Microsoft splwow64 Elevation of Privilege Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-13720 | HIGH 8.8 | Chrome WebAudio | May 23, 2022 | Jun 13, 2022 | Unknown | Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2019-11707 | HIGH 8.8 | Mozilla | Firefox and Thunderbird | May 23, 2022 | Jun 13, 2022 | Unknown | A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 60.7.1, Firefox < 67.0.3, and Thunderbird < 60.7.2. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-11708 | CRITICAL 10.0 | Mozilla | Firefox and Thunderbird | May 23, 2022 | Jun 13, 2022 | Unknown | Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-8720 | HIGH 8.8 | WebKitGTK | WebKitGTK | May 23, 2022 | Jun 13, 2022 | Unknown | A vulnerability was found in WebKit. The flaw is triggered when processing maliciously crafted web content that may lead to arbitrary code execution. Improved memory handling addresses the multiple memory corruption issues. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-18426 | HIGH 8.2 | Meta Platforms | May 23, 2022 | Jun 13, 2022 | Unknown | A vulnerability in WhatsApp Desktop versions prior to 0.3.9309 when paired with WhatsApp for iPhone versions prior to 2.20.10 allows cross-site scripting and local file reading. Exploiting the vulnerability requires the victim to click a link preview from a specially crafted text message. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2019-1385 | HIGH 7.8 | Microsoft | Windows | May 23, 2022 | Jun 13, 2022 | Known | An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges., aka 'Windows AppX Deployment Extensions Elevation of Privilege Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1130 | HIGH 7.8 | Microsoft | Windows | May 23, 2022 | Jun 13, 2022 | Known | An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1129. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-5002 | HIGH 7.8 | Adobe | Flash Player | May 23, 2022 | Jun 13, 2022 | Unknown | Adobe Flash Player versions 29.0.0.171 and earlier have a Stack-based buffer overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2018-8589 | HIGH 7.8 | Microsoft | Win32k | May 23, 2022 | Jun 13, 2022 | Unknown | An elevation of privilege vulnerability exists when Windows improperly handles calls to Win32k.sys, aka "Windows Win32k Elevation of Privilege Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-30525 | CRITICAL 9.8 | Zyxel | Multiple Firewalls | May 16, 2022 | Jun 6, 2022 | Unknown | A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-22947 | CRITICAL 10.0 | VMware | Spring Cloud Gateway | May 16, 2022 | Jun 6, 2022 | Unknown | In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-1388 | CRITICAL 9.8 | F5 | BIG-IP | May 10, 2022 | May 31, 2022 | Known | On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-1789 | HIGH 8.8 | Apple | Multiple Products | May 4, 2022 | May 25, 2022 | Unknown | A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-8506 | HIGH 8.8 | Apple | Multiple Products | May 4, 2022 | May 25, 2022 | Unknown | A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-4113 | HIGH 7.8 | Microsoft | Win32k | May 4, 2022 | May 25, 2022 | Unknown | win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka "Win32k.sys Elevation of Privilege Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-0322 | HIGH 8.8 | Microsoft | Internet Explorer | May 4, 2022 | May 25, 2022 | Unknown | Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribute of a script element, as exploited in the wild in January and February 2014. Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-0160 | HIGH 7.5 | OpenSSL | OpenSSL | May 4, 2022 | May 25, 2022 | Unknown | The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-29464 | CRITICAL 9.8 | WSO2 | Multiple Products | Apr 25, 2022 | May 16, 2022 | Known | Certain WSO2 products allow unrestricted file upload with resultant remote code execution. The attacker must use a /fileupload endpoint with a Content-Disposition directory traversal sequence to reach a directory under the web root, such as a ../../../../repository/deployment/server/webapps directory. This affects WSO2 API Manager 2.2.0 up to 4.0.0, WSO2 Identity Server 5.2.0 up to 5.11.0, WSO2 Identity Server Analytics 5.4.0, 5.4.1, 5.5.0 and 5.6.0, WSO2 Identity Server as Key Manager 5.3.0 up to 5.11.0, WSO2 Enterprise Integrator 6.2.0 up to 6.6.0, WSO2 Open Banking AM 1.4.0 up to 2.0.0 and WSO2 Open Banking KM 1.4.0, up to 2.0.0. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-26904 | HIGH 7.0 | Microsoft | Windows | Apr 25, 2022 | May 16, 2022 | Unknown | Windows User Profile Service Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-21919 | HIGH 7.0 | Microsoft | Windows | Apr 25, 2022 | May 16, 2022 | Unknown | Windows User Profile Service Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-0847 | HIGH 7.8 | Linux | Kernel | Apr 25, 2022 | May 16, 2022 | Unknown | A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-41357 | HIGH 7.8 | Microsoft | Win32k | Apr 25, 2022 | May 16, 2022 | Unknown | Win32k Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-40450 | HIGH 7.8 | Microsoft | Win32k | Apr 25, 2022 | May 16, 2022 | Unknown | Win32k Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1003029 | CRITICAL 9.9 | Jenkins | Script Security Plugin | Apr 25, 2022 | May 16, 2022 | Unknown | A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to execute arbitrary code on the Jenkins master JVM. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-6882 | MEDIUM 6.1 | Synacor | Zimbra Collaboration Suite (ZCS) | Apr 19, 2022 | May 10, 2022 | Known | Cross-site scripting (XSS) vulnerability in the ZmMailMsgView.getAttachmentLinkHtml function in Zimbra Collaboration Suite (ZCS) before 8.7 Patch 1 and 8.8.x before 8.8.7 might allow remote attackers to inject arbitrary web script or HTML via a Content-Location header in an email attachment. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-3568 | CRITICAL 9.8 | Meta Platforms | Apr 19, 2022 | May 10, 2022 | Unknown | A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2022-22718 | HIGH 7.8 | Microsoft | Windows | Apr 19, 2022 | May 10, 2022 | Unknown | Windows Print Spooler Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-22960 | HIGH 7.8 | VMware | Multiple Products | Apr 15, 2022 | May 6, 2022 | Unknown | VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. A malicious actor with local access can escalate privileges to 'root'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-1364 | HIGH 8.8 | Chromium V8 | Apr 15, 2022 | May 6, 2022 | Unknown | Type confusion in V8 Turbofan in Google Chrome prior to 100.0.4896.127 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2019-3929 | CRITICAL 9.8 | Crestron | Multiple Products | Apr 15, 2022 | May 6, 2022 | Unknown | The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-16057 | CRITICAL 9.8 | D-Link | DNS-320 Storage Device | Apr 15, 2022 | May 6, 2022 | Known | The login_mgr.cgi script in D-Link DNS-320 through 2.05.B10 is vulnerable to remote command injection. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2018-7841 | CRITICAL 9.8 | Schneider Electric | U.motion Builder | Apr 15, 2022 | May 6, 2022 | Unknown | A SQL Injection (CWE-89) vulnerability exists in U.motion Builder software version 1.3.4 which could cause unwanted code execution when an improper set of characters is entered. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2016-4523 | HIGH 7.5 | Trihedral | VTScada (formerly VTS) | Apr 15, 2022 | May 6, 2022 | Unknown | The WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via unspecified vectors. Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-0780 | CRITICAL 9.8 | InduSoft | Web Studio | Apr 15, 2022 | May 6, 2022 | Unknown | Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 7.1 before SP2 Patch 4 allows remote attackers to read administrative passwords in APP files, and consequently execute arbitrary code, via unspecified web requests. Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-5330 | CRITICAL 9.8 | Ubiquiti | AirOS | Apr 15, 2022 | May 6, 2022 | Unknown | On certain Ubiquiti devices, Command Injection exists via a GET request to stainfo.cgi (aka Show AP info) because the ifname variable is not sanitized, as demonstrated by shell metacharacters. The fixed version is v4.0.1 for 802.11 ISP products, v5.3.5 for AirMax ISP products, and v5.4.5 for AirSync firmware. For example, Nanostation5 (Air OS) is affected. Required action: Apply updates per vendor instructions. | Open |
| CVE-2007-3010 | CRITICAL 9.8 | Alcatel | OmniPCX Enterprise | Apr 15, 2022 | May 6, 2022 | Unknown | masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server R7.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the user parameter during a ping action. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-22954 | CRITICAL 9.8 | VMware | Workspace ONE Access and Identity Manager | Apr 14, 2022 | May 5, 2022 | Known | VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-24521 | HIGH 7.8 | Microsoft | Windows | Apr 13, 2022 | May 4, 2022 | Known | Windows Common Log File System Driver Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-7602 | CRITICAL 9.8 | Drupal | Core | Apr 13, 2022 | May 4, 2022 | Known | A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-20753 | CRITICAL 9.8 | Kaseya | Virtual System/Server Administrator (VSA) | Apr 13, 2022 | May 4, 2022 | Known | Kaseya VSA RMM before R9.3 9.3.0.35, R9.4 before 9.4.0.36, and R9.5 before 9.5.0.5 allows unprivileged remote attackers to execute PowerShell payloads on all managed devices. In January 2018, attackers actively exploited this vulnerability in the wild. Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-5123 | CRITICAL 9.8 | Adobe | Flash Player | Apr 13, 2022 | May 4, 2022 | Unknown | Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2015-5122 | CRITICAL 9.8 | Adobe | Flash Player | Apr 13, 2022 | May 4, 2022 | Unknown | Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2015-3113 | CRITICAL 9.8 | Adobe | Flash Player | Apr 13, 2022 | May 4, 2022 | Unknown | Heap-based buffer overflow in Adobe Flash Player before 13.0.0.296 and 14.x through 18.x before 18.0.0.194 on Windows and OS X and before 11.2.202.468 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in June 2015. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2015-2502 | HIGH 8.8 | Microsoft | Internet Explorer | Apr 13, 2022 | May 4, 2022 | Unknown | Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," as exploited in the wild in August 2015. Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-0313 | CRITICAL 9.8 | Adobe | Flash Player | Apr 13, 2022 | May 4, 2022 | Unknown | Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2015, a different vulnerability than CVE-2015-0315, CVE-2015-0320, and CVE-2015-0322. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2015-0311 | CRITICAL 9.8 | Adobe | Flash Player | Apr 13, 2022 | May 4, 2022 | Unknown | Unspecified vulnerability in Adobe Flash Player through 13.0.0.262 and 14.x, 15.x, and 16.x through 16.0.0.287 on Windows and OS X and through 11.2.202.438 on Linux allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in January 2015. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2014-9163 | HIGH 7.8 | Adobe | Flash Player | Apr 13, 2022 | May 4, 2022 | Unknown | Stack-based buffer overflow in Adobe Flash Player before 13.0.0.259 and 14.x and 15.x before 15.0.0.246 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in December 2014. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2022-23176 | HIGH 8.8 | WatchGuard | Firebox and XTM | Apr 11, 2022 | May 2, 2022 | Unknown | WatchGuard Firebox and XTM appliances allow a remote attacker with unprivileged credentials to access the system with a privileged management session via exposed management access. This vulnerability impacts Fireware OS before 12.7.2_U1, 12.x before 12.1.3_U3, and 12.2.x through 12.5.x before 12.5.7_U3. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-42287 | HIGH 7.5 | Microsoft | Active Directory | Apr 11, 2022 | May 2, 2022 | Known | Active Directory Domain Services Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-42278 | HIGH 7.5 | Microsoft | Active Directory | Apr 11, 2022 | May 2, 2022 | Known | Active Directory Domain Services Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-39793 | HIGH 7.8 | Pixel | Apr 11, 2022 | May 2, 2022 | Unknown | In kbase_jd_user_buf_pin_pages of mali_kbase_mem.c, there is a possible out of bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210470189References: N/A Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-27852 | CRITICAL 9.8 | Checkbox | Checkbox Survey | Apr 11, 2022 | May 2, 2022 | Unknown | Deserialization of Untrusted Data vulnerability in CheckboxWeb.dll of Checkbox Survey allows an unauthenticated remote attacker to execute arbitrary code. This issue affects: Checkbox Survey versions prior to 7. Required action: Versions 6 and earlier for this product are end-of-life and must be removed from agency networks. Versions 7 and later are not considered vulnerable. | Open |
| CVE-2021-22600 | MEDIUM 6.6 | Linux | Kernel | Apr 11, 2022 | May 2, 2022 | Unknown | A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755 Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-2509 | CRITICAL 9.8 | QNAP | QNAP Network-Attached Storage (NAS) | Apr 11, 2022 | May 2, 2022 | Unknown | A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later QTS 4.5.1.1495 Build 20201123 and later QTS 4.3.6.1620 Build 20210322 and later QTS 4.3.4.1632 Build 20210324 and later QTS 4.3.3.1624 Build 20210416 and later QTS 4.2.6 Build 20210327 and later QuTS hero h4.5.1.1491 build 20201119 and later Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-11317 | CRITICAL 9.8 | Telerik | User Interface (UI) for ASP.NET AJAX | Apr 11, 2022 | May 2, 2022 | Unknown | Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX before R1 2017 and R2 before R2 2017 SP2 uses weak RadAsyncUpload encryption, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-3156 | HIGH 7.8 | Sudo | Sudo | Apr 6, 2022 | Apr 27, 2022 | Unknown | Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-31166 | CRITICAL 9.8 | Microsoft | HTTP Protocol Stack | Apr 6, 2022 | Apr 27, 2022 | Unknown | HTTP Protocol Stack Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0148 | HIGH 8.1 | Microsoft | SMBv1 server | Apr 6, 2022 | Apr 27, 2022 | Known | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0146. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-22965 | CRITICAL 9.8 | VMware | Spring Framework | Apr 4, 2022 | Apr 25, 2022 | Unknown | A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-22675 | HIGH 7.8 | Apple | macOS | Apr 4, 2022 | Apr 25, 2022 | Unknown | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.3.1, iOS 15.4.1 and iPadOS 15.4.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-22674 | MEDIUM 5.5 | Apple | macOS | Apr 4, 2022 | Apr 25, 2022 | Unknown | An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Monterey 12.3.1, Security Update 2022-004 Catalina, macOS Big Sur 11.6.6. A local user may be able to read kernel memory. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-45382 | CRITICAL 9.8 | D-Link | Multiple Routers | Apr 4, 2022 | Apr 25, 2022 | Unknown | A Remote Command Execution (RCE) vulnerability exists in all series H/W revisions D-link DIR-810L, DIR-820L/LW, DIR-826L, DIR-830L, and DIR-836L routers via the DDNS function in ncc2 binary file. Note: DIR-810L, DIR-820L, DIR-830L, DIR-826L, DIR-836L, all hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle and as such this issue will not be patched. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2022-26871 | CRITICAL 9.8 | Trend Micro | Apex Central | Mar 31, 2022 | Apr 21, 2022 | Unknown | An arbitrary file upload vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to upload an arbitrary file which could lead to remote code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-1040 | CRITICAL 9.8 | Sophos | Firewall | Mar 31, 2022 | Apr 21, 2022 | Unknown | An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v18.5 MR3 and older. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-34484 | HIGH 7.8 | Microsoft | Windows | Mar 31, 2022 | Apr 21, 2022 | Unknown | Windows User Profile Service Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-28799 | CRITICAL 10.0 | QNAP | Network Attached Storage (NAS) | Mar 31, 2022 | Apr 21, 2022 | Known | An improper authorization vulnerability has been reported to affect QNAP NAS running HBS 3 (Hybrid Backup Sync. ) If exploited, the vulnerability allows remote attackers to log in to a device. This issue affects: QNAP Systems Inc. HBS 3 versions prior to v16.0.0415 on QTS 4.5.2; versions prior to v3.0.210412 on QTS 4.3.6; versions prior to v3.0.210411 on QTS 4.3.4; versions prior to v3.0.210411 on QTS 4.3.3; versions prior to v16.0.0419 on QuTS hero h4.5.1; versions prior to v16.0.0419 on QuTScloud c4.5.1~c4.5.4. This issue does not affect: QNAP Systems Inc. HBS 2 . QNAP Systems Inc. HBS 1.3 . Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-21551 | HIGH 8.8 | Dell | dbutil Driver | Mar 31, 2022 | Apr 21, 2022 | Unknown | Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-10562 | CRITICAL 9.8 | Dasan | Gigabit Passive Optical Network (GPON) Routers | Mar 31, 2022 | Apr 21, 2022 | Known | An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2018-10561 | CRITICAL 9.8 | Dasan | Gigabit Passive Optical Network (GPON) Routers | Mar 31, 2022 | Apr 21, 2022 | Unknown | An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2022-1096 | HIGH 8.8 | Chromium V8 | Mar 28, 2022 | Apr 18, 2022 | Unknown | Type confusion in V8 in Google Chrome prior to 99.0.4844.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2022-0543 | CRITICAL 10.0 | Redis | Debian-specific Redis Servers | Mar 28, 2022 | Apr 18, 2022 | Unknown | It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-38646 | HIGH 7.8 | Microsoft | Office | Mar 28, 2022 | Apr 18, 2022 | Known | Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-34486 | HIGH 7.8 | Microsoft | Windows | Mar 28, 2022 | Apr 18, 2022 | Unknown | Windows Event Tracing Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-26085 | MEDIUM 5.3 | Atlassian | Confluence Server | Mar 28, 2022 | Apr 18, 2022 | Known | Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-20028 | CRITICAL 9.8 | SonicWall | Secure Remote Access (SRA) | Mar 28, 2022 | Apr 18, 2022 | Known | Improper neutralization of a SQL Command leading to SQL Injection vulnerability impacting end-of-life Secure Remote Access (SRA) products, specifically the SRA appliances running all 8.x firmware and 9.0.0.9-26sv or earlier Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2019-7483 | HIGH 7.5 | SonicWall | SMA100 | Mar 28, 2022 | Apr 18, 2022 | Unknown | In SonicWall SMA100, an unauthenticated Directory Traversal vulnerability in the handleWAFRedirect CGI allows the user to test for the presence of a file on the server. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-8440 | HIGH 7.8 | Microsoft | Windows | Mar 28, 2022 | Apr 18, 2022 | Known | An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC), aka "Windows ALPC Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-8406 | HIGH 7.8 | Microsoft | DirectX Graphics Kernel (DXGKRNL) | Mar 28, 2022 | Apr 18, 2022 | Known | An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka "DirectX Graphics Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8400, CVE-2018-8401, CVE-2018-8405. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-8405 | HIGH 7.8 | Microsoft | DirectX Graphics Kernel (DXGKRNL) | Mar 28, 2022 | Apr 18, 2022 | Known | An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka "DirectX Graphics Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8400, CVE-2018-8401, CVE-2018-8406. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0213 | HIGH 7.3 | Microsoft | Windows | Mar 28, 2022 | Apr 18, 2022 | Known | Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation privilege vulnerability when an attacker runs a specially crafted application, aka "Windows COM Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-0214. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0059 | MEDIUM 4.3 | Microsoft | Internet Explorer | Mar 28, 2022 | Apr 18, 2022 | Unknown | Microsoft Internet Explorer 9 through 11 allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0008 and CVE-2017-0009. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0037 | HIGH 8.1 | Microsoft | Edge and Internet Explorer | Mar 28, 2022 | Apr 18, 2022 | Unknown | Microsoft Internet Explorer 10 and 11 and Microsoft Edge have a type confusion issue in the Layout::MultiColumnBoxBuilder::HandleColumnBreakOnColumnSpanningElement function in mshtml.dll, which allows remote attackers to execute arbitrary code via vectors involving a crafted Cascading Style Sheets (CSS) token sequence and crafted JavaScript code that operates on a TH element. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-7201 | HIGH 8.8 | Microsoft | Edge | Mar 28, 2022 | Apr 18, 2022 | Unknown | The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7200, CVE-2016-7202, CVE-2016-7203, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-7200 | HIGH 8.8 | Microsoft | Edge | Mar 28, 2022 | Apr 18, 2022 | Unknown | The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7201, CVE-2016-7202, CVE-2016-7203, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-0189 | HIGH 7.5 | Microsoft | Internet Explorer | Mar 28, 2022 | Apr 18, 2022 | Unknown | The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0187. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-0151 | HIGH 7.8 | Microsoft | Client-Server Run-time Subsystem (CSRSS) | Mar 28, 2022 | Apr 18, 2022 | Known | The Client-Server Run-time Subsystem (CSRSS) in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 mismanages process tokens, which allows local users to gain privileges via a crafted application, aka "Windows CSRSS Security Feature Bypass Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-0040 | HIGH 7.8 | Microsoft | Windows | Mar 28, 2022 | Apr 18, 2022 | Unknown | The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "Windows Elevation of Privilege Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-2426 | HIGH 8.8 | Microsoft | Windows | Mar 28, 2022 | Apr 18, 2022 | Unknown | Buffer underflow in atmfd.dll in the Windows Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted OpenType font, aka "OpenType Font Driver Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-2419 | HIGH 8.8 | Microsoft | Internet Explorer | Mar 28, 2022 | Apr 18, 2022 | Unknown | JScript 9 in Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "JScript9 Memory Corruption Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-1770 | HIGH 8.8 | Microsoft | Office | Mar 28, 2022 | Apr 18, 2022 | Unknown | Microsoft Office 2013 SP1 and 2013 RT SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Uninitialized Memory Use Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-3660 | HIGH 7.8 | Microsoft | Win32k | Mar 28, 2022 | Apr 18, 2022 | Unknown | The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka "Win32k Read AV Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-2729 | CRITICAL 9.8 | Adobe | Reader and Acrobat | Mar 28, 2022 | Apr 18, 2022 | Unknown | Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2727. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-2551 | HIGH 8.8 | Microsoft | Internet Explorer | Mar 28, 2022 | Apr 18, 2022 | Known | Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-2465 | CRITICAL 9.8 | Oracle | Java SE | Mar 28, 2022 | Apr 18, 2022 | Known | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-1690 | HIGH 8.8 | Mozilla | Firefox and Thunderbird | Mar 28, 2022 | Apr 18, 2022 | Unknown | Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location. Required action: Apply updates per vendor instructions. | Open |
| CVE-2012-5076 | CRITICAL 9.8 | Oracle | Java SE | Mar 28, 2022 | Apr 18, 2022 | Unknown | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JAX-WS. Required action: Apply updates per vendor instructions. | Open |
| CVE-2012-2539 | HIGH 7.8 | Microsoft | Word | Mar 28, 2022 | Apr 18, 2022 | Unknown | Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; and Office Web Apps 2010 SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, aka "Word RTF 'listoverridecount' Remote Code Execution Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2012-2034 | HIGH 7.5 | Adobe | Flash Player | Mar 28, 2022 | Apr 18, 2022 | Unknown | Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2037. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2012-0518 | MEDIUM 4.7 | Oracle | Fusion Middleware | Mar 28, 2022 | Apr 18, 2022 | Unknown | Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware 10.1.4.3.0 allows remote attackers to affect integrity via unknown vectors related to Redirects, a different vulnerability than CVE-2012-3175. Required action: Apply updates per vendor instructions. | Open |
| CVE-2011-2005 | HIGH 7.8 | Microsoft | Ancillary Function Driver (afd.sys) | Mar 28, 2022 | Apr 18, 2022 | Unknown | afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-4398 | HIGH 7.8 | Microsoft | Windows | Mar 28, 2022 | Apr 21, 2022 | Unknown | Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges, and bypass the User Account Control (UAC) feature, via a crafted REG_BINARY value for a SystemDefaultEUDCFont registry key, aka "Driver Improper Interaction with Windows Kernel Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-26318 | CRITICAL 9.8 | WatchGuard | Firebox and XTM Appliances | Mar 25, 2022 | Apr 15, 2022 | Unknown | On WatchGuard Firebox and XTM appliances, an unauthenticated user can execute arbitrary code, aka FBX-22786. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-26143 | CRITICAL 9.8 | Mitel | MiCollab, MiVoice Business Express | Mar 25, 2022 | Apr 15, 2022 | Unknown | The TP-240 (aka tp240dvr) component in Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allows remote attackers to obtain sensitive information and cause a denial of service (performance degradation and excessive outbound traffic). This was exploited in the wild in February and March 2022 for the TP240PhoneHome DDoS attack. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-21999 | HIGH 7.8 | Microsoft | Windows | Mar 25, 2022 | Apr 15, 2022 | Known | Windows Print Spooler Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-42237 | CRITICAL 9.8 | Sitecore | XP | Mar 25, 2022 | Apr 15, 2022 | Known | Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-22941 | CRITICAL 9.8 | Citrix | ShareFile | Mar 25, 2022 | Apr 15, 2022 | Known | Improper Access Control in Citrix ShareFile storage zones controller before 5.11.20 may allow an unauthenticated attacker to remotely compromise the storage zones controller. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-9377 | HIGH 8.8 | D-Link | DIR-610 Devices | Mar 25, 2022 | Apr 15, 2022 | Unknown | D-Link DIR-610 devices allow Remote Command Execution via the cmd parameter to command.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2020-9054 | CRITICAL 9.8 | Zyxel | Multiple Network-Attached Storage (NAS) Devices | Mar 25, 2022 | Apr 15, 2022 | Unknown | Multiple ZyXEL network-attached storage (NAS) devices running firmware version 5.21 contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable device. ZyXEL NAS devices achieve authentication by using the weblogin.cgi CGI executable. This program fails to properly sanitize the username parameter that is passed to it. If the username parameter contains certain characters, it can allow command injection with the privileges of the web server that runs on the ZyXEL device. Although the web server does not run as the root user, ZyXEL devices include a setuid utility that can be leveraged to run any command with root privileges. As such, it should be assumed that exploitation of this vulnerability can lead to remote code execution with root privileges. By sending a specially-crafted HTTP POST or GET request to a vulnerable ZyXEL device, a remote, unauthenticated attacker may be able to execute arbitrary code on the device. This may happen by directly connecting to a device if it is directly exposed to an attacker. However, there are ways to trigger such crafted requests even if an attacker does not have direct connectivity to a vulnerable devices. For example, simply visiting a website can result in the compromise of any ZyXEL device that is reachable from the client system. Affected products include: NAS326 before firmware V5.21(AAZF.7)C0 NAS520 before firmware V5.21(AASZ.3)C0 NAS540 before firmware V5.21(AATB.4)C0 NAS542 before firmware V5.21(ABAG.4)C0 ZyXEL has made firmware updates available for NAS326, NAS520, NAS540, and NAS542 devices. Affected models that are end-of-support: NSA210, NSA220, NSA220+, NSA221, NSA310, NSA310S, NSA320, NSA320S, NSA325 and NSA325v2 Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-7247 | CRITICAL 9.8 | OpenBSD | OpenSMTPD | Mar 25, 2022 | Apr 15, 2022 | Unknown | smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-5410 | HIGH 7.5 | VMware Tanzu | Spring Cloud Configuration (Config) Server | Mar 25, 2022 | Apr 15, 2022 | Unknown | Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-25223 | CRITICAL 9.8 | Sophos | SG UTM | Mar 25, 2022 | Apr 15, 2022 | Unknown | A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11 Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-2506 | HIGH 7.3 | QNAP Systems | Helpdesk | Mar 25, 2022 | Apr 15, 2022 | Unknown | The vulnerability have been reported to affect earlier versions of QTS. If exploited, this improper access control vulnerability could allow attackers to compromise the security of the software by gaining privileges, or reading sensitive information. This issue affects: QNAP Systems Inc. Helpdesk versions prior to 3.0.3. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-2021 | CRITICAL 10.0 | Palo Alto Networks | PAN-OS | Mar 25, 2022 | Apr 15, 2022 | Known | When Security Assertion Markup Language (SAML) authentication is enabled and the 'Validate Identity Provider Certificate' option is disabled (unchecked), improper verification of signatures in PAN-OS SAML authentication enables an unauthenticated network-based attacker to access protected resources. The attacker must have network access to the vulnerable server to exploit this vulnerability. This issue affects PAN-OS 9.1 versions earlier than PAN-OS 9.1.3; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15, and all versions of PAN-OS 8.0 (EOL). This issue does not affect PAN-OS 7.1. This issue cannot be exploited if SAML is not used for authentication. This issue cannot be exploited if the 'Validate Identity Provider Certificate' option is enabled (checked) in the SAML Identity Provider Server Profile. Resources that can be protected by SAML-based single sign-on (SSO) authentication are: GlobalProtect Gateway, GlobalProtect Portal, GlobalProtect Clientless VPN, Authentication and Captive Portal, PAN-OS next-generation firewalls (PA-Series, VM-Series) and Panorama web interfaces, Prisma Access In the case of GlobalProtect Gateways, GlobalProtect Portal, Clientless VPN, Captive Portal, and Prisma Access, an unauthenticated attacker with network access to the affected servers can gain access to protected resources if allowed by configured authentication and Security policies. There is no impact on the integrity and availability of the gateway, portal or VPN server. An attacker cannot inspect or tamper with sessions of regular users. In the worst case, this is a critical severity vulnerability with a CVSS Base Score of 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N). In the case of PAN-OS and Panorama web interfaces, this issue allows an unauthenticated attacker with network access to the PAN-OS or Panorama web interfaces to log in as an administrator and perform administrative actions. In the worst-case scenario, this is a critical severity vulnerability with a CVSS Base Score of 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). If the web interfaces are only accessible to a restricted management network, then the issue is lowered to a CVSS Base Score of 9.6 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-1956 | HIGH 8.8 | Apache | Kylin | Mar 25, 2022 | Apr 15, 2022 | Unknown | Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-1631 | HIGH 8.8 | Juniper | Junos OS | Mar 25, 2022 | Apr 15, 2022 | Unknown | A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Zero Touch Provisioning (ZTP) allows an unauthenticated attacker to perform local file inclusion (LFI) or path traversal. Using this vulnerability, an attacker may be able to inject commands into the httpd.log, read files with 'world' readable permission file or obtain J-Web session tokens. In the case of command injection, as the HTTP service runs as user 'nobody', the impact of this command injection is limited. (CVSS score 5.3, vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) In the case of reading files with 'world' readable permission, in Junos OS 19.3R1 and above, the unauthenticated attacker would be able to read the configuration file. (CVSS score 5.9, vector CVSS:3.1/ AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) If J-Web is enabled, the attacker could gain the same level of access of anyone actively logged into J-Web. If an administrator is logged in, the attacker could gain administrator access to J-Web. (CVSS score 8.8, vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) This issue only affects Juniper Networks Junos OS devices with HTTP/HTTPS services enabled. Junos OS devices with HTTP/HTTPS services disabled are not affected. If HTTP/HTTPS services are enabled, the following command will show the httpd processes: user@device> show system processes | match http 5260 - S 0:00.13 /usr/sbin/httpd-gk -N 5797 - I 0:00.10 /usr/sbin/httpd --config /jail/var/etc/httpd.conf To summarize: If HTTP/HTTPS services are disabled, there is no impact from this vulnerability. If HTTP/HTTPS services are enabled and J-Web is not in use, this vulnerability has a CVSS score of 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). If J-Web is enabled, this vulnerability has a CVSS score of 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Juniper SIRT has received a single report of this vulnerability being exploited in the wild. Out of an abundance of caution, we are notifying customers so they can take appropriate actions. Indicators of Compromise: The /var/log/httpd.log may have indicators that commands have injected or files being accessed. The device administrator can look for these indicators by searching for the string patterns "=*;*&" or "*%3b*&" in /var/log/httpd.log, using the following command: user@device> show log httpd.log | match "=*;*&|=*%3b*&" If this command returns any output, it might be an indication of malicious attempts or simply scanning activities. Rotated logs should also be reviewed, using the following command: user@device> show log httpd.log.0.gz | match "=*;*&|=*%3b*&" user@device> show log httpd.log.1.gz | match "=*;*&|=*%3b*&" Note that a skilled attacker would likely remove these entries from the local log file, thus effectively eliminating any reliable signature that the device had been attacked. This issue affects Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S16; 12.3X48 versions prior to 12.3X48-D101, 12.3X48-D105; 14.1X53 versions prior to 14.1X53-D54; 15.1 versions prior to 15.1R7-S7; 15.1X49 versions prior to 15.1X49-D211, 15.1X49-D220; 16.1 versions prior to 16.1R7-S8; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S4; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R1-S7, 18.4R3-S2 ; 18.4 version 18.4R2 and later versions; 19.1 versions prior to 19.1R1-S5, 19.1R3-S1; 19.1 version 19.1R2 and later versions; 19.2 versions prior to 19.2R2; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2; 20.1 versions prior to 20.1R1-S1, 20.1R2. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-6340 | HIGH 8.1 | Drupal | Core | Mar 25, 2022 | Apr 15, 2022 | Unknown | Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.) Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-2616 | HIGH 7.2 | Oracle | BI Publisher (Formerly XML Publisher) | Mar 25, 2022 | Apr 15, 2022 | Unknown | Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher). While the vulnerability is in BI Publisher (formerly XML Publisher), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of BI Publisher (formerly XML Publisher) accessible data as well as unauthorized read access to a subset of BI Publisher (formerly XML Publisher) accessible data. CVSS 3.0 Base Score 7.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N). Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-16920 | CRITICAL 9.8 | D-Link | Multiple Routers | Mar 25, 2022 | Apr 15, 2022 | Unknown | Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2019-15107 | CRITICAL 9.8 | Webmin | Webmin | Mar 25, 2022 | Apr 15, 2022 | Unknown | An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-12991 | HIGH 8.8 | Citrix | SD-WAN and NetScaler | Mar 25, 2022 | Apr 15, 2022 | Unknown | Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 have Improper Input Validation (issue 5 of 6). Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-12989 | CRITICAL 9.8 | Citrix | SD-WAN and NetScaler | Mar 25, 2022 | Apr 15, 2022 | Unknown | Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 allow SQL Injection. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-11043 | HIGH 8.7 | PHP | FastCGI Process Manager (FPM) | Mar 25, 2022 | Apr 15, 2022 | Known | In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-10068 | CRITICAL 9.8 | Kentico | Xperience | Mar 25, 2022 | Apr 15, 2022 | Unknown | An issue was discovered in Kentico 12.0.x before 12.0.15, 11.0.x before 11.0.48, 10.0.x before 10.0.52, and 9.x versions. Due to a failure to validate security headers, it was possible for a specially crafted request to the staging service to bypass the initial authentication and proceed to deserialize user-controlled .NET object input. This deserialization then led to unauthenticated remote code execution on the server where the Kentico instance was hosted. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1003030 | CRITICAL 9.9 | Jenkins | Matrix Project Plugin | Mar 25, 2022 | Apr 15, 2022 | Unknown | A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-0903 | HIGH 8.8 | Microsoft | Graphics Device Interface (GDI) | Mar 25, 2022 | Apr 15, 2022 | Unknown | A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-8414 | HIGH 8.8 | Microsoft | Windows | Mar 25, 2022 | Apr 15, 2022 | Unknown | A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths, aka "Windows Shell Remote Code Execution Vulnerability." This affects Windows 10 Servers, Windows 10. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-8373 | HIGH 7.5 | Microsoft | Internet Explorer Scripting Engine | Mar 25, 2022 | Apr 15, 2022 | Unknown | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-6961 | HIGH 8.1 | VMware | SD-WAN Edge | Mar 25, 2022 | Apr 15, 2022 | Unknown | VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-14839 | CRITICAL 9.8 | LG | N1A1 NAS | Mar 25, 2022 | Apr 15, 2022 | Unknown | LG N1A1 NAS 3718.510 is affected by: Remote Command Execution. The impact is: execute arbitrary code (remote). The attack vector is: HTTP POST with parameters. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-1273 | CRITICAL 9.8 | VMware Tanzu | Spring Data Commons | Mar 25, 2022 | Apr 15, 2022 | Known | Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-11138 | CRITICAL 9.8 | Quest | KACE System Management Appliance | Mar 25, 2022 | Apr 15, 2022 | Known | The '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by anonymous users and can be abused to execute arbitrary commands on the system. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0147 | CRITICAL 9.8 | Cisco | Secure Access Control System (ACS) | Mar 25, 2022 | Apr 15, 2022 | Unknown | A vulnerability in Java deserialization used by Cisco Secure Access Control System (ACS) prior to release 5.8 patch 9 could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object. An exploit could allow the attacker to execute arbitrary commands on the device with root privileges. Cisco Bug IDs: CSCvh25988. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0125 | CRITICAL 9.8 | Cisco | VPN Routers | Mar 25, 2022 | Apr 15, 2022 | Unknown | A vulnerability in the web interface of the Cisco RV132W ADSL2+ Wireless-N VPN and RV134W VDSL2 Wireless-AC VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code and gain full control of an affected system, including issuing commands with root privileges. The attacker could also cause an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to an incomplete input validation on user-controlled input in an HTTP request to the targeted device. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to execute arbitrary code as the root user and gain full control of the affected system or cause it to reload, resulting in a DoS condition. This vulnerability is fixed in firmware version 1.0.1.11 for the following Cisco products: RV132W ADSL2+ Wireless-N VPN Router and RV134W VDSL2 Wireless-AC VPN Router. Cisco Bug IDs: CSCvg92737, CSCvh60170. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-6334 | HIGH 8.8 | NETGEAR | DGN2200 Devices | Mar 25, 2022 | Apr 15, 2022 | Unknown | dnslookup.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the host_name field of an HTTP POST request, a different vulnerability than CVE-2017-6077. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2017-6316 | CRITICAL 9.8 | Citrix | NetScaler SD-WAN Enterprise, CloudBridge Virtual WAN, and XenMobile Server | Mar 25, 2022 | Apr 15, 2022 | Unknown | Citrix NetScaler SD-WAN devices through v9.1.2.26.561201 allow remote attackers to execute arbitrary shell commands as root via a CGISESSID cookie. On CloudBridge (the former name of NetScaler SD-WAN) devices, the cookie name was CAKEPHP rather than CGISESSID. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-3881 | CRITICAL 9.8 | Cisco | IOS and IOS XE | Mar 25, 2022 | Apr 15, 2022 | Unknown | A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-12617 | HIGH 8.1 | Apache | Tomcat | Mar 25, 2022 | Apr 15, 2022 | Unknown | When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-12615 | HIGH 8.1 | Apache | Tomcat | Mar 25, 2022 | Apr 15, 2022 | Known | When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0146 | HIGH 8.8 | Microsoft | Windows | Mar 25, 2022 | Apr 15, 2022 | Known | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0148. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-7892 | HIGH 8.8 | Adobe | Flash Player | Mar 25, 2022 | Apr 15, 2022 | Unknown | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the TextField class. Successful exploitation could lead to arbitrary code execution. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2016-4171 | CRITICAL 9.8 | Adobe | Flash Player | Mar 25, 2022 | Apr 15, 2022 | Unknown | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in June 2016. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2016-1555 | CRITICAL 9.8 | NETGEAR | Wireless Access Point (WAP) Devices | Mar 25, 2022 | Apr 15, 2022 | Unknown | (1) boardData102.php, (2) boardData103.php, (3) boardDataJP.php, (4) boardDataNA.php, and (5) boardDataWW.php in Netgear WN604 before 3.3.3 and WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360, and WNDAP660 before 3.5.5.0 allow remote attackers to execute arbitrary commands. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-11021 | HIGH 7.2 | D-Link | DCS-930L Devices | Mar 25, 2022 | Apr 15, 2022 | Unknown | setSystemCommand on D-Link DCS-930L devices before 2.12 allows a remote attacker to execute code via an OS command in the SystemCommand parameter. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2016-10174 | CRITICAL 9.8 | NETGEAR | WNR2000v5 Router | Mar 25, 2022 | Apr 15, 2022 | Unknown | The NETGEAR WNR2000v5 router contains a buffer overflow in the hidden_lang_avi parameter when invoking the URL /apply.cgi?/lang_check.html. This buffer overflow can be exploited by an unauthenticated attacker to achieve remote code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-0752 | HIGH 7.5 | Rails | Ruby on Rails | Mar 25, 2022 | Apr 15, 2022 | Unknown | Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-4068 | CRITICAL 9.1 | Arcserve | Unified Data Protection (UDP) | Mar 25, 2022 | Apr 15, 2022 | Unknown | Directory traversal vulnerability in Arcserve UDP before 5.0 Update 4 allows remote attackers to obtain sensitive information or cause a denial of service via a crafted file path to the (1) reportFileServlet or (2) exportServlet servlet. Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-3035 | HIGH 7.5 | TP-Link | Multiple Archer Devices | Mar 25, 2022 | Apr 15, 2022 | Unknown | Directory traversal vulnerability in TP-LINK Archer C5 (1.2) with firmware before 150317, C7 (2.0) with firmware before 150304, and C8 (1.0) with firmware before 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware before 150302, TL-WR740N (5.0) and TL-WR741ND (5.0) with firmware before 150312, and TL-WR841N (9.0), TL-WR841N (10.0), TL-WR841ND (9.0), and TL-WR841ND (10.0) with firmware before 150310 allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/. Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-1427 | CRITICAL 9.8 | Elastic | Elasticsearch | Mar 25, 2022 | Apr 15, 2022 | Unknown | The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script. Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-1187 | CRITICAL 9.8 | D-Link and TRENDnet | Multiple Devices | Mar 25, 2022 | Apr 15, 2022 | Unknown | The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2015-0666 | HIGH 7.5 | Cisco | Prime Data Center Network Manager (DCNM) | Mar 25, 2022 | Apr 15, 2022 | Unknown | Directory traversal vulnerability in the fmserver servlet in Cisco Prime Data Center Network Manager (DCNM) before 7.1(1) allows remote attackers to read arbitrary files via a crafted pathname, aka Bug ID CSCus00241. Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-6332 | HIGH 8.8 | Microsoft | Windows | Mar 25, 2022 | Apr 15, 2022 | Unknown | OleAut32.dll in OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted web site, as demonstrated by an array-redimensioning attempt that triggers improper handling of a size value in the SafeArrayDimen function, aka "Windows OLE Automation Array Remote Code Execution Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-6324 | HIGH 8.8 | Microsoft | Kerberos Key Distribution Center (KDC) | Mar 25, 2022 | Apr 15, 2022 | Unknown | The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote authenticated domain users to obtain domain administrator privileges via a forged signature in a ticket, as exploited in the wild in November 2014, aka "Kerberos Checksum Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-6287 | CRITICAL 9.8 | Rejetto | HTTP File Server (HFS) | Mar 25, 2022 | Apr 15, 2022 | Unknown | The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search action. Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-3120 | HIGH 8.1 | Elastic | Elasticsearch | Mar 25, 2022 | Apr 15, 2022 | Unknown | The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine. Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-0130 | HIGH 7.5 | Rails | Ruby on Rails | Mar 25, 2022 | Apr 15, 2022 | Unknown | Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-5223 | MEDIUM 5.4 | D-Link | DSL-2760U | Mar 25, 2022 | Apr 15, 2022 | Unknown | Multiple cross-site scripting (XSS) vulnerabilities in D-Link DSL-2760U Gateway (Rev. E1) allow remote authenticated users to inject arbitrary web script or HTML via the (1) ntpServer1 parameter to sntpcfg.cgi, username parameter to (2) ddnsmngr.cmd or (3) todmngr.tod, (4) TodUrlAdd parameter to urlfilter.cmd, (5) appName parameter to scprttrg.cmd, (6) fltName in an add action or (7) rmLst parameter in a remove action to scoutflt.cmd, (8) groupName parameter to portmapcfg.cmd, (9) snmpRoCommunity parameter to snmpconfig.cgi, (10) fltName parameter to scinflt.cmd, (11) PolicyName in an add action or (12) rmLst parameter in a remove action to prmngr.cmd, (13) ippName parameter to ippcfg.cmd, (14) smbNetBiosName or (15) smbDirName parameter to samba.cgi, or (16) wlSsid parameter to wlcfg.wl. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-4810 | CRITICAL 9.8 | Hewlett Packard (HP) | ProCurve Manager (PCM), PCM+, Identity Driven Manager (IDM), and Application Lifecycle Management | Mar 25, 2022 | Apr 15, 2022 | Unknown | HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, Identity Driven Manager (IDM) 4.0, and Application Lifecycle Management allow remote attackers to execute arbitrary code via a marshalled object to (1) EJBInvokerServlet or (2) JMXInvokerServlet, aka ZDI-CAN-1760. NOTE: this is probably a duplicate of CVE-2007-1036, CVE-2010-0738, and/or CVE-2012-0874. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-2251 | CRITICAL 9.8 | Apache | Struts | Mar 25, 2022 | Apr 15, 2022 | Unknown | Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix. Required action: Apply updates per vendor instructions. | Open |
| CVE-2012-1823 | CRITICAL 9.8 | PHP | PHP | Mar 25, 2022 | Apr 15, 2022 | Unknown | sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-4345 | HIGH 7.8 | Exim | Exim | Mar 25, 2022 | Apr 15, 2022 | Unknown | Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive. Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-4344 | CRITICAL 9.8 | Exim | Exim | Mar 25, 2022 | Apr 15, 2022 | Unknown | Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging. Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-3035 | HIGH 7.5 | Cisco | IOS XR | Mar 25, 2022 | Apr 15, 2022 | Unknown | Cisco IOS XR 3.4.0 through 3.9.1, when BGP is enabled, does not properly handle unrecognized transitive attributes, which allows remote attackers to cause a denial of service (peering reset) via a crafted prefix announcement, as demonstrated in the wild in August 2010 with attribute type code 99, aka Bug ID CSCti62211. Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-2861 | CRITICAL 9.8 | Adobe | ColdFusion | Mar 25, 2022 | Apr 15, 2022 | Known | Multiple directory traversal vulnerabilities in the administrator console in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files via the locale parameter to (1) CFIDE/administrator/settings/mappings.cfm, (2) logging/settings.cfm, (3) datasources/index.cfm, (4) j2eepackaging/editarchive.cfm, and (5) enter.cfm in CFIDE/administrator/. Required action: Apply updates per vendor instructions. | Open |
| CVE-2009-2055 | MEDIUM 5.9 | Cisco | IOS XR | Mar 25, 2022 | Apr 15, 2022 | Unknown | Cisco IOS XR 3.4.0 through 3.8.1 allows remote attackers to cause a denial of service (session reset) via a BGP UPDATE message with an invalid attribute, as demonstrated in the wild on 17 August 2009. Required action: Apply updates per vendor instructions. | Open |
| CVE-2009-1151 | CRITICAL 9.8 | phpMyAdmin | phpMyAdmin | Mar 25, 2022 | Apr 15, 2022 | Unknown | Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action. Required action: Apply updates per vendor instructions. | Open |
| CVE-2009-0927 | HIGH 8.8 | Adobe | Reader and Acrobat | Mar 25, 2022 | Apr 15, 2022 | Unknown | Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Collab object, a different vulnerability than CVE-2009-0658. Required action: Apply updates per vendor instructions. | Open |
| CVE-2005-2773 | CRITICAL 9.8 | Hewlett Packard (HP) | OpenView Network Node Manager | Mar 25, 2022 | Apr 15, 2022 | Unknown | HP OpenView Network Node Manager 6.2 through 7.50 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) node parameter to connectedNodes.ovpl, (2) cdpView.ovpl, (3) freeIPaddrs.ovpl, and (4) ecscmg.ovpl. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-5135 | CRITICAL 9.8 | SonicWall | SonicOS | Mar 15, 2022 | Apr 5, 2022 | Unknown | A buffer overflow vulnerability in SonicOS allows a remote attacker to cause Denial of Service (DoS) and potentially execute arbitrary code by sending a malicious request to the firewall. This vulnerability affected SonicOS Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version 7.0.0.0. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1405 | HIGH 7.8 | Microsoft | Windows | Mar 15, 2022 | Apr 5, 2022 | Known | An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly allows COM object creation, aka 'Windows UPnP Service Elevation of Privilege Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1322 | HIGH 7.8 | Microsoft | Windows | Mar 15, 2022 | Apr 5, 2022 | Known | An elevation of privilege vulnerability exists when Windows improperly handles authentication requests, aka 'Microsoft Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1320, CVE-2019-1340. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1315 | HIGH 7.8 | Microsoft | Windows | Mar 15, 2022 | Apr 5, 2022 | Known | An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles hard links, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1339, CVE-2019-1342. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1253 | HIGH 7.8 | Microsoft | Windows | Mar 15, 2022 | Apr 5, 2022 | Known | An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1215, CVE-2019-1278, CVE-2019-1303. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1132 | HIGH 7.8 | Microsoft | Win32k | Mar 15, 2022 | Apr 5, 2022 | Unknown | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1129 | HIGH 7.8 | Microsoft | Windows | Mar 15, 2022 | Apr 5, 2022 | Known | An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1130. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1069 | HIGH 7.8 | Microsoft | Task Scheduler | Mar 15, 2022 | Apr 5, 2022 | Known | An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system. The security update addresses the vulnerability by correctly validating file operations. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1064 | HIGH 7.8 | Microsoft | Windows | Mar 15, 2022 | Apr 5, 2022 | Known | An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-0841 | HIGH 7.8 | Microsoft | Windows | Mar 15, 2022 | Apr 5, 2022 | Known | An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0730, CVE-2019-0731, CVE-2019-0796, CVE-2019-0805, CVE-2019-0836. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-0543 | HIGH 7.8 | Microsoft | Windows | Mar 15, 2022 | Apr 5, 2022 | Known | An elevation of privilege vulnerability exists when Windows improperly handles authentication requests, aka "Microsoft Windows Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-8120 | HIGH 7.0 | Microsoft | Win32k | Mar 15, 2022 | Apr 5, 2022 | Known | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8124, CVE-2018-8164, CVE-2018-8166. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0101 | HIGH 7.8 | Microsoft | Windows | Mar 15, 2022 | Apr 5, 2022 | Known | The kernel-mode drivers in Transaction Manager in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Windows Elevation of Privilege Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-3309 | HIGH 7.8 | Microsoft | Windows | Mar 15, 2022 | Apr 5, 2022 | Known | The kernel-mode drivers in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-3308, CVE-2016-3310, and CVE-2016-3311. Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-2546 | HIGH 8.2 | Microsoft | Win32k | Mar 15, 2022 | Apr 5, 2022 | Known | The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2517, and CVE-2015-2518. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-26486 | CRITICAL 9.6 | Mozilla | Firefox | Mar 7, 2022 | Mar 21, 2022 | Unknown | An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-26485 | HIGH 8.8 | Mozilla | Firefox | Mar 7, 2022 | Mar 21, 2022 | Unknown | Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-21973 | MEDIUM 5.3 | VMware | vCenter Server and Cloud Foundation | Mar 7, 2022 | Mar 21, 2022 | Unknown | The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue by sending a POST request to vCenter Server plugin leading to information disclosure. This affects: VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-8218 | HIGH 7.2 | Pulse Secure | Pulse Connect Secure | Mar 7, 2022 | Sep 7, 2022 | Unknown | A code injection vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to crafted a URI to perform an arbitrary code execution via the admin web interface. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-11581 | CRITICAL 9.8 | Atlassian | Jira Server and Data Center | Mar 7, 2022 | Sep 7, 2022 | Unknown | There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-6077 | CRITICAL 9.8 | NETGEAR | Wireless Router DGN2200 | Mar 7, 2022 | Sep 7, 2022 | Unknown | ping.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ping_IPAddr field of an HTTP POST request. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-6277 | HIGH 8.8 | NETGEAR | Multiple Routers | Mar 7, 2022 | Sep 7, 2022 | Unknown | NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-0631 | HIGH 7.5 | Adobe | ColdFusion | Mar 7, 2022 | Sep 7, 2022 | Unknown | Adobe ColdFusion 9.0, 9.0.1, and 9.0.2 allows attackers to obtain sensitive information via unspecified vectors, as exploited in the wild in January 2013. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-0629 | HIGH 7.5 | Adobe | ColdFusion | Mar 7, 2022 | Sep 7, 2022 | Unknown | Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10, when a password is not configured, allows attackers to access restricted directories via unspecified vectors, as exploited in the wild in January 2013. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-0625 | CRITICAL 9.8 | Adobe | ColdFusion | Mar 7, 2022 | Sep 7, 2022 | Unknown | Adobe ColdFusion 9.0, 9.0.1, and 9.0.2, when a password is not configured, allows remote attackers to bypass authentication and possibly execute arbitrary code via unspecified vectors, as exploited in the wild in January 2013. Required action: Apply updates per vendor instructions. | Open |
| CVE-2009-3960 | MEDIUM 6.5 | Adobe | BlazeDS | Mar 7, 2022 | Sep 7, 2022 | Known | Unspecified vulnerability in BlazeDS 3.2 and earlier, as used in LiveCycle 8.0.1, 8.2.1, and 9.0, LiveCycle Data Services 2.5.1, 2.6.1, and 3.0, Flex Data Services 2.0.1, and ColdFusion 7.0.2, 8.0, 8.0.1, and 9.0, allows remote attackers to obtain sensitive information via vectors that are associated with a request, and related to injected tags and external entity references in XML documents. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-20708 | CRITICAL 10.0 | Cisco | Small Business RV160, RV260, RV340, and RV345 Series Routers | Mar 3, 2022 | Mar 17, 2022 | Unknown | Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-20703 | CRITICAL 10.0 | Cisco | Small Business RV160, RV260, RV340, and RV345 Series Routers | Mar 3, 2022 | Mar 17, 2022 | Unknown | Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-20701 | CRITICAL 10.0 | Cisco | Small Business RV160, RV260, RV340, and RV345 Series Routers | Mar 3, 2022 | Mar 17, 2022 | Unknown | Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-20700 | CRITICAL 10.0 | Cisco | Small Business RV160, RV260, RV340, and RV345 Series Routers | Mar 3, 2022 | Mar 17, 2022 | Unknown | Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-20699 | CRITICAL 10.0 | Cisco | Small Business RV160, RV260, RV340, and RV345 Series Routers | Mar 3, 2022 | Mar 17, 2022 | Unknown | Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-41379 | MEDIUM 5.5 | Microsoft | Windows | Mar 3, 2022 | Mar 17, 2022 | Known | Windows Installer Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-1938 | CRITICAL 9.8 | Apache | Tomcat | Mar 3, 2022 | Mar 17, 2022 | Unknown | When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-11899 | MEDIUM 5.4 | Treck TCP/IP stack | IPv6 | Mar 3, 2022 | Mar 17, 2022 | Unknown | The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-16928 | CRITICAL 9.8 | Exim | Exim Internet Mailer | Mar 3, 2022 | Mar 17, 2022 | Unknown | Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1652 | HIGH 7.2 | Cisco | Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers | Mar 3, 2022 | Mar 17, 2022 | Unknown | A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1297 | HIGH 8.8 | Microsoft | Excel | Mar 3, 2022 | Mar 17, 2022 | Unknown | A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-8581 | HIGH 7.4 | Microsoft | Exchange Server | Mar 3, 2022 | Mar 17, 2022 | Known | An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka "Microsoft Exchange Server Elevation of Privilege Vulnerability." This affects Microsoft Exchange Server. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-8298 | HIGH 7.5 | ChakraCore | ChakraCore scripting engine | Mar 3, 2022 | Mar 17, 2022 | Unknown | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8287, CVE-2018-8288, CVE-2018-8291, CVE-2018-8296. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0180 | MEDIUM 5.9 | Cisco | IOS Software | Mar 3, 2022 | Mar 17, 2022 | Unknown | Multiple vulnerabilities in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a reload of an affected system, resulting in a denial of service (DoS) condition. These vulnerabilities affect Cisco devices that are running Cisco IOS Software Release 15.4(2)T, 15.4(3)M, or 15.4(2)CG and later. Cisco Bug IDs: CSCuy32360, CSCuz60599. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0179 | MEDIUM 5.9 | Cisco | IOS Software | Mar 3, 2022 | Mar 17, 2022 | Unknown | Multiple vulnerabilities in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a reload of an affected system, resulting in a denial of service (DoS) condition. These vulnerabilities affect Cisco devices that are running Cisco IOS Software Release 15.4(2)T, 15.4(3)M, or 15.4(2)CG and later. Cisco Bug IDs: CSCuy32360, CSCuz60599. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0175 | HIGH 8.0 | Cisco | IOS, XR, and XE Software | Mar 3, 2022 | Mar 17, 2022 | Unknown | Format String vulnerability in the Link Layer Discovery Protocol (LLDP) subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. Cisco Bug IDs: CSCvd73664. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0174 | HIGH 8.6 | Cisco | IOS XE Software | Mar 3, 2022 | Mar 17, 2022 | Unknown | A vulnerability in the DHCP option 82 encapsulation functionality of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software performs incomplete input validation of option 82 information that it receives in DHCP Version 4 (DHCPv4) packets from DHCP relay agents. An attacker could exploit this vulnerability by sending a crafted DHCPv4 packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuh91645. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0173 | HIGH 8.6 | Cisco | IOS and IOS XE Software | Mar 3, 2022 | Mar 17, 2022 | Unknown | A vulnerability in the Cisco IOS Software and Cisco IOS XE Software function that restores encapsulated option 82 information in DHCP Version 4 (DHCPv4) packets could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a Relay Reply denial of service (DoS) condition. The vulnerability exists because the affected software performs incomplete input validation of encapsulated option 82 information that it receives in DHCPOFFER messages from DHCPv4 servers. An attacker could exploit this vulnerability by sending a crafted DHCPv4 packet to an affected device, which the device would then forward to a DHCPv4 server. When the affected software processes the option 82 information that is encapsulated in the response from the server, an error could occur. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvg62754. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0172 | HIGH 8.6 | Cisco | IOS and IOS XE Software | Mar 3, 2022 | Mar 17, 2022 | Unknown | A vulnerability in the DHCP option 82 encapsulation functionality of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software performs incomplete input validation of option 82 information that it receives in DHCP Version 4 (DHCPv4) packets from DHCP relay agents. An attacker could exploit this vulnerability by sending a crafted DHCPv4 packet to an affected device. A successful exploit could allow the attacker to cause a heap overflow condition on the affected device, which will cause the device to reload and result in a DoS condition. Cisco Bug IDs: CSCvg62730. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0167 | HIGH 8.8 | Cisco | IOS, XR, and XE Software | Mar 3, 2022 | Mar 17, 2022 | Unknown | Multiple Buffer Overflow vulnerabilities in the Link Layer Discovery Protocol (LLDP) subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. Cisco Bug IDs: CSCuo17183, CSCvd73487. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0161 | MEDIUM 6.3 | Cisco | IOS Software | Mar 3, 2022 | Mar 17, 2022 | Unknown | A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software running on certain models of Cisco Catalyst Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition, aka a GET MIB Object ID Denial of Service Vulnerability. The vulnerability is due to a condition that could occur when the affected software processes an SNMP read request that contains a request for the ciscoFlashMIB object ID (OID). An attacker could trigger this vulnerability by issuing an SNMP GET request for the ciscoFlashMIB OID on an affected device. A successful exploit could cause the affected device to restart due to a SYS-3-CPUHOG. This vulnerability affects the following Cisco devices if they are running a vulnerable release of Cisco IOS Software and are configured to use SNMP Version 2 (SNMPv2) or SNMP Version 3 (SNMPv3): Cisco Catalyst 2960-L Series Switches, Cisco Catalyst Digital Building Series Switches 8P, Cisco Catalyst Digital Building Series Switches 8U. Cisco Bug IDs: CSCvd89541. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0159 | HIGH 7.5 | Cisco | IOS Software and Cisco IOS XE Software | Mar 3, 2022 | Mar 17, 2022 | Unknown | A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0158 | HIGH 8.6 | Cisco | IOS Software and Cisco IOS XE Software | Mar 3, 2022 | Mar 17, 2022 | Unknown | A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a memory leak or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device to be processed. A successful exploit could cause an affected device to continuously consume memory and eventually reload, resulting in a DoS condition. Cisco Bug IDs: CSCvf22394. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0156 | HIGH 7.5 | Cisco | IOS Software and Cisco IOS XE Software | Mar 3, 2022 | Mar 17, 2022 | Unknown | A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0155 | HIGH 8.6 | Cisco | Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches | Mar 3, 2022 | Mar 17, 2022 | Unknown | A vulnerability in the Bidirectional Forwarding Detection (BFD) offload implementation of Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to cause a crash of the iosd process, causing a denial of service (DoS) condition. The vulnerability is due to insufficient error handling when the BFD header in a BFD packet is incomplete. An attacker could exploit this vulnerability by sending a crafted BFD message to or across an affected switch. A successful exploit could allow the attacker to trigger a reload of the system. This vulnerability affects Catalyst 4500 Supervisor Engine 6-E (K5), Catalyst 4500 Supervisor Engine 6L-E (K10), Catalyst 4500 Supervisor Engine 7-E (K10), Catalyst 4500 Supervisor Engine 7L-E (K10), Catalyst 4500E Supervisor Engine 8-E (K10), Catalyst 4500E Supervisor Engine 8L-E (K10), Catalyst 4500E Supervisor Engine 9-E (K10), Catalyst 4500-X Series Switches (K10), Catalyst 4900M Switch (K5), Catalyst 4948E Ethernet Switch (K5). Cisco Bug IDs: CSCvc40729. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0154 | HIGH 7.5 | Cisco | IOS Software | Mar 3, 2022 | Mar 17, 2022 | Unknown | A vulnerability in the crypto engine of the Cisco Integrated Services Module for VPN (ISM-VPN) running Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient handling of VPN traffic by the affected device. An attacker could exploit this vulnerability by sending crafted VPN traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to hang or crash, resulting in a DoS condition. Cisco Bug IDs: CSCvd39267. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0151 | CRITICAL 9.8 | Cisco | IOS and IOS XE Software | Mar 3, 2022 | Mar 17, 2022 | Unknown | A vulnerability in the quality of service (QoS) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges. The vulnerability is due to incorrect bounds checking of certain values in packets that are destined for UDP port 18999 of an affected device. An attacker could exploit this vulnerability by sending malicious packets to an affected device. When the packets are processed, an exploitable buffer overflow condition may occur. A successful exploit could allow the attacker to execute arbitrary code on the affected device with elevated privileges. The attacker could also leverage this vulnerability to cause the device to reload, causing a temporary DoS condition while the device is reloading. The malicious packets must be destined to and processed by an affected device. Traffic transiting a device will not trigger the vulnerability. Cisco Bug IDs: CSCvf73881. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-8540 | HIGH 7.8 | Microsoft | Malware Protection Engine | Mar 3, 2022 | Mar 24, 2022 | Unknown | The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability", a different vulnerability than CVE-2017-8538 and CVE-2017-8541. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-6744 | HIGH 8.8 | Cisco | IOS software | Mar 3, 2022 | Mar 24, 2022 | Unknown | The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. There are workarounds that address these vulnerabilities. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-6743 | HIGH 8.8 | Cisco | IOS and IOS XE Software | Mar 3, 2022 | Mar 24, 2022 | Unknown | The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. There are workarounds that address these vulnerabilities. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-6740 | HIGH 8.8 | Cisco | IOS and IOS XE Software | Mar 3, 2022 | Mar 24, 2022 | Unknown | The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. There are workarounds that address these vulnerabilities. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-6739 | HIGH 8.8 | Cisco | IOS and IOS XE Software | Mar 3, 2022 | Mar 24, 2022 | Unknown | A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device. The vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system. Only traffic directed to the affected system can be used to exploit this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-6738 | HIGH 8.8 | Cisco | IOS and IOS XE Software | Mar 3, 2022 | Mar 24, 2022 | Unknown | The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. There are workarounds that address these vulnerabilities. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-6737 | HIGH 8.8 | Cisco | IOS and IOS XE Software | Mar 3, 2022 | Mar 24, 2022 | Unknown | A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device. The vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system. Only traffic directed to the affected system can be used to exploit this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-6736 | HIGH 8.8 | Cisco | IOS and IOS XE Software | Mar 3, 2022 | Mar 24, 2022 | Unknown | The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. There are workarounds that address these vulnerabilities. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-6663 | MEDIUM 6.5 | Cisco | IOS and IOS XE Software | Mar 3, 2022 | Mar 24, 2022 | Unknown | A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in a denial of service (DoS) condition. More Information: CSCvd88936. Known Affected Releases: Denali-16.2.1 Denali-16.3.1. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-6627 | HIGH 7.5 | Cisco | IOS and IOS XE Software | Mar 3, 2022 | Mar 24, 2022 | Unknown | A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 through 3.18 could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle without closing them. An attacker could exploit this vulnerability by sending UDP packets with a destination port of 0 to an affected device. A successful exploit could allow the attacker to cause UDP packets to be held in the input interfaces queue, resulting in a DoS condition. The input interface queue will stop holding UDP packets when it receives 250 packets. Cisco Bug IDs: CSCup10024, CSCva55744, CSCva95506. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-12319 | MEDIUM 5.9 | Cisco | IOS XE Software | Mar 3, 2022 | Mar 24, 2022 | Unknown | A vulnerability in the Border Gateway Protocol (BGP) over an Ethernet Virtual Private Network (EVPN) for Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial of service (DoS) condition, or potentially corrupt the BGP routing table, which could result in network instability. The vulnerability exists due to changes in the implementation of the BGP MPLS-Based Ethernet VPN RFC (RFC 7432) draft between IOS XE software releases. When the BGP Inclusive Multicast Ethernet Tag Route or BGP EVPN MAC/IP Advertisement Route update packet is received, it could be possible that the IP address length field is miscalculated. An attacker could exploit this vulnerability by sending a crafted BGP packet to an affected device after the BGP session was established. An exploit could allow the attacker to cause the affected device to reload or corrupt the BGP routing table; either outcome would result in a DoS. The vulnerability may be triggered when the router receives a crafted BGP message from a peer on an existing BGP session. This vulnerability affects all releases of Cisco IOS XE Software prior to software release 16.3 that support BGP EVPN configurations. If the device is not configured for EVPN, it is not vulnerable. Cisco Bug IDs: CSCui67191, CSCvg52875. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-12240 | CRITICAL 9.8 | Cisco | IOS and IOS XE Software | Mar 3, 2022 | Mar 24, 2022 | Unknown | The DHCP relay subsystem of Cisco IOS 12.2 through 15.6 and Cisco IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code and gain full control of an affected system. The attacker could also cause an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a buffer overflow condition in the DHCP relay subsystem of the affected software. An attacker could exploit this vulnerability by sending a crafted DHCP Version 4 (DHCPv4) packet to an affected system. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a DoS condition. Cisco Bug IDs: CSCsm45390, CSCuw77959. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-12238 | MEDIUM 6.5 | Cisco | Catalyst 6800 Series Switches | Mar 3, 2022 | Mar 24, 2022 | Unknown | A vulnerability in the Virtual Private LAN Service (VPLS) code of Cisco IOS 15.0 through 15.4 for Cisco Catalyst 6800 Series Switches could allow an unauthenticated, adjacent attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a denial of service (DoS) condition. The vulnerability is due to a memory management issue in the affected software. An attacker could exploit this vulnerability by creating a large number of VPLS-generated MAC entries in the MAC address table of an affected device. A successful exploit could allow the attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a DoS condition. This vulnerability affects Cisco Catalyst 6800 Series Switches that are running a vulnerable release of Cisco IOS Software and have a Cisco C6800-16P10G or C6800-16P10G-XL line card in use with Supervisor Engine 6T. To be vulnerable, the device must also be configured with VPLS and the C6800-16P10G or C6800-16P10G-XL line card needs to be the core-facing MPLS interfaces. Cisco Bug IDs: CSCva61927. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-12237 | HIGH 7.5 | Cisco | IOS and IOS XE Software | Mar 3, 2022 | Mar 24, 2022 | Unknown | A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-12235 | HIGH 7.5 | Cisco | IOS software | Mar 3, 2022 | Mar 24, 2022 | Unknown | A vulnerability in the implementation of the PROFINET Discovery and Configuration Protocol (PN-DCP) for Cisco IOS 12.2 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper parsing of ingress PN-DCP Identify Request packets destined to an affected device. An attacker could exploit this vulnerability by sending a crafted PN-DCP Identify Request packet to an affected device and then continuing to send normal PN-DCP Identify Request packets to the device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are configured to process PROFINET messages. Beginning with Cisco IOS Software Release 12.2(52)SE, PROFINET is enabled by default on all the base switch module and expansion-unit Ethernet ports. Cisco Bug IDs: CSCuz47179. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-12234 | HIGH 7.5 | Cisco | IOS software | Mar 3, 2022 | Mar 24, 2022 | Unknown | Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc43709. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-12233 | HIGH 7.5 | Cisco | IOS software | Mar 3, 2022 | Mar 24, 2022 | Unknown | Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuz95334. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-12232 | MEDIUM 6.5 | Cisco | IOS software | Mar 3, 2022 | Mar 24, 2022 | Unknown | A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-12231 | HIGH 7.5 | Cisco | IOS software | Mar 3, 2022 | Mar 24, 2022 | Unknown | A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper translation of H.323 messages that use the Registration, Admission, and Status (RAS) protocol and are sent to an affected device via IPv4 packets. An attacker could exploit this vulnerability by sending a crafted H.323 RAS packet through an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are configured to use an application layer gateway with NAT (NAT ALG) for H.323 RAS messages. By default, a NAT ALG is enabled for H.323 RAS messages. Cisco Bug IDs: CSCvc57217. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-11826 | HIGH 7.8 | Microsoft | Office | Mar 3, 2022 | Mar 24, 2022 | Unknown | Microsoft Office 2010, SharePoint Enterprise Server 2010, SharePoint Server 2010, Web Applications, Office Web Apps Server 2010 and 2013, Word Viewer, Word 2007, 2010, 2013 and 2016, Word Automation Services, and Office Online Server allow remote code execution when the software fails to properly handle objects in memory. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-11292 | HIGH 8.8 | Adobe | Flash Player | Mar 3, 2022 | Mar 24, 2022 | Unknown | Adobe Flash Player version 27.0.0.159 and earlier has a flawed bytecode verification procedure, which allows for an untrusted value to be used in the calculation of an array index. This can lead to type confusion, and successful exploitation could lead to arbitrary code execution. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2017-0261 | HIGH 7.8 | Microsoft | Office | Mar 3, 2022 | Mar 24, 2022 | Unknown | Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0262 and CVE-2017-0281. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0001 | HIGH 7.8 | Microsoft | Graphics Device Interface (GDI) | Mar 3, 2022 | Mar 24, 2022 | Unknown | The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka "Windows GDI Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0005, CVE-2017-0025, and CVE-2017-0047. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-8562 | HIGH 7.5 | Siemens | SIMATIC CP | Mar 3, 2022 | Mar 24, 2022 | Unknown | A vulnerability has been identified in SIMATIC CP 1543-1 (All versions < V2.0.28), SIPLUS NET CP 1543-1 (All versions < V2.0.28). Under special conditions it was possible to write SNMP variables on port 161/udp which should be read-only and should only be configured with TIA-Portal. A write to these variables could reduce the availability or cause a denial-of-service. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-7855 | HIGH 8.8 | Adobe | Flash Player | Mar 3, 2022 | Mar 24, 2022 | Unknown | Use-after-free vulnerability in Adobe Flash Player before 23.0.0.205 on Windows and OS X and before 11.2.202.643 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in October 2016. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2016-7262 | HIGH 7.8 | Microsoft | Excel | Mar 3, 2022 | Mar 24, 2022 | Unknown | Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, and Excel Viewer allow user-assisted remote attackers to execute arbitrary commands via a crafted cell that is mishandled upon a click, aka "Microsoft Office Security Feature Bypass Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-7193 | HIGH 7.8 | Microsoft | Office | Mar 3, 2022 | Mar 24, 2022 | Unknown | Microsoft Word 2007 SP2, Office 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-5195 | HIGH 7.0 | Linux | Kernel | Mar 3, 2022 | Mar 24, 2022 | Unknown | Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW." Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-4117 | CRITICAL 9.8 | Adobe | Flash Player | Mar 3, 2022 | Mar 24, 2022 | Unknown | Adobe Flash Player 21.0.0.226 and earlier allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in May 2016. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2016-1019 | CRITICAL 9.8 | Adobe | Flash Player | Mar 3, 2022 | Mar 24, 2022 | Known | Adobe Flash Player 21.0.0.197 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, as exploited in the wild in April 2016. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2016-0099 | HIGH 7.8 | Microsoft | Windows | Mar 3, 2022 | Mar 24, 2022 | Known | The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka "Secondary Logon Elevation of Privilege Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-7645 | HIGH 7.8 | Adobe | Flash Player | Mar 3, 2022 | Mar 24, 2022 | Known | Adobe Flash Player 18.x through 18.0.0.252 and 19.x through 19.0.0.207 on Windows and OS X and 11.x through 11.2.202.535 on Linux allows remote attackers to execute arbitrary code via a crafted SWF file, as exploited in the wild in October 2015. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2015-5119 | CRITICAL 9.8 | Adobe | Flash Player | Mar 3, 2022 | Mar 24, 2022 | Unknown | Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.296 and 14.x through 18.0.0.194 on Windows and OS X and 11.x through 11.2.202.468 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2015-4902 | MEDIUM 5.3 | Oracle | Java SE | Mar 3, 2022 | Mar 24, 2022 | Unknown | Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60 allows remote attackers to affect integrity via unknown vectors related to Deployment. Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-3043 | CRITICAL 9.8 | Adobe | Flash Player | Mar 3, 2022 | Mar 24, 2022 | Unknown | Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in April 2015, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3042. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2015-2590 | CRITICAL 9.8 | Oracle | Java SE | Mar 3, 2022 | Mar 24, 2022 | Unknown | Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732. Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-2545 | HIGH 7.8 | Microsoft | Office | Mar 3, 2022 | Mar 24, 2022 | Unknown | Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2013 RT SP1 allows remote attackers to execute arbitrary code via a crafted EPS image, aka "Microsoft Office Malformed EPS File Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-2424 | HIGH 8.8 | Microsoft | PowerPoint | Mar 3, 2022 | Mar 24, 2022 | Unknown | Microsoft PowerPoint 2007 SP3, Word 2007 SP3, PowerPoint 2010 SP2, Word 2010 SP2, PowerPoint 2013 SP1, Word 2013 SP1, and PowerPoint 2013 RT SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-2387 | HIGH 7.8 | Microsoft | ATM Font Driver | Mar 3, 2022 | Mar 24, 2022 | Unknown | ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "ATMFD.DLL Memory Corruption Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-1701 | HIGH 7.8 | Microsoft | Win32k | Mar 3, 2022 | Mar 24, 2022 | Known | Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-1642 | HIGH 7.8 | Microsoft | Office | Mar 3, 2022 | Mar 24, 2022 | Unknown | Microsoft Office 2007 SP3, 2010 SP2, and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-4114 | HIGH 7.8 | Microsoft | Windows | Mar 3, 2022 | Mar 24, 2022 | Unknown | Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a "Sandworm" attack in June through October 2014, aka "Windows OLE Remote Code Execution Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-0496 | HIGH 8.8 | Adobe | Reader and Acrobat | Mar 3, 2022 | Mar 24, 2022 | Unknown | Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.9 and 11.x before 11.0.06 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-5065 | HIGH 7.8 | Microsoft | Windows | Mar 3, 2022 | Mar 24, 2022 | Unknown | NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in November 2013. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-3897 | HIGH 8.8 | Microsoft | Internet Explorer | Mar 3, 2022 | Mar 24, 2022 | Unknown | Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploited in the wild in September and October 2013, aka "Internet Explorer Memory Corruption Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-3346 | CRITICAL 9.8 | Adobe | Reader and Acrobat | Mar 3, 2022 | Mar 24, 2022 | Unknown | Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-1675 | MEDIUM 6.5 | Mozilla | Firefox | Mar 3, 2022 | Mar 24, 2022 | Unknown | Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 do not properly initialize data structures for the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions, which allows remote attackers to obtain sensitive information from process memory via a crafted web site. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-1347 | HIGH 8.8 | Microsoft | Internet Explorer | Mar 3, 2022 | Mar 24, 2022 | Unknown | Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-0641 | HIGH 7.8 | Adobe | Reader | Mar 3, 2022 | Mar 24, 2022 | Unknown | Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allows remote attackers to execute arbitrary code via a crafted PDF document, as exploited in the wild in February 2013. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-0640 | HIGH 7.8 | Adobe | Reader and Acrobat | Mar 3, 2022 | Mar 24, 2022 | Unknown | Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, as exploited in the wild in February 2013. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-0632 | CRITICAL 9.8 | Adobe | ColdFusion | Mar 3, 2022 | Mar 24, 2022 | Unknown | administrator.cfc in Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote attackers to bypass authentication and possibly execute arbitrary code by logging in to the RDS component using the default empty password and leveraging this session to access the administrative web interface, as exploited in the wild in January 2013. Required action: Apply updates per vendor instructions. | Open |
| CVE-2012-4681 | CRITICAL 9.8 | Oracle | Java SE | Mar 3, 2022 | Mar 24, 2022 | Known | Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class. Required action: Apply updates per vendor instructions. | Open |
| CVE-2012-1856 | HIGH 8.8 | Microsoft | Office | Mar 3, 2022 | Mar 24, 2022 | Unknown | The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka "MSCOMCTL.OCX RCE Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2012-1723 | CRITICAL 9.8 | Oracle | Java SE | Mar 3, 2022 | Mar 24, 2022 | Known | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot. Required action: Apply updates per vendor instructions. | Open |
| CVE-2012-1535 | HIGH 7.8 | Adobe | Flash Player | Mar 3, 2022 | Mar 24, 2022 | Unknown | Unspecified vulnerability in Adobe Flash Player before 11.3.300.271 on Windows and Mac OS X and before 11.2.202.238 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted SWF content, as exploited in the wild in August 2012 with SWF content in a Word document. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2012-0507 | CRITICAL 9.8 | Oracle | Java SE | Mar 3, 2022 | Mar 24, 2022 | Known | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue. Required action: Apply updates per vendor instructions. | Open |
| CVE-2011-3544 | CRITICAL 9.8 | Oracle | Java SE JDK and JRE | Mar 3, 2022 | Mar 24, 2022 | Unknown | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting. Required action: Apply updates per vendor instructions. | Open |
| CVE-2011-1889 | CRITICAL 9.8 | Microsoft | Forefront Threat Management Gateway (TMG) | Mar 3, 2022 | Mar 24, 2022 | Unknown | The NSPLookupServiceNext function in the client in Microsoft Forefront Threat Management Gateway (TMG) 2010 allows remote attackers to execute arbitrary code via vectors involving unspecified requests, aka "TMG Firewall Client Memory Corruption Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2011-0611 | HIGH 8.8 | Adobe | Flash Player | Mar 3, 2022 | Mar 24, 2022 | Unknown | Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2010-3333 | HIGH 7.8 | Microsoft | Office | Mar 3, 2022 | Mar 24, 2022 | Unknown | Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-0232 | HIGH 7.8 | Microsoft | Windows | Mar 3, 2022 | Mar 24, 2022 | Unknown | The kernel in Microsoft Windows NT 3.1 through Windows 7, including Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, when access to 16-bit applications is enabled on a 32-bit x86 platform, does not properly validate certain BIOS calls, which allows local users to gain privileges by crafting a VDM_TIB data structure in the Thread Environment Block (TEB), and then calling the NtVdmControl function to start the Windows Virtual DOS Machine (aka NTVDM) subsystem, leading to improperly handled exceptions involving the #GP trap handler (nt!KiTrap0D), aka "Windows Kernel Exception Handler Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-0188 | HIGH 7.8 | Adobe | Reader and Acrobat | Mar 3, 2022 | Mar 24, 2022 | Known | Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. Required action: Apply updates per vendor instructions. | Open |
| CVE-2009-3129 | HIGH 7.8 | Microsoft | Excel | Mar 3, 2022 | Mar 24, 2022 | Unknown | Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset, aka "Excel Featheader Record Memory Corruption Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2009-1123 | HIGH 7.8 | Microsoft | Windows | Mar 3, 2022 | Mar 24, 2022 | Unknown | The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Desktop Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2008-3431 | HIGH 8.8 | Oracle | VirtualBox | Mar 3, 2022 | Mar 24, 2022 | Unknown | The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to gain privileges by opening the \\.\VBoxDrv device and calling DeviceIoControl to send a crafted kernel address. Required action: Apply updates per vendor instructions. | Open |
| CVE-2008-2992 | HIGH 7.8 | Adobe | Acrobat and Reader | Mar 3, 2022 | Mar 24, 2022 | Known | Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104. Required action: Apply updates per vendor instructions. | Open |
| CVE-2004-0210 | HIGH 7.8 | Microsoft | Windows | Mar 3, 2022 | Mar 24, 2022 | Unknown | The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow. Required action: Apply updates per vendor instructions. | Open |
| CVE-2002-0367 | HIGH 7.8 | Microsoft | Windows | Mar 3, 2022 | Mar 24, 2022 | Unknown | smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-24682 | MEDIUM 6.1 | Synacor | Zimbra Collaborate Suite (ZCS) | Feb 25, 2022 | Mar 11, 2022 | Known | An issue was discovered in the Calendar feature in Zimbra Collaboration Suite 8.8.x before 8.8.15 patch 30 (update 1), as exploited in the wild starting in December 2021. An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-8570 | HIGH 7.8 | Microsoft | Office | Feb 25, 2022 | Aug 25, 2022 | Unknown | Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0243. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0222 | HIGH 8.8 | Microsoft | Internet Explorer | Feb 25, 2022 | Aug 25, 2022 | Unknown | A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0226. Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-6352 | HIGH 7.8 | Microsoft | Windows | Feb 25, 2022 | Aug 25, 2022 | Unknown | Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object, as exploited in the wild in October 2014 with a crafted PowerPoint document. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-23131 | CRITICAL 9.1 | Zabbix | Frontend | Feb 22, 2022 | Mar 8, 2022 | Unknown | In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default). Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-23134 | LOW 3.7 | Zabbix | Frontend | Feb 22, 2022 | Mar 8, 2022 | Unknown | After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-24086 | CRITICAL 9.8 | Adobe | Commerce and Magento Open Source | Feb 15, 2022 | Mar 1, 2022 | Unknown | Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-0609 | HIGH 8.8 | Chromium Animation | Feb 15, 2022 | Mar 1, 2022 | Unknown | Use after free in Animation in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2019-0752 | HIGH 7.5 | Microsoft | Internet Explorer | Feb 15, 2022 | Aug 15, 2022 | Known | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0739, CVE-2019-0753, CVE-2019-0862. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-8174 | HIGH 7.5 | Microsoft | Windows | Feb 15, 2022 | Aug 15, 2022 | Known | A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-20250 | HIGH 7.8 | RARLAB | WinRAR | Feb 15, 2022 | Aug 15, 2022 | Known | In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-15982 | HIGH 7.8 | Adobe | Flash Player | Feb 15, 2022 | Aug 15, 2022 | Known | Flash Player versions 31.0.0.153 and earlier, and 31.0.0.108 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2017-9841 | CRITICAL 9.8 | PHPUnit | PHPUnit | Feb 15, 2022 | Aug 15, 2022 | Unknown | Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI. Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-1761 | HIGH 7.8 | Microsoft | Word | Feb 15, 2022 | Aug 15, 2022 | Unknown | Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-3906 | HIGH 7.8 | Microsoft | Graphics Component | Feb 15, 2022 | Aug 15, 2022 | Unknown | GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-22620 | HIGH 8.8 | Apple | iOS, iPadOS, and macOS | Feb 11, 2022 | Feb 25, 2022 | Unknown | A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-36934 | HIGH 7.8 | Microsoft | Windows | Feb 10, 2022 | Feb 24, 2022 | Unknown | <p>An elevation of privilege vulnerability exists because of overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>An attacker must have the ability to execute code on a victim system to exploit this vulnerability.</p> <p>After installing this security update, you <em>must</em> manually delete all shadow copies of system files, including the SAM database, to fully mitigate this vulnerabilty. <strong>Simply installing this security update will not fully mitigate this vulnerability.</strong> See <a href="https://support.microsoft.com/topic/1ceaa637-aaa3-4b58-a48b-baf72a2fa9e7">KB5005357- Delete Volume Shadow Copies</a>.</p> Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-0796 | CRITICAL 10.0 | Microsoft | SMBv3 | Feb 10, 2022 | Aug 10, 2022 | Known | A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-1000861 | CRITICAL 9.8 | Jenkins | Jenkins Stapler Web Framework | Feb 10, 2022 | Aug 10, 2022 | Unknown | A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-9791 | CRITICAL 9.8 | Apache | Struts 1 | Feb 10, 2022 | Aug 10, 2022 | Unknown | The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-8464 | HIGH 8.8 | Microsoft | Windows | Feb 10, 2022 | Aug 10, 2022 | Unknown | Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows local users or remote attackers to execute arbitrary code via a crafted .LNK file, which is not properly handled during icon display in Windows Explorer or any other application that parses the icon of the shortcut. aka "LNK Remote Code Execution Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-10271 | HIGH 7.5 | Oracle | WebLogic Server | Feb 10, 2022 | Aug 10, 2022 | Known | Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0263 | HIGH 7.8 | Microsoft | Win32k | Feb 10, 2022 | Aug 10, 2022 | Unknown | The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0262 | HIGH 7.8 | Microsoft | Office | Feb 10, 2022 | Aug 10, 2022 | Unknown | Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0261 and CVE-2017-0281. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0145 | HIGH 8.8 | Microsoft | SMBv1 | Feb 10, 2022 | Aug 10, 2022 | Known | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0146, and CVE-2017-0148. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0144 | HIGH 8.8 | Microsoft | SMBv1 | Feb 10, 2022 | Aug 10, 2022 | Known | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-3088 | CRITICAL 9.8 | Apache | ActiveMQ | Feb 10, 2022 | Aug 10, 2022 | Unknown | The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request. Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-2051 | CRITICAL 9.8 | D-Link | DIR-645 Router | Feb 10, 2022 | Aug 10, 2022 | Unknown | The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2015-1635 | CRITICAL 9.8 | Microsoft | HTTP.sys | Feb 10, 2022 | Aug 10, 2022 | Unknown | HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-1130 | HIGH 7.8 | Apple | OS X | Feb 10, 2022 | Aug 10, 2022 | Unknown | The XPC implementation in Admin Framework in Apple OS X before 10.10.3 allows local users to bypass authentication and obtain admin privileges via unspecified vectors. Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-4404 | HIGH 7.8 | Apple | OS X | Feb 10, 2022 | Aug 10, 2022 | Unknown | Heap-based buffer overflow in IOHIDFamily in Apple iOS before 8 and Apple TV before 7 allows attackers to execute arbitrary code in a privileged context via an application that provides crafted key-mapping properties. Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-21882 | HIGH 7.0 | Microsoft | Win32k | Feb 4, 2022 | Feb 18, 2022 | Unknown | Win32k Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2022-22587 | CRITICAL 9.8 | Apple | iOS and macOS | Jan 28, 2022 | Feb 11, 2022 | Unknown | A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, macOS Big Sur 11.6.3, macOS Monterey 12.2. A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-20038 | CRITICAL 9.8 | SonicWall | SMA 100 Appliances | Jan 28, 2022 | Feb 11, 2022 | Known | A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-5722 | CRITICAL 9.8 | Grandstream | UCM6200 | Jan 28, 2022 | Jul 28, 2022 | Unknown | The HTTP interface of the Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. An attacker can use this vulnerability to execute shell commands as root on versions before 1.0.19.20 or inject HTML in password recovery emails in versions before 1.0.20.17. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-0787 | HIGH 7.8 | Microsoft | Windows | Jan 28, 2022 | Jul 28, 2022 | Known | An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-5689 | CRITICAL 9.8 | Intel | Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageability | Jan 28, 2022 | Jul 28, 2022 | Unknown | An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT). Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-1776 | CRITICAL 9.8 | Microsoft | Internet Explorer | Jan 28, 2022 | Jul 28, 2022 | Unknown | Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that "VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks." Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-6271 | CRITICAL 9.8 | GNU | Bourne-Again Shell (Bash) | Jan 28, 2022 | Jul 28, 2022 | Unknown | GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix. Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-7169 | CRITICAL 9.8 | GNU | Bourne-Again Shell (Bash) | Jan 28, 2022 | Jul 28, 2022 | Unknown | GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271. Required action: Apply updates per vendor instructions. | Open |
| CVE-2006-1547 | HIGH 7.5 | Apache | Struts 1 | Jan 21, 2022 | Jul 21, 2022 | Unknown | ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils. Required action: Apply updates per vendor instructions. | Open |
| CVE-2012-0391 | CRITICAL 9.8 | Apache | Struts 2 | Jan 21, 2022 | Jul 21, 2022 | Unknown | The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-8453 | HIGH 7.8 | Microsoft | Win32k | Jan 21, 2022 | Jul 21, 2022 | Known | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-35247 | MEDIUM 4.3 | SolarWinds | Serv-U | Jan 21, 2022 | Feb 4, 2022 | Unknown | Serv-U web login screen to LDAP authentication was allowing characters that were not sufficiently sanitized. SolarWinds has updated the input mechanism to perform additional validation and sanitization. Please Note: No downstream affect has been detected as the LDAP servers ignored improper characters. To insure proper input validation is completed in all environments. SolarWinds recommends scheduling an update to the latest version of Serv-U. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-32648 | HIGH 8.2 | October CMS | October CMS | Jan 18, 2022 | Feb 1, 2022 | Unknown | octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-25296 | HIGH 8.8 | Nagios | Nagios XI | Jan 18, 2022 | Feb 1, 2022 | Unknown | Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-25297 | HIGH 8.8 | Nagios | Nagios XI | Jan 18, 2022 | Feb 1, 2022 | Unknown | Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/switch/switch.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-25298 | HIGH 8.8 | Nagios | Nagios XI | Jan 18, 2022 | Feb 1, 2022 | Unknown | Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/cloud-vm/cloud-vm.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-40870 | CRITICAL 9.8 | Aviatrix | Aviatrix Controller | Jan 18, 2022 | Feb 1, 2022 | Unknown | An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file with a dangerous type is possible, which allows an unauthenticated user to execute arbitrary code via directory traversal. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-33766 | HIGH 7.3 | Microsoft | Exchange Server | Jan 18, 2022 | Feb 1, 2022 | Unknown | Microsoft Exchange Server Information Disclosure Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-21975 | HIGH 7.5 | VMware | vRealize Operations Manager API | Jan 18, 2022 | Feb 1, 2022 | Known | Server Side Request Forgery in vRealize Operations Manager API (CVE-2021-21975) prior to 8.4 may allow a malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack to steal administrative credentials. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-21315 | HIGH 7.1 | Npm package | System Information Library for Node.JS | Jan 18, 2022 | Feb 1, 2022 | Unknown | The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-22991 | CRITICAL 9.8 | F5 | BIG-IP Traffic Management Microkernel | Jan 18, 2022 | Feb 1, 2022 | Unknown | On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3, undisclosed requests to a virtual server may be incorrectly handled by the Traffic Management Microkernel (TMM) URI normalization, which may trigger a buffer overflow, resulting in a DoS attack. In certain situations, it may theoretically allow bypass of URL based access control or remote code execution (RCE). Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-14864 | HIGH 7.5 | Oracle | Intelligence Enterprise Edition | Jan 18, 2022 | Jul 18, 2022 | Unknown | Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Installation). Supported versions that are affected are 5.5.0.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-13671 | HIGH 8.8 | Drupal | Drupal core | Jan 18, 2022 | Jul 18, 2022 | Unknown | Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-11978 | HIGH 8.8 | Apache | Airflow | Jan 18, 2022 | Jul 18, 2022 | Unknown | An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-13927 | CRITICAL 9.8 | Apache | Airflow's Experimental API | Jan 18, 2022 | Jul 18, 2022 | Unknown | The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-22017 | MEDIUM 5.3 | VMware | vCenter Server | Jan 10, 2022 | Jan 24, 2022 | Unknown | Rhttproxy as used in vCenter Server contains a vulnerability due to improper implementation of URI normalization. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to bypass proxy leading to internal endpoints being accessed. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-36260 | CRITICAL 9.8 | Hikvision | Security cameras web server | Jan 10, 2022 | Jan 24, 2022 | Unknown | A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-6572 | HIGH 8.8 | Chrome Media | Jan 10, 2022 | Jul 10, 2022 | Unknown | Use after free in Media in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to execute arbitrary code via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2019-1458 | HIGH 7.8 | Microsoft | Win32k | Jan 10, 2022 | Jul 10, 2022 | Known | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2013-3900 | MEDIUM 5.5 | Microsoft | WinVerifyTrust function | Jan 10, 2022 | Jul 10, 2022 | Unknown | Why is Microsoft republishing a CVE from 2013? We are republishing CVE-2013-3900 in the Security Update Guide to update the Security Updates table and to inform customers that the EnableCertPaddingCheck is available in all currently supported versions of Windows 10 and Windows 11. While the format is different from the original CVE published in 2013, except for clarifications about how to configure the EnableCertPaddingCheck registry value, the information herein remains unchanged from the original text published on December 10, 2013, Microsoft does not plan to enforce the stricter verification behavior as a default functionality on supported releases of Microsoft Windows. This behavior remains available as an opt-in feature via reg key setting, and is available on supported editions of Windows released since December 10, 2013. This includes all currently supported versions of Windows 10 and Windows 11. The supporting code for this reg key was incorporated at the time of release for Windows 10 and Windows 11, so no security update is required; however, the reg key must be set. See the Security Updates table for the list of affected software. Vulnerability Description A remote code execution vulnerability exists in the way that the WinVerifyTrust function handles Windows Authenticode signature verification for portable executable (PE) files. An anonymous attacker could exploit the vulnerability by modifying an existing signed executable file to leverage unverified portions of the file in such a way as to add malicious code to the file without invalidating the signature. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of this vulnerability requires that a user or application run or install a specially crafted, signed PE file. An attacker could modify an... See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900 Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-2725 | CRITICAL 9.8 | Oracle | WebLogic Server | Jan 10, 2022 | Jul 10, 2022 | Known | Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-9670 | CRITICAL 9.8 | Synacor | Zimbra Collaboration Suite (ZCS) | Jan 10, 2022 | Jul 10, 2022 | Unknown | mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML External Entity injection (XXE) vulnerability, as demonstrated by Autodiscover/Autodiscover.xml. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-13382 | CRITICAL 9.1 | Fortinet | FortiOS and FortiProxy | Jan 10, 2022 | Jul 10, 2022 | Known | An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-13383 | MEDIUM 4.3 | Fortinet | FortiOS and FortiProxy | Jan 10, 2022 | Jul 10, 2022 | Known | A heap buffer overflow in Fortinet FortiOS 6.0.0 through 6.0.4, 5.6.0 through 5.6.10, 5.4.0 through 5.4.12, 5.2.14 and earlier and FortiProxy 2.0.0, 1.2.8 and earlier in the SSL VPN web portal may cause the SSL VPN web service termination for logged in users due to a failure to properly handle javascript href data when proxying webpages. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1579 | HIGH 8.1 | Palo Alto Networks | PAN-OS | Jan 10, 2022 | Jul 10, 2022 | Known | Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and PAN-OS 8.1.2 and earlier with GlobalProtect Portal or GlobalProtect Gateway Interface enabled may allow an unauthenticated remote attacker to execute arbitrary code. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-10149 | CRITICAL 9.8 | Exim | Mail Transfer Agent (MTA) | Jan 10, 2022 | Jul 10, 2022 | Unknown | A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-7450 | CRITICAL 9.8 | IBM | WebSphere Application Server and Server Hypervisor Edition | Jan 10, 2022 | Jul 10, 2022 | Unknown | Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-1000486 | CRITICAL 9.8 | Primetek | Primefaces Application | Jan 10, 2022 | Jul 10, 2022 | Unknown | Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-7609 | CRITICAL 10.0 | Elastic | Kibana | Jan 10, 2022 | Jul 10, 2022 | Unknown | Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-27860 | CRITICAL 9.8 | FatPipe | WARP, IPVPN, and MPVPN software | Jan 10, 2022 | Jan 24, 2022 | Unknown | A vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p92 and 10.2.2r44p1 allows a remote, unauthenticated attacker to upload a file to any location on the filesystem. The FatPipe advisory identifier for this vulnerability is FPSA006. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-43890 | HIGH 7.1 | Microsoft | Windows | Dec 15, 2021 | Dec 29, 2021 | Known | We have investigated reports of a spoofing vulnerability in AppX installer that affects Microsoft Windows. Microsoft is aware of attacks that attempt to exploit this vulnerability by using specially crafted packages that include the malware family known as Emotet/Trickbot/Bazaloader. An attacker could craft a malicious attachment to be used in phishing campaigns. The attacker would then have to convince the user to open the specially crafted attachment. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Please see the Security Updates table for the link to the updated app. Alternatively you can download and install the Installer using the links provided in the FAQ section. Please see the Mitigations and Workaround sections for important information about steps you can take to protect your system from this vulnerability. December 27 2023 Update: In recent months, Microsoft Threat Intelligence has seen an increase in activity from threat actors leveraging social engineering and phishing techniques to target Windows OS users and utilizing the ms-appinstaller URI scheme. To address this increase in activity, we have updated the App Installer to disable the ms-appinstaller protocol by default and recommend other potential mitigations. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-4102 | HIGH 8.8 | Chromium V8 | Dec 15, 2021 | Dec 29, 2021 | Unknown | Use after free in V8 in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-44515 | CRITICAL 9.8 | Zoho | Desktop Central | Dec 10, 2021 | Dec 24, 2021 | Unknown | Zoho ManageEngine Desktop Central is vulnerable to authentication bypass, leading to remote code execution on the server, as exploited in the wild in December 2021. For Enterprise builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For Enterprise builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3. For MSP builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For MSP builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-13272 | HIGH 7.8 | Linux | Kernel | Dec 10, 2021 | Jun 10, 2022 | Unknown | In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-35394 | CRITICAL 9.8 | Realtek | Jungle Software Development Kit (SDK) | Dec 10, 2021 | Dec 24, 2021 | Unknown | Realtek Jungle SDK version v2.x up to v3.4.14B provides a diagnostic tool called 'MP Daemon' that is usually compiled as 'UDPServer' binary. The binary is affected by multiple memory corruption vulnerabilities and an arbitrary command injection vulnerability that can be exploited by remote unauthenticated attackers. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-7238 | CRITICAL 9.8 | Sonatype | Nexus Repository Manager | Dec 10, 2021 | Jun 10, 2022 | Unknown | Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-0193 | HIGH 7.2 | Apache | Solr | Dec 10, 2021 | Jun 10, 2022 | Unknown | In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-44168 | LOW 3.3 | Fortinet | FortiOS | Dec 10, 2021 | Dec 24, 2021 | Unknown | A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3 may allow a local authenticated attacker to download arbitrary files on the device via specially crafted update packages. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-17562 | HIGH 8.1 | Embedthis | GoAhead | Dec 10, 2021 | Jun 10, 2022 | Unknown | Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-12149 | CRITICAL 9.8 | Red Hat | JBoss Application Server | Dec 10, 2021 | Jun 10, 2022 | Known | In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data. Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-1871 | HIGH 8.8 | Red Hat | JBoss Seam 2 | Dec 10, 2021 | Jun 10, 2022 | Unknown | JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-17463 | CRITICAL 9.8 | Fuel CMS | Fuel CMS | Dec 10, 2021 | Jun 10, 2022 | Unknown | FUEL CMS 1.4.7 allows SQL Injection via the col parameter to /pages/items, /permissions/items, or /navigation/items. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-8816 | HIGH 7.2 | Pi-hole | AdminLTE | Dec 10, 2021 | Jun 10, 2022 | Unknown | Pi-hole Web v4.3.2 (aka AdminLTE) allows Remote Code Execution by privileged dashboard users via a crafted DHCP static lease. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-10758 | CRITICAL 9.9 | MongoDB | mongo-express | Dec 10, 2021 | Jun 10, 2022 | Unknown | mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints that uses the `toBSON` method. A misuse of the `vm` dependency to perform `exec` commands in a non-safe environment. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-44228 | CRITICAL 10.0 | Apache | Log4j2 | Dec 10, 2021 | Dec 24, 2021 | Known | Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. Required action: For all affected software assets for which updates exist, the only acceptable remediation actions are: 1) Apply updates; OR 2) remove affected assets from agency networks. Temporary mitigations using one of the measures provided at https://www.cisa.gov/uscert/ed-22-02-apache-log4j-recommended-mitigation-measures are only acceptable until updates are available. | Open |
| CVE-2020-11261 | HIGH 7.8 | Qualcomm | Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | Dec 1, 2021 | Jun 1, 2022 | Unknown | Memory corruption due to improper check to return error when user application requests memory allocation of a huge size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-14847 | CRITICAL 9.1 | MikroTik | RouterOS | Dec 1, 2021 | Jun 1, 2022 | Unknown | MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-37415 | CRITICAL 9.8 | Zoho | ManageEngine ServiceDesk Plus (SDP) | Dec 1, 2021 | Dec 15, 2021 | Unknown | Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-40438 | CRITICAL 9.0 | Apache | Apache | Dec 1, 2021 | Dec 15, 2021 | Unknown | A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-44077 | CRITICAL 9.8 | Zoho | ManageEngine ServiceDesk Plus (SDP) / SupportCenter Plus | Dec 1, 2021 | Dec 15, 2021 | Unknown | Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution. This is related to /RestAPI URLs in a servlet, and ImportTechnicians in the Struts configuration. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-22204 | MEDIUM 6.8 | Perl | Exiftool | Nov 17, 2021 | Dec 1, 2021 | Unknown | Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-40449 | HIGH 7.8 | Microsoft | Windows | Nov 17, 2021 | Dec 1, 2021 | Known | Win32k Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-42321 | HIGH 8.8 | Microsoft | Exchange | Nov 17, 2021 | Dec 1, 2021 | Known | Microsoft Exchange Server Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-42292 | HIGH 7.8 | Microsoft | Office | Nov 17, 2021 | Dec 1, 2021 | Unknown | Microsoft Excel Security Feature Bypass Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-27104 | CRITICAL 9.8 | Accellion | FTA | Nov 3, 2021 | Nov 17, 2021 | Known | Accellion FTA 9_12_370 and earlier is affected by OS command execution via a crafted POST request to various admin endpoints. The fixed version is FTA_9_12_380 and later. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-27102 | HIGH 7.8 | Accellion | FTA | Nov 3, 2021 | Nov 17, 2021 | Known | Accellion FTA 9_12_411 and earlier is affected by OS command execution via a local web service call. The fixed version is FTA_9_12_416 and later. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-27101 | CRITICAL 9.8 | Accellion | FTA | Nov 3, 2021 | Nov 17, 2021 | Known | Accellion FTA 9_12_370 and earlier is affected by SQL injection via a crafted Host header in a request to document_root.html. The fixed version is FTA_9_12_380 and later. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-27103 | CRITICAL 9.8 | Accellion | FTA | Nov 3, 2021 | Nov 17, 2021 | Known | Accellion FTA 9_12_411 and earlier is affected by SSRF via a crafted POST request to wmProgressstat.html. The fixed version is FTA_9_12_416 and later. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-21017 | HIGH 8.8 | Adobe | Acrobat and Reader | Nov 3, 2021 | Nov 17, 2021 | Unknown | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a heap-based buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-28550 | HIGH 8.8 | Adobe | Acrobat and Reader | Nov 3, 2021 | Nov 17, 2021 | Unknown | Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-4939 | CRITICAL 9.8 | Adobe | ColdFusion | Nov 3, 2021 | May 3, 2022 | Unknown | Adobe ColdFusion Update 5 and earlier versions, ColdFusion 11 Update 13 and earlier versions have an exploitable Deserialization of Untrusted Data vulnerability. Successful exploitation could lead to arbitrary code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-15961 | CRITICAL 9.8 | Adobe | ColdFusion | Nov 3, 2021 | May 3, 2022 | Unknown | Adobe ColdFusion versions July 12 release (2018.0.0.310739), Update 6 and earlier, and Update 14 and earlier have an unrestricted file upload vulnerability. Successful exploitation could lead to arbitrary code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-4878 | HIGH 7.8 | Adobe | Flash Player | Nov 3, 2021 | May 3, 2022 | Known | A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018. Required action: The impacted product is end-of-life and should be disconnected if still in use. | Open |
| CVE-2020-5735 | HIGH 8.8 | Amcrest | Cameras and Network Video Recorder (NVR) | Nov 3, 2021 | May 3, 2022 | Unknown | Amcrest cameras and NVR are vulnerable to a stack-based buffer overflow over port 37777. An authenticated remote attacker can abuse this issue to crash the device and possibly execute arbitrary code. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-2215 | HIGH 7.8 | Android | Android Kernel | Nov 3, 2021 | May 3, 2022 | Unknown | A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095 Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-0041 | HIGH 7.8 | Android | Android Kernel | Nov 3, 2021 | May 3, 2022 | Unknown | In binder_transaction of binder.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-145988638References: Upstream kernel Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-0069 | HIGH 7.8 | MediaTek | Multiple Chipsets | Nov 3, 2021 | May 3, 2022 | Unknown | In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754 Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-9805 | HIGH 8.1 | Apache | Struts | Nov 3, 2021 | May 3, 2022 | Unknown | The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-42013 | CRITICAL 9.8 | Apache | HTTP Server | Nov 3, 2021 | Nov 17, 2021 | Known | It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-41773 | HIGH 7.5 | Apache | HTTP Server | Nov 3, 2021 | Nov 17, 2021 | Known | A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-0211 | HIGH 7.8 | Apache | HTTP Server | Nov 3, 2021 | May 3, 2022 | Unknown | In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-4437 | CRITICAL 9.8 | Apache | Shiro | Nov 3, 2021 | May 3, 2022 | Unknown | Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-17558 | HIGH 7.5 | Apache | Solr | Nov 3, 2021 | May 3, 2022 | Unknown | Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined configset could contain renderable, potentially malicious, templates. Parameter provided templates are disabled by default, but can be enabled by setting `params.resource.loader.enabled` by defining a response writer with that setting set to `true`. Defining a response writer requires configuration API access. Solr 8.4 removed the params resource loader entirely, and only enables the configset-provided template rendering when the configset is `trusted` (has been uploaded by an authenticated user). Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-17530 | CRITICAL 9.8 | Apache | Struts | Nov 3, 2021 | May 3, 2022 | Unknown | Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-5638 | CRITICAL 9.8 | Apache | Struts | Nov 3, 2021 | May 3, 2022 | Known | The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-11776 | HIGH 8.1 | Apache | Struts | Nov 3, 2021 | May 3, 2022 | Unknown | Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30858 | HIGH 8.8 | Apple | iOS, iPadOS, and macOS | Nov 3, 2021 | Nov 17, 2021 | Unknown | A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-6223 | HIGH 7.5 | Apple | iOS and macOS | Nov 3, 2021 | May 3, 2022 | Unknown | A logic issue existed in the handling of Group FaceTime calls. The issue was addressed with improved state management. This issue is fixed in iOS 12.1.4, macOS Mojave 10.14.3 Supplemental Update. The initiator of a Group FaceTime call may be able to cause the recipient to answer. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30860 | HIGH 7.8 | Apple | Multiple Products | Nov 3, 2021 | Nov 17, 2021 | Unknown | An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-27930 | HIGH 7.8 | Apple | Multiple Products | Nov 3, 2021 | May 3, 2022 | Unknown | A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9, watchOS 6.2.9, Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave, iOS 14.2 and iPadOS 14.2, watchOS 5.3.9, macOS Catalina 10.15.7 Supplemental Update, macOS Catalina 10.15.7 Update. Processing a maliciously crafted font may lead to arbitrary code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30807 | HIGH 7.8 | Apple | Multiple Products | Nov 3, 2021 | Nov 17, 2021 | Unknown | A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.5.1, iOS 14.7.1 and iPadOS 14.7.1, watchOS 7.6.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-27950 | MEDIUM 5.5 | Apple | Multiple Products | Nov 3, 2021 | May 3, 2022 | Unknown | A memory initialization issue was addressed. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9, watchOS 6.2.9, Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave, iOS 14.2 and iPadOS 14.2, watchOS 5.3.9, macOS Catalina 10.15.7 Supplemental Update, macOS Catalina 10.15.7 Update. A malicious application may be able to disclose kernel memory. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-27932 | HIGH 7.8 | Apple | Multiple Products | Nov 3, 2021 | May 3, 2022 | Unknown | A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9, watchOS 6.2.9, Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave, iOS 14.2 and iPadOS 14.2, watchOS 5.3.9, macOS Catalina 10.15.7 Supplemental Update, macOS Catalina 10.15.7 Update. A malicious application may be able to execute arbitrary code with kernel privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-9818 | HIGH 8.8 | Apple | iOS, iPadOS, and watchOS | Nov 3, 2021 | May 3, 2022 | Unknown | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.5 and iPadOS 13.5, iOS 12.4.7, watchOS 6.2.5. Processing a maliciously crafted mail message may lead to unexpected memory modification or application termination. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-9819 | MEDIUM 4.3 | Apple | iOS, iPadOS, and watchOS | Nov 3, 2021 | May 3, 2022 | Unknown | A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.5 and iPadOS 13.5, iOS 12.4.7, watchOS 6.2.5, watchOS 5.3.7. Processing a maliciously crafted mail message may lead to heap corruption. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30762 | HIGH 8.8 | Apple | iOS | Nov 3, 2021 | Nov 17, 2021 | Unknown | A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-1782 | HIGH 7.0 | Apple | Multiple Products | Nov 3, 2021 | Nov 17, 2021 | Unknown | A race condition was addressed with improved locking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-1870 | CRITICAL 9.8 | Apple | iOS, iPadOS, and macOS | Nov 3, 2021 | Nov 17, 2021 | Unknown | A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-1871 | CRITICAL 9.8 | Apple | iOS, iPadOS, and macOS | Nov 3, 2021 | Nov 17, 2021 | Unknown | A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-1879 | MEDIUM 6.1 | Apple | iOS, iPadOS, and watchOS | Nov 3, 2021 | Nov 17, 2021 | Unknown | This issue was addressed by improved management of object lifetimes. This issue is fixed in iOS 12.5.2, iOS 14.4.2 and iPadOS 14.4.2, watchOS 7.3.3. Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30661 | HIGH 8.8 | Apple | Multiple Products | Nov 3, 2021 | Nov 17, 2021 | Unknown | A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30666 | HIGH 8.8 | Apple | iOS | Nov 3, 2021 | Nov 17, 2021 | Unknown | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30713 | HIGH 7.8 | Apple | macOS | Nov 3, 2021 | Nov 17, 2021 | Unknown | A permissions issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.4. A malicious application may be able to bypass Privacy preferences. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30657 | MEDIUM 5.5 | Apple | macOS | Nov 3, 2021 | Nov 17, 2021 | Unknown | A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, Security Update 2021-002 Catalina. A malicious application may bypass Gatekeeper checks. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30665 | HIGH 8.8 | Apple | Multiple Products | Nov 3, 2021 | Nov 17, 2021 | Unknown | A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 7.4.1, iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30663 | HIGH 8.8 | Apple | Multiple Products | Nov 3, 2021 | Nov 17, 2021 | Unknown | An integer overflow was addressed with improved input validation. This issue is fixed in iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, Safari 14.1.1, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30761 | HIGH 8.8 | Apple | iOS | Nov 3, 2021 | Nov 17, 2021 | Unknown | A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30869 | HIGH 7.8 | Apple | iOS, iPadOS, and macOS | Nov 3, 2021 | Nov 17, 2021 | Unknown | A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 12.5.5, iOS 14.4 and iPadOS 14.4, macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, Security Update 2021-006 Catalina. A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of reports that an exploit for this issue exists in the wild. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-9859 | HIGH 7.8 | Apple | Multiple Products | Nov 3, 2021 | May 3, 2022 | Unknown | A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.5.1 and iPadOS 13.5.1, macOS Catalina 10.15.5 Supplemental Update, tvOS 13.4.6, watchOS 6.2.6. An application may be able to execute arbitrary code with kernel privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-20090 | CRITICAL 9.8 | Arcadyan | Buffalo Firmware | Nov 3, 2021 | Nov 17, 2021 | Unknown | A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-27562 | MEDIUM 5.5 | Arm | Trusted Firmware | Nov 3, 2021 | Nov 17, 2021 | Unknown | In Arm Trusted Firmware M through 1.2, the NS world may trigger a system halt, an overwrite of secure data, or the printing out of secure data when calling secure functions under the NSPE handler mode. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-28664 | HIGH 8.8 | Arm | Mali Graphics Processing Unit (GPU) | Nov 3, 2021 | Nov 17, 2021 | Unknown | The Arm Mali GPU kernel driver allows privilege escalation or a denial of service (memory corruption) because an unprivileged user can achieve read/write access to read-only pages. This affects Bifrost r0p0 through r29p0 before r30p0, Valhall r19p0 through r29p0 before r30p0, and Midgard r8p0 through r30p0 before r31p0. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-28663 | HIGH 8.8 | Arm | Mali Graphics Processing Unit (GPU) | Nov 3, 2021 | Nov 17, 2021 | Unknown | The Arm Mali GPU kernel driver allows privilege escalation or information disclosure because GPU memory operations are mishandled, leading to a use-after-free. This affects Bifrost r0p0 through r28p0 before r29p0, Valhall r19p0 through r28p0 before r29p0, and Midgard r4p0 through r30p0. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-3398 | HIGH 8.8 | Atlassian | Confluence Server and Data Center | Nov 3, 2021 | May 3, 2022 | Unknown | Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-26084 | CRITICAL 9.8 | Atlassian | Confluence Server and Data Center | Nov 3, 2021 | Nov 17, 2021 | Known | In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-11580 | CRITICAL 9.8 | Atlassian | Crowd and Crowd Data Center | Nov 3, 2021 | May 3, 2022 | Known | Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x), from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-3396 | CRITICAL 9.8 | Atlassian | Confluence Server and Data Server | Nov 3, 2021 | May 3, 2022 | Known | The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-42258 | CRITICAL 9.8 | BQE | BillQuick Web Suite | Nov 3, 2021 | Nov 17, 2021 | Known | BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include the ability to execute arbitrary code as MSSQLSERVER$ via xp_cmdshell. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-3452 | HIGH 7.5 | Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) | Nov 3, 2021 | May 3, 2022 | Unknown | A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-3580 | MEDIUM 6.1 | Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) | Nov 3, 2021 | May 3, 2022 | Known | Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-1497 | CRITICAL 9.8 | Cisco | HyperFlex HX | Nov 3, 2021 | Nov 17, 2021 | Unknown | Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-1498 | CRITICAL 9.8 | Cisco | HyperFlex HX | Nov 3, 2021 | Nov 17, 2021 | Unknown | Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0171 | CRITICAL 9.8 | Cisco | IOS and IOS XE | Nov 3, 2021 | May 3, 2022 | Unknown | A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, Causing an indefinite loop on the affected device that triggers a watchdog crash. Cisco Bug IDs: CSCvg76186. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-3118 | HIGH 8.8 | Cisco | IOS XR | Nov 3, 2021 | May 3, 2022 | Unknown | A vulnerability in the Cisco Discovery Protocol implementation for Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a reload on an affected device. The vulnerability is due to improper validation of string input from certain fields in Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to cause a stack overflow, which could allow the attacker to execute arbitrary code with administrative privileges on an affected device. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-3566 | HIGH 8.6 | Cisco | IOS XR | Nov 3, 2021 | May 3, 2022 | Unknown | A vulnerability in the Distance Vector Multicast Routing Protocol (DVMRP) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to exhaust process memory of an affected device. The vulnerability is due to insufficient queue management for Internet Group Management Protocol (IGMP) packets. An attacker could exploit this vulnerability by sending crafted IGMP traffic to an affected device. A successful exploit could allow the attacker to cause memory exhaustion, resulting in instability of other processes. These processes may include, but are not limited to, interior and exterior routing protocols. Cisco will release software updates that address this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-3569 | HIGH 8.6 | Cisco | IOS XR | Nov 3, 2021 | May 3, 2022 | Unknown | Multiple vulnerabilities in the Distance Vector Multicast Routing Protocol (DVMRP) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to either immediately crash the Internet Group Management Protocol (IGMP) process or make it consume available memory and eventually crash. The memory consumption may negatively impact other processes that are running on the device. These vulnerabilities are due to the incorrect handling of IGMP packets. An attacker could exploit these vulnerabilities by sending crafted IGMP traffic to an affected device. A successful exploit could allow the attacker to immediately crash the IGMP process or cause memory exhaustion, resulting in other processes becoming unstable. These processes may include, but are not limited to, interior and exterior routing protocols. Cisco will release software updates that address these vulnerabilities. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-3161 | CRITICAL 9.8 | Cisco | Cisco IP Phones | Nov 3, 2021 | May 3, 2022 | Unknown | A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1653 | HIGH 7.5 | Cisco | Small Business RV320 and RV325 Routers | Nov 3, 2021 | May 3, 2022 | Unknown | A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0296 | HIGH 7.5 | Cisco | Adaptive Security Appliance (ASA) | Nov 3, 2021 | May 3, 2022 | Unknown | A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. It is also possible on certain software releases that the ASA will not reload, but an attacker could view sensitive system information without authentication by using directory traversal techniques. The vulnerability is due to lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to cause a DoS condition or unauthenticated disclosure of information. This vulnerability applies to IPv4 and IPv6 HTTP traffic. This vulnerability affects Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 1000V Cloud Firewall, ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4100 Series Security Appliance, Firepower 9300 ASA Security Module, FTD Virtual (FTDv). Cisco Bug IDs: CSCvi16029. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-13608 | HIGH 7.5 | Citrix | StoreFront Server | Nov 3, 2021 | May 3, 2022 | Known | Citrix StoreFront Server before 1903, 7.15 LTSR before CU4 (3.12.4000), and 7.6 LTSR before CU8 (3.0.8000) allows XXE attacks. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-8193 | MEDIUM 6.5 | Citrix | Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance | Nov 3, 2021 | May 3, 2022 | Unknown | Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-8195 | MEDIUM 6.5 | Citrix | Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance | Nov 3, 2021 | May 3, 2022 | Unknown | Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-8196 | MEDIUM 4.3 | Citrix | Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance | Nov 3, 2021 | May 3, 2022 | Unknown | Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-19781 | CRITICAL 9.8 | Citrix | Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance | Nov 3, 2021 | May 3, 2022 | Known | An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-11634 | CRITICAL 9.8 | Citrix | Workspace Application and Receiver for Windows | Nov 3, 2021 | May 3, 2022 | Known | Citrix Workspace App before 1904 for Windows has Incorrect Access Control. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-29557 | CRITICAL 9.8 | D-Link | DIR-825 R1 Devices | Nov 3, 2021 | May 3, 2022 | Unknown | An issue was discovered on D-Link DIR-825 R1 devices through 3.0.1 before 2020-11-20. A buffer overflow in the web interface allows attackers to achieve pre-authentication remote code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-25506 | CRITICAL 9.8 | D-Link | DNS-320 Device | Nov 3, 2021 | May 3, 2022 | Unknown | D-Link DNS-320 FW v2.06B01 Revision Ax is affected by command injection in the system_mgr.cgi component, which can lead to remote arbitrary code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-15811 | HIGH 7.5 | DotNetNuke (DNN) | DotNetNuke (DNN) | Nov 3, 2021 | May 3, 2022 | Unknown | DNN (aka DotNetNuke) 9.2 through 9.2.1 uses a weak encryption algorithm to protect input parameters. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-18325 | HIGH 7.5 | DotNetNuke (DNN) | DotNetNuke (DNN) | Nov 3, 2021 | May 3, 2022 | Unknown | DNN (aka DotNetNuke) 9.2 through 9.2.2 uses a weak encryption algorithm to protect input parameters. NOTE: this issue exists because of an incomplete fix for CVE-2018-15811. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-9822 | HIGH 8.8 | DotNetNuke (DNN) | DotNetNuke (DNN) | Nov 3, 2021 | May 3, 2022 | Known | DNN (aka DotNetNuke) before 9.1.1 has Remote Code Execution via a cookie, aka "2017-08 (Critical) Possible remote code execution on DNN sites." Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-15752 | HIGH 7.8 | Docker | Desktop Community Edition | Nov 3, 2021 | May 3, 2022 | Unknown | Docker Desktop Community Edition before 2.1.0.1 allows local users to gain privileges by placing a Trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\ as a low-privilege user, and then waiting for an admin or service user to authenticate with Docker, restart Docker, or run 'docker login' to force the command. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-8515 | CRITICAL 9.8 | DrayTek | Multiple Vigor Routers | Nov 3, 2021 | May 3, 2022 | Unknown | DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-7600 | CRITICAL 9.8 | Drupal | Drupal Core | Nov 3, 2021 | May 3, 2022 | Known | Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-22205 | CRITICAL 10.0 | GitLab | Community and Enterprise Editions | Nov 3, 2021 | Nov 17, 2021 | Known | An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-6789 | CRITICAL 9.8 | Exim | Exim | Nov 3, 2021 | May 3, 2022 | Known | An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-8657 | CRITICAL 9.8 | EyesOfNetwork | EyesOfNetwork | Nov 3, 2021 | May 3, 2022 | Unknown | An issue was discovered in EyesOfNetwork 5.3. The installation uses the same API key (hardcoded as EONAPI_KEY in include/api_functions.php for API version 2.4.2) by default for all installations, hence allowing an attacker to calculate/guess the admin access token. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-8655 | HIGH 7.8 | EyesOfNetwork | EyesOfNetwork | Nov 3, 2021 | May 3, 2022 | Unknown | An issue was discovered in EyesOfNetwork 5.3. The sudoers configuration is prone to a privilege escalation vulnerability, allowing the apache user to run arbitrary commands as root via a crafted NSE script for nmap 7. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-5902 | CRITICAL 9.8 | F5 | BIG-IP | Nov 3, 2021 | May 3, 2022 | Known | In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-22986 | CRITICAL 9.8 | F5 | BIG-IP and BIG-IQ Centralized Management | Nov 3, 2021 | Nov 17, 2021 | Known | On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticated remote command execution vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-35464 | CRITICAL 9.8 | ForgeRock | Access Management (AM) | Nov 3, 2021 | Nov 17, 2021 | Known | ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-5591 | MEDIUM 6.5 | Fortinet | FortiOS | Nov 3, 2021 | May 3, 2022 | Unknown | A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-12812 | CRITICAL 9.8 | Fortinet | FortiOS | Nov 3, 2021 | May 3, 2022 | Known | An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6.2.3, 6.0.9 and below may result in a user being able to log in successfully without being prompted for the second factor of authentication (FortiToken) if they changed the case of their username. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-13379 | CRITICAL 9.1 | Fortinet | FortiOS | Nov 3, 2021 | May 3, 2022 | Known | An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-16010 | CRITICAL 9.6 | Chrome for Android UI | Nov 3, 2021 | May 3, 2022 | Unknown | Heap buffer overflow in UI in Google Chrome on Android prior to 86.0.4240.185 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2020-15999 | CRITICAL 9.6 | Chrome FreeType | Nov 3, 2021 | Nov 17, 2021 | Unknown | Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-21166 | HIGH 8.8 | Chromium | Nov 3, 2021 | Nov 17, 2021 | Unknown | Data race in audio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2020-16017 | CRITICAL 9.6 | Chrome | Nov 3, 2021 | May 3, 2022 | Unknown | Use after free in site isolation in Google Chrome prior to 86.0.4240.198 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-37976 | MEDIUM 6.5 | Chromium | Nov 3, 2021 | Nov 17, 2021 | Unknown | Inappropriate implementation in Memory in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2020-16009 | HIGH 8.8 | Chromium V8 | Nov 3, 2021 | May 3, 2022 | Unknown | Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-30632 | HIGH 8.8 | Chromium V8 | Nov 3, 2021 | Nov 17, 2021 | Unknown | Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2020-16013 | HIGH 8.8 | Chromium V8 | Nov 3, 2021 | May 3, 2022 | Unknown | Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-30633 | CRITICAL 9.6 | Chromium Indexed DB API | Nov 3, 2021 | Nov 17, 2021 | Unknown | Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-21148 | HIGH 8.8 | Chromium V8 | Nov 3, 2021 | Nov 17, 2021 | Unknown | Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-37973 | CRITICAL 9.6 | Chromium Portals | Nov 3, 2021 | Nov 17, 2021 | Unknown | Use after free in Portals in Google Chrome prior to 94.0.4606.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-30551 | HIGH 8.8 | Chromium V8 | Nov 3, 2021 | Nov 17, 2021 | Unknown | Type confusion in V8 in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-37975 | HIGH 8.8 | Chromium V8 | Nov 3, 2021 | Nov 17, 2021 | Unknown | Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2020-6418 | HIGH 8.8 | Chromium V8 | Nov 3, 2021 | May 3, 2022 | Unknown | Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-30554 | HIGH 8.8 | Chromium WebGL | Nov 3, 2021 | Nov 17, 2021 | Unknown | Use after free in WebGL in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-21206 | HIGH 8.8 | Chromium Blink | Nov 3, 2021 | Nov 17, 2021 | Unknown | Use after free in Blink in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-38000 | MEDIUM 6.1 | Chromium Intents | Nov 3, 2021 | Nov 17, 2021 | Unknown | Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 95.0.4638.69 allowed a remote attacker to arbitrarily browser to a malicious URL via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-38003 | HIGH 8.8 | Chromium V8 | Nov 3, 2021 | Nov 17, 2021 | Unknown | Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-21224 | HIGH 8.8 | Chromium V8 | Nov 3, 2021 | Nov 17, 2021 | Unknown | Type confusion in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-21193 | HIGH 8.8 | Chromium Blink | Nov 3, 2021 | Nov 17, 2021 | Unknown | Use after free in Blink in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-21220 | HIGH 8.8 | Chromium V8 | Nov 3, 2021 | Nov 17, 2021 | Unknown | Insufficient validation of untrusted input in V8 in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2021-30563 | HIGH 8.8 | Chromium V8 | Nov 3, 2021 | Nov 17, 2021 | Unknown | Type Confusion in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Required action: Apply updates per vendor instructions. | Open | |
| CVE-2020-4430 | MEDIUM 4.3 | IBM | Data Risk Manager | Nov 3, 2021 | May 3, 2022 | Unknown | IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, and 2.0.4 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a specially-crafted URL request to download arbitrary files from the system. IBM X-Force ID: 180535. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-4427 | CRITICAL 9.8 | IBM | Data Risk Manager | Nov 3, 2021 | May 3, 2022 | Unknown | IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, and 2.0.6 could allow a remote attacker to bypass security restrictions when configured with SAML authentication. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to bypass the authentication process and gain full administrative access to the system. IBM X-Force ID: 180532. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-4428 | CRITICAL 9.1 | IBM | Data Risk Manager | Nov 3, 2021 | May 3, 2022 | Unknown | IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, and 2.0.4 could allow a remote authenticated attacker to execute arbitrary commands on the system. IBM X-Force ID: 180533. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-4716 | CRITICAL 9.8 | IBM | Planning Analytics | Nov 3, 2021 | May 3, 2022 | Unknown | IBM Planning Analytics 2.0.0 through 2.0.8 is vulnerable to a configuration overwrite that allows an unauthenticated user to login as "admin", and then execute code as root or SYSTEM via TM1 scripting. IBM X-Force ID: 172094. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-3715 | MEDIUM 5.5 | ImageMagick | ImageMagick | Nov 3, 2021 | May 3, 2022 | Unknown | The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-3718 | MEDIUM 5.5 | ImageMagick | ImageMagick | Nov 3, 2021 | May 3, 2022 | Unknown | The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-15505 | CRITICAL 9.8 | Ivanti | MobileIron Multiple Products | Nov 3, 2021 | May 3, 2022 | Unknown | A remote code execution vulnerability in MobileIron Core & Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0; and Sentry versions 9.7.2 and earlier, and 9.8.0; and Monitor and Reporting Database (RDB) version 2.0.0.1 and earlier that allows remote attackers to execute arbitrary code via unspecified vectors. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-30116 | CRITICAL 10.0 | Kaseya | Virtual System/Server Administrator (VSA) | Nov 3, 2021 | Nov 17, 2021 | Known | Kaseya VSA before 9.5.7 allows credential disclosure, as exploited in the wild in July 2021. By default Kaseya VSA on premise offers a download page where the clients for the installation can be downloaded. The default URL for this page is https://x.x.x.x/dl.asp When an attacker download a client for Windows and installs it, the file KaseyaD.ini is generated (C:\Program Files (x86)\Kaseya\XXXXXXXXXX\KaseyaD.ini) which contains an Agent_Guid and AgentPassword This Agent_Guid and AgentPassword can be used to log in on dl.asp (https://x.x.x.x/dl.asp?un=840997037507813&pw=113cc622839a4077a84837485ced6b93e440bf66d44057713cb2f95e503a06d9) This request authenticates the client and returns a sessionId cookie that can be used in subsequent attacks to bypass authentication. Security issues discovered --- * Unauthenticated download page leaks credentials * Credentials of agent software can be used to obtain a sessionId (cookie) that can be used for services not intended for use by agents * dl.asp accepts credentials via a GET request * Access to KaseyaD.ini gives an attacker access to sufficient information to penetrate the Kaseya installation and its clients. Impact --- Via the page /dl.asp enough information can be obtained to give an attacker a sessionId that can be used to execute further (semi-authenticated) attacks against the system. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-7961 | CRITICAL 9.8 | Liferay | Liferay Portal | Nov 3, 2021 | May 3, 2022 | Unknown | Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS). Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-23874 | HIGH 8.2 | McAfee | McAfee Total Protection (MTP) | Nov 3, 2021 | Nov 17, 2021 | Unknown | Arbitrary Process Execution vulnerability in McAfee Total Protection (MTP) prior to 16.0.30 allows a local user to gain elevated privileges and execute arbitrary code bypassing MTP self-defense. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-22506 | HIGH 7.5 | Micro Focus | Micro Focus Access Manager | Nov 3, 2021 | Nov 17, 2021 | Unknown | Advance configuration exposing Information Leakage vulnerability in Micro Focus Access Manager product, affects all versions prior to version 5.0. The vulnerability could cause information leakage. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-22502 | CRITICAL 9.8 | Micro Focus | Operation Bridge Reporter (OBR) | Nov 3, 2021 | Nov 17, 2021 | Unknown | Remote Code execution vulnerability in Micro Focus Operation Bridge Reporter (OBR) product, affecting version 10.40. The vulnerability could be exploited to allow Remote Code Execution on the OBR server. Required action: Apply updates per vendor instructions. | Open |
| CVE-2014-1812 | HIGH 8.8 | Microsoft | Windows | Nov 3, 2021 | May 3, 2022 | Known | The Group Policy implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly handle distribution of passwords, which allows remote authenticated users to obtain sensitive credential information and consequently gain privileges by leveraging access to the SYSVOL share, as exploited in the wild in May 2014, aka "Group Policy Preferences Password Elevation of Privilege Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-38647 | CRITICAL 9.8 | Microsoft | Open Management Infrastructure (OMI) | Nov 3, 2021 | Nov 17, 2021 | Known | Open Management Infrastructure Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-0167 | HIGH 7.8 | Microsoft | Win32k | Nov 3, 2021 | May 3, 2022 | Known | The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0143 and CVE-2016-0165. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-0878 | MEDIUM 4.2 | Microsoft | Edge and Internet Explorer | Nov 3, 2021 | May 3, 2022 | Known | <p>A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, the attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>An attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft browsers, and then convince a user to view the website. The attacker could also take advantage of compromised websites, or websites that accept or host user-provided content or advertisements, by adding specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically via an enticement in email or instant message, or by getting them to open an email attachment.</p> <p>The security update addresses the vulnerability by modifying how Microsoft browsers handle objects in memory.</p> Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-31955 | MEDIUM 5.5 | Microsoft | Windows | Nov 3, 2021 | Nov 17, 2021 | Unknown | Windows Kernel Information Disclosure Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-1647 | HIGH 7.8 | Microsoft | Defender | Nov 3, 2021 | Nov 17, 2021 | Unknown | Microsoft Defender Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-33739 | HIGH 8.4 | Microsoft | Windows | Nov 3, 2021 | Nov 17, 2021 | Unknown | Microsoft DWM Core Library Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-0185 | HIGH 7.8 | Microsoft | Windows | Nov 3, 2021 | May 3, 2022 | Unknown | Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, and Windows 8.1 allows remote attackers to execute arbitrary code via a crafted Media Center link (aka .mcl) file, aka "Windows Media Center Remote Code Execution Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-0683 | HIGH 7.8 | Microsoft | Windows | Nov 3, 2021 | May 3, 2022 | Unknown | An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0686. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-17087 | HIGH 7.8 | Microsoft | Windows | Nov 3, 2021 | May 3, 2022 | Unknown | Windows Kernel Local Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-33742 | HIGH 7.5 | Microsoft | Windows | Nov 3, 2021 | Nov 17, 2021 | Unknown | Windows MSHTML Platform Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-31199 | MEDIUM 5.2 | Microsoft | Enhanced Cryptographic Provider | Nov 3, 2021 | Nov 17, 2021 | Unknown | Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-33771 | HIGH 7.8 | Microsoft | Windows | Nov 3, 2021 | Nov 17, 2021 | Unknown | Windows Kernel Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-31956 | HIGH 7.8 | Microsoft | Windows | Nov 3, 2021 | Nov 17, 2021 | Unknown | Windows NTFS Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-31201 | MEDIUM 5.2 | Microsoft | Enhanced Cryptographic Provider | Nov 3, 2021 | Nov 17, 2021 | Unknown | Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-31979 | HIGH 7.8 | Microsoft | Windows | Nov 3, 2021 | Nov 17, 2021 | Unknown | Windows Kernel Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-0938 | HIGH 7.8 | Microsoft | Windows | Nov 3, 2021 | May 3, 2022 | Unknown | A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1020. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-17144 | HIGH 8.4 | Microsoft | Exchange Server | Nov 3, 2021 | May 3, 2022 | Unknown | Microsoft Exchange Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-0986 | HIGH 7.8 | Microsoft | Windows | Nov 3, 2021 | May 3, 2022 | Unknown | An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-1020 | HIGH 8.8 | Microsoft | Windows | Nov 3, 2021 | May 3, 2022 | Unknown | A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0938. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-38645 | HIGH 7.8 | Microsoft | Open Management Infrastructure (OMI) | Nov 3, 2021 | Nov 17, 2021 | Unknown | Open Management Infrastructure Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-34523 | CRITICAL 9.0 | Microsoft | Exchange Server | Nov 3, 2021 | Nov 17, 2021 | Known | Microsoft Exchange Server Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-7269 | CRITICAL 9.8 | Microsoft | Internet Information Services (IIS) | Nov 3, 2021 | May 3, 2022 | Unknown | Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-36948 | HIGH 7.8 | Microsoft | Windows | Nov 3, 2021 | Nov 17, 2021 | Unknown | Windows Update Medic Service Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-38649 | HIGH 7.0 | Microsoft | Open Management Infrastructure (OMI) | Nov 3, 2021 | Nov 17, 2021 | Unknown | Open Management Infrastructure Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-0688 | HIGH 8.8 | Microsoft | Exchange Server | Nov 3, 2021 | May 3, 2022 | Known | A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0143 | HIGH 8.8 | Microsoft | Windows | Nov 3, 2021 | May 3, 2022 | Known | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-7255 | HIGH 7.8 | Microsoft | Win32k | Nov 3, 2021 | May 3, 2022 | Unknown | The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-0708 | CRITICAL 9.8 | Microsoft | Remote Desktop Services | Nov 3, 2021 | May 3, 2022 | Known | A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-34473 | CRITICAL 9.1 | Microsoft | Exchange Server | Nov 3, 2021 | Nov 17, 2021 | Known | Microsoft Exchange Server Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-1464 | HIGH 7.8 | Microsoft | Windows | Nov 3, 2021 | May 3, 2022 | Unknown | A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files. In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded. The update addresses the vulnerability by correcting how Windows validates file signatures. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-1732 | HIGH 7.8 | Microsoft | Win32k | Nov 3, 2021 | Nov 17, 2021 | Known | Windows Win32k Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-34527 | HIGH 8.8 | Microsoft | Windows | Nov 3, 2021 | May 3, 2022 | Known | <p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>UPDATE July 7, 2021: The security update for Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607 have been released. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability.</p> <p>In addition to installing the updates, in order to secure your system, you must confirm that the following registry settings are set to 0 (zero) or are not defined (<strong>Note</strong>: These registry keys do not exist by default, and therefore are already at the secure setting.), also that your Group Policy setting are correct (see FAQ):</p> <ul> <li>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint</li> <li>NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)</li> <li>UpdatePromptSettings = 0 (DWORD) or not defined (default setting)</li> </ul> <p><strong>Having NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by design.</strong></p> <p>UPDATE July 6, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability. See also <a href="https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-183b129578a7">KB5005010: Restricting installation of new printer drivers after applying the July 6, 2021 updates</a>.</p> <p>Note that the security updates released on and after July 6, 2021 contain protections for CVE-2021-1675 and the additional remote code execution exploit in the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-2021-34527.</p> Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-31207 | MEDIUM 6.6 | Microsoft | Exchange Server | Nov 3, 2021 | Nov 17, 2021 | Known | Microsoft Exchange Server Security Feature Bypass Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-0803 | HIGH 7.8 | Microsoft | Win32k | Nov 3, 2021 | May 3, 2022 | Unknown | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0685, CVE-2019-0859. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-1040 | CRITICAL 9.0 | Microsoft | Hyper-V RemoteFX | Nov 3, 2021 | May 3, 2022 | Unknown | A remote code execution vulnerability exists when Hyper-V RemoteFX vGPU on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1032, CVE-2020-1036, CVE-2020-1041, CVE-2020-1042, CVE-2020-1043. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-28310 | HIGH 7.8 | Microsoft | Win32k | Nov 3, 2021 | Nov 17, 2021 | Unknown | Win32k Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-1350 | CRITICAL 10.0 | Microsoft | Windows | Nov 3, 2021 | May 3, 2022 | Unknown | A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-26411 | HIGH 8.8 | Microsoft | Internet Explorer | Nov 3, 2021 | Nov 17, 2021 | Known | Internet Explorer Memory Corruption Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-0859 | HIGH 7.8 | Microsoft | Win32k | Nov 3, 2021 | May 3, 2022 | Unknown | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0685, CVE-2019-0803. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-40444 | HIGH 8.8 | Microsoft | MSHTML | Nov 3, 2021 | Nov 17, 2021 | Known | <p>Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents.</p> <p>An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The attacker would then have to convince the user to open the malicious document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>Microsoft Defender Antivirus and Microsoft Defender for Endpoint both provide detection and protections for the known vulnerability. Customers should keep antimalware products up to date. Customers who utilize automatic updates do not need to take additional action. Enterprise customers who manage updates should select the detection build 1.349.22.0 or newer and deploy it across their environments. Microsoft Defender for Endpoint alerts will be displayed as: “Suspicious Cpl File Execution”.</p> <p>Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.</p> <p>Please see the <strong>Mitigations</strong> and <strong>Workaround</strong> sections for important information about steps you can take to protect your system from this vulnerability.</p> <p><strong>UPDATE</strong> September 14, 2021: Microsoft has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. Please see the FAQ for important information about which updates are applicable to your system.</p> Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-8759 | HIGH 7.8 | Microsoft | .NET Framework | Nov 3, 2021 | May 3, 2022 | Unknown | Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-8653 | HIGH 7.5 | Microsoft | Internet Explorer | Nov 3, 2021 | May 3, 2022 | Unknown | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8643. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-0797 | HIGH 7.8 | Microsoft | Win32k | Nov 3, 2021 | May 3, 2022 | Unknown | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0808. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-36942 | HIGH 7.5 | Microsoft | Windows | Nov 3, 2021 | Nov 17, 2021 | Known | Windows LSA Spoofing Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1215 | HIGH 7.8 | Microsoft | Windows | Nov 3, 2021 | May 3, 2022 | Known | An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1253, CVE-2019-1278, CVE-2019-1303. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0798 | HIGH 8.8 | Microsoft | Office | Nov 3, 2021 | May 3, 2022 | Unknown | Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-0802 | HIGH 7.8 | Microsoft | Office | Nov 3, 2021 | May 3, 2022 | Unknown | Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812. Required action: Apply updates per vendor instructions. | Open |
| CVE-2012-0158 | HIGH 8.8 | Microsoft | MSCOMCTL.OCX | Nov 3, 2021 | May 3, 2022 | Unknown | The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wild in April 2012, aka "MSCOMCTL.OCX RCE Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-1641 | HIGH 7.8 | Microsoft | Office | Nov 3, 2021 | May 3, 2022 | Unknown | Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-27085 | HIGH 8.8 | Microsoft | Internet Explorer | Nov 3, 2021 | Nov 17, 2021 | Unknown | Internet Explorer Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-0541 | HIGH 8.8 | Microsoft | MSHTML | Nov 3, 2021 | May 3, 2022 | Unknown | A remote code execution vulnerability exists in the way that the MSHTML engine inproperly validates input, aka "MSHTML Engine Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Office Word Viewer, Internet Explorer 9, Internet Explorer 11, Microsoft Excel Viewer, Internet Explorer 10, Office 365 ProPlus. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-11882 | HIGH 7.8 | Microsoft | Office | Nov 3, 2021 | May 3, 2022 | Known | Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-0674 | HIGH 7.5 | Microsoft | Internet Explorer | Nov 3, 2021 | May 3, 2022 | Unknown | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-27059 | HIGH 7.6 | Microsoft | Office | Nov 3, 2021 | Nov 17, 2021 | Unknown | Microsoft Office Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1367 | HIGH 7.5 | Microsoft | Internet Explorer | Nov 3, 2021 | May 3, 2022 | Known | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1221. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-0199 | HIGH 7.8 | Microsoft | Office and WordPad | Nov 3, 2021 | May 3, 2022 | Known | Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API." Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-1380 | HIGH 7.8 | Microsoft | Internet Explorer | Nov 3, 2021 | May 3, 2022 | Unknown | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1429 | HIGH 7.5 | Microsoft | Internet Explorer | Nov 3, 2021 | May 3, 2022 | Unknown | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1426, CVE-2019-1427, CVE-2019-1428. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-11774 | HIGH 7.8 | Microsoft | Office | Nov 3, 2021 | May 3, 2022 | Unknown | Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Security Feature Bypass Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-0968 | HIGH 7.5 | Microsoft | Internet Explorer | Nov 3, 2021 | May 3, 2022 | Unknown | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0970. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-1472 | MEDIUM 5.5 | Microsoft | Netlogon | Nov 3, 2021 | May 3, 2022 | Known | An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-26855 | CRITICAL 9.1 | Microsoft | Exchange Server | Nov 3, 2021 | May 3, 2022 | Known | Microsoft Exchange Server Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-26858 | HIGH 7.8 | Microsoft | Exchange Server | Nov 3, 2021 | May 3, 2022 | Known | Microsoft Exchange Server Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-27065 | HIGH 7.8 | Microsoft | Exchange Server | Nov 3, 2021 | May 3, 2022 | Known | Microsoft Exchange Server Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-1054 | HIGH 7.8 | Microsoft | Win32k | Nov 3, 2021 | May 3, 2022 | Unknown | An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1143. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-1675 | HIGH 7.8 | Microsoft | Windows | Nov 3, 2021 | Nov 17, 2021 | Known | Windows Print Spooler Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-34448 | MEDIUM 6.8 | Microsoft | Windows | Nov 3, 2021 | Nov 17, 2021 | Unknown | Scripting Engine Memory Corruption Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-0601 | HIGH 8.1 | Microsoft | Windows | Nov 3, 2021 | May 3, 2022 | Unknown | A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-0604 | CRITICAL 9.8 | Microsoft | SharePoint | Nov 3, 2021 | May 3, 2022 | Known | A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0594. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-0646 | CRITICAL 9.8 | Microsoft | .NET Framework | Nov 3, 2021 | May 3, 2022 | Unknown | A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-0808 | HIGH 7.8 | Microsoft | Win32k | Nov 3, 2021 | May 3, 2022 | Unknown | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0797. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-26857 | HIGH 7.8 | Microsoft | Exchange Server | Nov 3, 2021 | May 3, 2022 | Known | Microsoft Exchange Server Remote Code Execution Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-1147 | HIGH 7.8 | Microsoft | .NET Framework, SharePoint, Visual Studio | Nov 3, 2021 | May 3, 2022 | Unknown | A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-1214 | HIGH 7.8 | Microsoft | Windows | Nov 3, 2021 | May 3, 2022 | Unknown | An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Windows Common Log File System Driver Elevation of Privilege Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-3235 | HIGH 7.8 | Microsoft | Office | Nov 3, 2021 | May 3, 2022 | Unknown | Microsoft Visio 2007 SP3, Visio 2010 SP2, Visio 2013 SP1, Visio 2016, Visio Viewer 2007 SP3, and Visio Viewer 2010 mishandle library loading, which allows local users to gain privileges via a crafted application, aka "Microsoft Office OLE DLL Side Loading Vulnerability." Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-0863 | HIGH 7.8 | Microsoft | Windows | Nov 3, 2021 | May 3, 2022 | Unknown | An elevation of privilege vulnerability exists in the way Windows Error Reporting (WER) handles files, aka 'Windows Error Reporting Elevation of Privilege Vulnerability'. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-36955 | HIGH 7.8 | Microsoft | Windows | Nov 3, 2021 | Nov 17, 2021 | Known | Windows Common Log File System Driver Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-38648 | HIGH 7.8 | Microsoft | Open Management Infrastructure (OMI) | Nov 3, 2021 | Nov 17, 2021 | Unknown | Open Management Infrastructure Elevation of Privilege Vulnerability Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-6819 | HIGH 8.1 | Mozilla | Firefox and Thunderbird | Nov 3, 2021 | May 3, 2022 | Unknown | Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-6820 | HIGH 8.1 | Mozilla | Firefox and Thunderbird | Nov 3, 2021 | May 3, 2022 | Unknown | Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-17026 | HIGH 8.8 | Mozilla | Firefox and Thunderbird | Nov 3, 2021 | May 3, 2022 | Unknown | Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 68.4.1, Thunderbird < 68.4.1, and Firefox < 72.0.1. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-15949 | HIGH 8.8 | Nagios | Nagios XI | Nov 3, 2021 | May 3, 2022 | Unknown | Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-26919 | CRITICAL 9.8 | NETGEAR | JGS516PE Devices | Nov 3, 2021 | May 3, 2022 | Unknown | NETGEAR JGS516PE devices before 2.6.0.43 are affected by lack of access control at the function level. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-19356 | HIGH 7.5 | Netis | WF2419 Devices | Nov 3, 2021 | May 3, 2022 | Unknown | Netis WF2419 is vulnerable to authenticated Remote Code Execution (RCE) as root through the router Web management page. The vulnerability has been found in firmware version V1.2.31805 and V2.2.36123. After one is connected to this page, it is possible to execute system commands as root through the tracert diagnostic tool because of lack of user input sanitizing. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-2555 | CRITICAL 9.8 | Oracle | Multiple Products | Nov 3, 2021 | May 3, 2022 | Unknown | Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Required action: Apply updates per vendor instructions. | Open |
| CVE-2012-3152 | CRITICAL 9.1 | Oracle | Fusion Middleware | Nov 3, 2021 | May 3, 2022 | Unknown | Unspecified vulnerability in the Oracle Reports Developer component in Oracle Fusion Middleware 11.1.1.4, 11.1.1.6, and 11.1.2.0 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Report Server Component. NOTE: the previous information is from the October 2012 CPU. Oracle has not commented on claims from the original researcher that the URLPARAMETER functionality allows remote attackers to read and upload arbitrary files to reports/rwservlet, and that this issue occurs in earlier versions. NOTE: this can be leveraged with CVE-2012-3153 to execute arbitrary code by uploading a .jsp file. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-14871 | CRITICAL 10.0 | Oracle | Solaris and Zettabyte File System (ZFS) | Nov 3, 2021 | May 3, 2022 | Unknown | Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. Note: This CVE is not exploitable for Solaris 11.1 and later releases, and ZFSSA 8.7 and later releases, thus the CVSS Base Score is 0.0. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). Required action: Apply updates per vendor instructions. | Open |
| CVE-2015-4852 | CRITICAL 9.8 | Oracle | WebLogic Server | Nov 3, 2021 | May 3, 2022 | Unknown | The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-14750 | CRITICAL 9.8 | Oracle | WebLogic Server | Nov 3, 2021 | May 3, 2022 | Unknown | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-14882 | CRITICAL 9.8 | Oracle | WebLogic Server | Nov 3, 2021 | May 3, 2022 | Unknown | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-14883 | HIGH 7.2 | Oracle | WebLogic Server | Nov 3, 2021 | May 3, 2022 | Unknown | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-8644 | CRITICAL 9.8 | PlaySMS | PlaySMS | Nov 3, 2021 | May 3, 2022 | Unknown | PlaySMS before 1.4.3 does not sanitize inputs from a malicious string. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-18935 | CRITICAL 9.8 | Progress | Telerik UI for ASP.NET AJAX | Nov 3, 2021 | May 3, 2022 | Known | Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.) Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-22893 | CRITICAL 10.0 | Ivanti | Pulse Connect Secure | Nov 3, 2021 | May 3, 2022 | Known | Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-8243 | HIGH 7.2 | Ivanti | Pulse Connect Secure | Nov 3, 2021 | May 3, 2022 | Unknown | A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could allow an authenticated attacker to upload custom template to perform an arbitrary code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-22900 | HIGH 7.2 | Ivanti | Pulse Connect Secure | Nov 3, 2021 | May 3, 2022 | Unknown | A vulnerability allowed multiple unrestricted uploads in Pulse Connect Secure before 9.1R11.4 that could lead to an authenticated administrator to perform a file write via a maliciously crafted archive upload in the administrator web interface. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-22894 | HIGH 8.8 | Ivanti | Pulse Connect Secure | Nov 3, 2021 | May 3, 2022 | Unknown | A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to execute arbitrary code as the root user via maliciously crafted meeting room. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-8260 | HIGH 7.2 | Ivanti | Pulse Connect Secure | Nov 3, 2021 | May 3, 2022 | Unknown | A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary code execution using uncontrolled gzip extraction. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-22899 | HIGH 8.8 | Ivanti | Pulse Connect Secure | Nov 3, 2021 | May 3, 2022 | Unknown | A command injection vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to perform remote code execution via Windows Resource Profiles Feature Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-11510 | CRITICAL 10.0 | Ivanti | Pulse Connect Secure | Nov 3, 2021 | May 3, 2022 | Known | In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability . Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-11539 | HIGH 7.2 | Ivanti | Pulse Connect Secure and Pulse Policy Secure | Nov 3, 2021 | May 3, 2022 | Known | In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, 8.2RX before 8.2R12.1, and 8.1RX before 8.1R15.1 and Pulse Policy Secure version 9.0RX before 9.0R3.2, 5.4RX before 5.4R7.1, 5.3RX before 5.3R12.1, 5.2RX before 5.2R12.1, and 5.1RX before 5.1R15.1, the admin web interface allows an authenticated attacker to inject and execute commands. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-1906 | MEDIUM 6.2 | Qualcomm | Multiple Chipsets | Nov 3, 2021 | Nov 17, 2021 | Unknown | Improper handling of address deregistration on failure can lead to new GPU address allocation failure. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-1905 | HIGH 8.4 | Qualcomm | Multiple Chipsets | Nov 3, 2021 | May 3, 2022 | Unknown | Possible use after free due to improper handling of memory mapping of multiple processes simultaneously. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-10221 | HIGH 8.8 | rConfig | rConfig | Nov 3, 2021 | May 3, 2022 | Unknown | lib/ajaxHandlers/ajaxAddTemplate.php in rConfig through 3.94 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the fileName POST parameter. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-35395 | CRITICAL 9.8 | Realtek | AP-Router SDK | Nov 3, 2021 | Nov 17, 2021 | Unknown | Realtek Jungle SDK version v2.x up to v3.4.14B provides an HTTP web server exposing a management interface that can be used to configure the access point. Two versions of this management interface exists: one based on Go-Ahead named webs and another based on Boa named boa. Both of them are affected by these vulnerabilities. Specifically, these binaries are vulnerable to the following issues: - stack buffer overflow in formRebootCheck due to unsafe copy of submit-url parameter - stack buffer overflow in formWsc due to unsafe copy of submit-url parameter - stack buffer overflow in formWlanMultipleAP due to unsafe copy of submit-url parameter - stack buffer overflow in formWlSiteSurvey due to unsafe copy of ifname parameter - stack buffer overflow in formStaticDHCP due to unsafe copy of hostname parameter - stack buffer overflow in formWsc due to unsafe copy of 'peerPin' parameter - arbitrary command execution in formSysCmd via the sysCmd parameter - arbitrary command injection in formWsc via the 'peerPin' parameter Exploitability of identified issues will differ based on what the end vendor/manufacturer did with the Realtek SDK webserver. Some vendors use it as-is, others add their own authentication implementation, some kept all the features from the server, some remove some of them, some inserted their own set of features. However, given that Realtek SDK implementation is full of insecure calls and that developers tends to re-use those examples in their custom code, any binary based on Realtek SDK webserver will probably contains its own set of issues on top of the Realtek ones (if kept). Successful exploitation of these issues allows remote attackers to gain arbitrary code execution on the device. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-16651 | HIGH 7.8 | Roundcube | Roundcube Webmail | Nov 3, 2021 | May 3, 2022 | Unknown | Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-11652 | MEDIUM 6.5 | SaltStack | Salt | Nov 3, 2021 | May 3, 2022 | Unknown | An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-11651 | CRITICAL 9.8 | SaltStack | Salt | Nov 3, 2021 | May 3, 2022 | Unknown | An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-16846 | CRITICAL 9.8 | SaltStack | Salt | Nov 3, 2021 | May 3, 2022 | Unknown | An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-2380 | MEDIUM 6.6 | SAP | Customer Relationship Management (CRM) | Nov 3, 2021 | May 3, 2022 | Known | SAP CRM, 7.01, 7.02,7.30, 7.31, 7.33, 7.54, allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing "traverse to parent directory" are passed through to the file APIs. Required action: Apply updates per vendor instructions. | Open |
| CVE-2010-5326 | CRITICAL 10.0 | SAP | NetWeaver | Nov 3, 2021 | May 3, 2022 | Unknown | The Invoker Servlet on SAP NetWeaver Application Server Java platforms, possibly before 7.3, does not require authentication, which allows remote attackers to execute arbitrary code via an HTTP or HTTPS request, as exploited in the wild in 2013 through 2016, aka a "Detour" attack. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-9563 | MEDIUM 6.5 | SAP | NetWeaver | Nov 3, 2021 | May 3, 2022 | Unknown | BC-BMT-BPM-DSK in SAP NetWeaver AS JAVA 7.5 allows remote authenticated users to conduct XML External Entity (XXE) attacks via the sap.com~tc~bpem~him~uwlconn~provider~web/bpemuwlconn URI, aka SAP Security Note 2296909. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-6287 | CRITICAL 10.0 | SAP | NetWeaver | Nov 3, 2021 | May 3, 2022 | Unknown | SAP NetWeaver AS JAVA (LM Configuration Wizard), versions - 7.30, 7.31, 7.40, 7.50, does not perform an authentication check which allows an attacker without prior authentication to execute configuration tasks to perform critical actions against the SAP Java system, including the ability to create an administrative user, and therefore compromising Confidentiality, Integrity and Availability of the system, leading to Missing Authentication Check. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-6207 | CRITICAL 9.8 | SAP | Solution Manager | Nov 3, 2021 | May 3, 2022 | Unknown | SAP Solution Manager (User Experience Monitoring), version- 7.2, due to Missing Authentication Check does not perform any authentication for a service resulting in complete compromise of all SMDAgents connected to the Solution Manager. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-3976 | HIGH 7.5 | SAP | NetWeaver | Nov 3, 2021 | May 3, 2022 | Unknown | Directory traversal vulnerability in SAP NetWeaver AS Java 7.1 through 7.5 allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the fileName parameter to CrashFileDownloadServlet, aka SAP Security Note 2234971. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-16256 | CRITICAL 9.8 | SIMalliance | Toolbox Browser | Nov 3, 2021 | May 3, 2022 | Unknown | Some Samsung devices include the SIMalliance Toolbox Browser (aka S@T Browser) on the UICC, which might allow remote attackers to retrieve location and IMEI information, or retrieve other data or execute certain commands, via SIM Toolkit (STK) instructions in an SMS message, aka Simjacker. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-10148 | CRITICAL 9.8 | SolarWinds | Orion | Nov 3, 2021 | May 3, 2022 | Unknown | The SolarWinds Orion API is vulnerable to an authentication bypass that could allow a remote attacker to execute API commands. This vulnerability could allow a remote attacker to bypass authentication and execute API commands which may result in a compromise of the SolarWinds instance. SolarWinds Orion Platform versions 2019.4 HF 5, 2020.2 with no hotfix installed, and 2020.2 HF 1 are affected. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-35211 | CRITICAL 9.0 | SolarWinds | Serv-U | Nov 3, 2021 | Nov 17, 2021 | Known | Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2016-3643 | HIGH 7.8 | SolarWinds | Virtualization Manager | Nov 3, 2021 | May 3, 2022 | Unknown | SolarWinds Virtualization Manager 6.3.1 and earlier allow local users to gain privileges by leveraging a misconfiguration of sudo, as demonstrated by "sudo cat /etc/passwd." Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-10199 | HIGH 8.8 | Sonatype | Nexus Repository | Nov 3, 2021 | May 3, 2022 | Unknown | Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2). Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-20021 | CRITICAL 9.8 | SonicWall | SonicWall Email Security | Nov 3, 2021 | Nov 17, 2021 | Known | A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-7481 | HIGH 7.5 | SonicWall | SMA100 | Nov 3, 2021 | May 3, 2022 | Known | Vulnerability in SonicWall SMA100 allow unauthenticated user to gain read-only access to unauthorized resources. This vulnerablity impacted SMA100 version 9.0.0.3 and earlier. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-20022 | HIGH 7.2 | SonicWall | SonicWall Email Security | Nov 3, 2021 | Nov 17, 2021 | Known | SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to upload an arbitrary file to the remote host. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-20023 | MEDIUM 4.9 | SonicWall | SonicWall Email Security | Nov 3, 2021 | Nov 17, 2021 | Known | SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to read an arbitrary file on the remote host. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-20016 | CRITICAL 9.8 | SonicWall | SSLVPN SMA100 | Nov 3, 2021 | Nov 17, 2021 | Known | A SQL-Injection vulnerability in the SonicWall SSLVPN SMA100 product allows a remote unauthenticated attacker to perform SQL query to access username password and other session related information. This vulnerability impacts SMA100 build version 10.x. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-12271 | CRITICAL 9.8 | Sophos | SFOS | Nov 3, 2021 | May 3, 2022 | Known | A SQL injection issue was found in SFOS 17.0, 17.1, 17.5, and 18.0 before 2020-04-25 on Sophos XG Firewall devices, as exploited in the wild in April 2020. This affected devices configured with either the administration (HTTPS) service or the User Portal exposed on the WAN zone. A successful attack may have caused remote code execution that exfiltrated usernames and hashed passwords for the local device admin(s), portal admins, and user accounts used for remote access (but not external Active Directory or LDAP passwords) Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-10181 | CRITICAL 9.8 | Sumavision | Enhanced Multimedia Router (EMR) | Nov 3, 2021 | May 3, 2022 | Unknown | goform/formEMR30 in Sumavision Enhanced Multimedia Router (EMR) 3.0.4.27 allows creation of arbitrary users with elevated privileges (administrator) on a device, as demonstrated by a setString=new_user<*1*>administrator<*1*>123456 request. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-6327 | HIGH 8.8 | Symantec | Symantec Messaging Gateway | Nov 3, 2021 | May 3, 2022 | Unknown | The Symantec Messaging Gateway before 10.6.3-267 can encounter an issue of remote code execution, which describes a situation whereby an individual may obtain the ability to execute commands remotely on a target machine or in a target process. In this type of occurrence, after gaining access to the system, the attacker may attempt to elevate their privileges. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-18988 | HIGH 7.0 | TeamViewer | Desktop | Nov 3, 2021 | May 3, 2022 | Unknown | TeamViewer Desktop through 14.7.1965 allows a bypass of remote-login access control because the same key is used for different customers' installations. It used a shared AES key for all installations since at least as far back as v7.0.43148, and used it for at least OptionsPasswordAES in the current version of the product. If an attacker were to know this key, they could decrypt protect information stored in the registry or configuration files of TeamViewer. With versions before v9.x , this allowed for attackers to decrypt the Unattended Access password to the system (which allows for remote login to the system as well as headless file browsing). The latest version still uses the same key for OptionPasswordAES but appears to have changed how the Unattended Access password is stored. While in most cases an attacker requires an existing session on a system, if the registry/configuration keys were stored off of the machine (such as in a file share or online), an attacker could then decrypt the required password to login to the system. Required action: Apply updates per vendor instructions. | Open |
| CVE-2017-9248 | CRITICAL 9.8 | Progress | ASP.NET AJAX and Sitefinity | Nov 3, 2021 | May 3, 2022 | Unknown | Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-31755 | CRITICAL 9.8 | Tenda | AC11 Router | Nov 3, 2021 | Nov 17, 2021 | Unknown | An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-10987 | CRITICAL 9.8 | Tenda | AC1900 Router AC15 Model | Nov 3, 2021 | May 3, 2022 | Unknown | The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-14558 | CRITICAL 9.8 | Tenda | AC7, AC9, and AC10 Routers | Nov 3, 2021 | May 3, 2022 | Unknown | An issue was discovered on Tenda AC7 devices with firmware through V15.03.06.44_CN(AC7), AC9 devices with firmware through V15.03.05.19(6318)_CN(AC9), and AC10 devices with firmware through V15.03.06.23_CN(AC10). A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted goform/setUsbUnload request. This occurs because the "formsetUsbUnload" function executes a dosystemCmd function with untrusted input. Required action: Apply updates per vendor instructions. | Open |
| CVE-2018-20062 | CRITICAL 9.8 | ThinkPHP | noneCms | Nov 3, 2021 | May 3, 2022 | Unknown | An issue was discovered in NoneCms V1.3. thinkphp/library/think/App.php allows remote attackers to execute arbitrary PHP code via crafted use of the filter parameter, as demonstrated by the s=index/\think\Request/input&filter=phpinfo&data=1 query string. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-9082 | HIGH 8.8 | ThinkPHP | ThinkPHP | Nov 3, 2021 | May 3, 2022 | Unknown | ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= followed by the command. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-18187 | HIGH 7.5 | Trend Micro | OfficeScan | Nov 3, 2021 | May 3, 2022 | Unknown | Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-8467 | HIGH 8.8 | Trend Micro | Apex One and OfficeScan | Nov 3, 2021 | May 3, 2022 | Unknown | A migration tool component of Trend Micro Apex One (2019) and OfficeScan XG contains a vulnerability which could allow remote attackers to execute arbitrary code on affected installations (RCE). An attempted attack requires user authentication. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-8468 | HIGH 8.8 | Trend Micro | Apex One, OfficeScan and Worry-Free Business Security Agents | Nov 3, 2021 | May 3, 2022 | Unknown | Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) agents are affected by a content validation escape vulnerability which could allow an attacker to manipulate certain agent client components. An attempted attack requires user authentication. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-24557 | HIGH 7.8 | Trend Micro | Apex One, OfficeScan, and Worry-Free Business Security | Nov 3, 2021 | May 3, 2022 | Unknown | A vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 on Microsoft Windows may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function and attain privilege escalation. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-8599 | CRITICAL 9.8 | Trend Micro | Apex One and OfficeScan | Nov 3, 2021 | May 3, 2022 | Unknown | Trend Micro Apex One (2019) and OfficeScan XG server contain a vulnerable EXE file that could allow a remote attacker to write arbitrary data to an arbitrary path on affected installations and bypass ROOT login. Authentication is not required to exploit this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-36742 | HIGH 7.8 | Trend Micro | Apex One, Apex One as a Service, and Worry-Free Business Security | Nov 3, 2021 | Nov 17, 2021 | Unknown | A improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG and Worry-Free Business Security 10.0 SP1 allows a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-36741 | HIGH 8.8 | Trend Micro | Apex One, Apex One as a Service, and Worry-Free Business Security | Nov 3, 2021 | Nov 17, 2021 | Unknown | An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product�s management console in order to exploit this vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-20085 | HIGH 7.5 | TVT | NVMS-1000 | Nov 3, 2021 | May 3, 2022 | Unknown | TVT NVMS-1000 devices allow GET /.. Directory Traversal Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-5849 | HIGH 7.5 | Unraid | Unraid | Nov 3, 2021 | May 3, 2022 | Unknown | Unraid 6.8.0 allows authentication bypass. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-5847 | CRITICAL 9.8 | Unraid | Unraid | Nov 3, 2021 | May 3, 2022 | Unknown | Unraid through 6.8.0 allows Remote Code Execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-16759 | CRITICAL 9.8 | vBulletin | vBulletin | Nov 3, 2021 | May 3, 2022 | Unknown | vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-17496 | CRITICAL 9.8 | vBulletin | vBulletin | Nov 3, 2021 | May 3, 2022 | Unknown | vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-5544 | CRITICAL 9.8 | VMware | VMware ESXi and Horizon DaaS | Nov 3, 2021 | May 3, 2022 | Known | OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-3992 | CRITICAL 9.8 | VMware | ESXi | Nov 3, 2021 | May 3, 2022 | Known | OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-3950 | HIGH 7.8 | VMware | Multiple Products | Nov 3, 2021 | May 3, 2022 | Unknown | VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-22005 | CRITICAL 9.8 | VMware | vCenter Server | Nov 3, 2021 | Nov 17, 2021 | Known | The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-3952 | CRITICAL 9.8 | VMware | vCenter Server | Nov 3, 2021 | May 3, 2022 | Unknown | Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-21972 | CRITICAL 9.8 | VMware | vCenter Server | Nov 3, 2021 | Nov 17, 2021 | Known | The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-21985 | CRITICAL 9.8 | VMware | vCenter Server | Nov 3, 2021 | Nov 17, 2021 | Known | The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-4006 | CRITICAL 9.1 | VMware | Multiple Products | Nov 3, 2021 | May 3, 2022 | Unknown | VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector address have a command injection vulnerability. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-25213 | CRITICAL 10.0 | WordPress | File Manager Plugin | Nov 3, 2021 | May 3, 2022 | Unknown | The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-11738 | HIGH 7.5 | WordPress | Snap Creek Duplicator Plugin | Nov 3, 2021 | May 3, 2022 | Unknown | The Snap Creek Duplicator plugin before 1.3.28 for WordPress (and Duplicator Pro before 3.8.7.1) allows Directory Traversal via ../ in the file parameter to duplicator_download or duplicator_init. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-9978 | MEDIUM 6.1 | WordPress | Social Warfare Plugin | Nov 3, 2021 | May 3, 2022 | Unknown | The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-27561 | CRITICAL 9.8 | Yealink | Device Management | Nov 3, 2021 | Nov 17, 2021 | Unknown | Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication. Required action: Apply updates per vendor instructions. | Open |
| CVE-2021-40539 | CRITICAL 9.8 | Zoho | ManageEngine | Nov 3, 2021 | Nov 17, 2021 | Known | Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-10189 | CRITICAL 9.8 | Zoho | ManageEngine | Nov 3, 2021 | May 3, 2022 | Unknown | Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet and MDMLogUploaderServlet servlets. Required action: Apply updates per vendor instructions. | Open |
| CVE-2019-8394 | MEDIUM 6.5 | Zoho | ManageEngine | Nov 3, 2021 | May 3, 2022 | Unknown | Zoho ManageEngine ServiceDesk Plus (SDP) before 10.0 build 10012 allows remote attackers to upload arbitrary files via login page customization. Required action: Apply updates per vendor instructions. | Open |
| CVE-2020-29583 | CRITICAL 9.8 | Zyxel | Multiple Products | Nov 3, 2021 | May 3, 2022 | Unknown | Firmware version 4.60 of Zyxel USG devices contains an undocumented account (zyfwp) with an unchangeable password. The password for this account can be found in cleartext in the firmware. This account can be used by someone to login to the ssh server or web interface with admin privileges. Required action: Apply updates per vendor instructions. | Open |