Vulnerabilities
Vulnerable Software
Security Vulnerabilities - Known exploited
CVE-2023-48365
Known exploited
Qlik Sense Enterprise for Windows before August 2023 Patch 2 allows unauthenticated remote code execution, aka QB-21683. Due to improper validation of HTTP headers, a remote attacker is able to elevate their privilege by tunneling HTTP requests, allowing them to execute HTTP requests on the backend server that hosts the repository application. The fixed versions are August 2023 Patch 2, May 2023 Patch 6, February 2023 Patch 10, November 2022 Patch 12, August 2022 Patch 14, May 2022 Patch 16, February 2022 Patch 15, and November 2021 Patch 17. NOTE: this issue exists because of an incomplete fix for CVE-2023-41265.
CVSS Score
9.6
EPSS Score
0.694
Published
2023-11-15
CVE-2023-36036
Known exploited
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS Score
7.8
EPSS Score
0.01
Published
2023-11-14
CVE-2023-36033
Known exploited
Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS Score
7.8
EPSS Score
0.002
Published
2023-11-14
CVE-2023-36025
Known exploited
Windows SmartScreen Security Feature Bypass Vulnerability
CVSS Score
8.8
EPSS Score
0.907
Published
2023-11-14
CVE-2023-47246
Known exploited
In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.
CVSS Score
9.8
EPSS Score
0.944
Published
2023-11-10
CVE-2023-22518
Known exploited
All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability.  Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
CVSS Score
10.0
EPSS Score
0.944
Published
2023-10-31
CVE-2023-46604
Known exploited
The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.
CVSS Score
10.0
EPSS Score
0.944
Published
2023-10-27
CVE-2023-46747
Known exploited
Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CVSS Score
9.8
EPSS Score
0.944
Published
2023-10-26
CVE-2023-46748
Known exploited
An authenticated SQL injection vulnerability exists in the BIG-IP Configuration utility which may allow an authenticated attacker with network access to the Configuration utility through the BIG-IP management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CVSS Score
8.8
EPSS Score
0.036
Published
2023-10-26
CVE-2023-43208
Known exploited
NextGen Healthcare Mirth Connect before version 4.4.1 is vulnerable to unauthenticated remote code execution. Note that this vulnerability is caused by the incomplete patch of CVE-2023-37679.
CVSS Score
9.8
EPSS Score
0.944
Published
2023-10-26


Contact Us

Shodan ® - All rights reserved