Vulnerabilities
Vulnerable Software
Security Vulnerabilities - Known exploited
CVE-2023-34048
Known exploited
vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.
CVSS Score
9.8
EPSS Score
0.92
Published
2023-10-25
CVE-2023-20273
Known exploited
A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands with the privileges of root. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
CVSS Score
7.2
EPSS Score
0.922
Published
2023-10-25
CVE-2023-5631
Known exploited
Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.
CVSS Score
6.1
EPSS Score
0.902
Published
2023-10-18
CVE-2023-45727
Known exploited
Proself Enterprise/Standard Edition Ver5.62 and earlier, Proself Gateway Edition Ver1.65 and earlier, and Proself Mail Sanitize Edition Ver1.08 and earlier allow a remote unauthenticated attacker to conduct XML External Entity (XXE) attacks. By processing a specially crafted request containing malformed XML data, arbitrary files on the server containing account information may be read by the attacker.
CVSS Score
7.5
EPSS Score
0.206
Published
2023-10-18
CVE-2023-20198
Known exploited
Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343.
CVSS Score
10.0
EPSS Score
0.942
Published
2023-10-16
CVE-2023-41763
Known exploited
Skype for Business Elevation of Privilege Vulnerability
CVSS Score
5.3
EPSS Score
0.198
Published
2023-10-10
CVE-2023-36584
Known exploited
Windows Mark of the Web Security Feature Bypass Vulnerability
CVSS Score
5.4
EPSS Score
0.201
Published
2023-10-10
CVE-2023-36563
Known exploited
Microsoft WordPad Information Disclosure Vulnerability
CVSS Score
6.5
EPSS Score
0.007
Published
2023-10-10
CVE-2023-44487
Known exploited
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVSS Score
7.5
EPSS Score
0.944
Published
2023-10-10
CVE-2023-4966
Known exploited
Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA  virtual server.
CVSS Score
9.4
EPSS Score
0.943
Published
2023-10-10


Contact Us

Shodan ® - All rights reserved