| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | CVE ID | Vendor | Software | CVSSv3 | CISA Date Added | Memory Corruption | Root Cause | Root Cause Category | Exploited As 0-Day | Software Type | Notes | Rerences | ||||||||||||
2 | CVE-2023-22527 | Atlassian | Confluence Data Center and Server | 10 | 01/24/2024 | FALSE | OGNL Injection via Insecure Exposed Function | Insecure Exposed Function | FALSE | Enterprise Software | https://blog.projectdiscovery.io/atlassian-confluence-ssti-remote-code-execution/ | |||||||||||||
4 | CVE-2023-34048 | VMware | vCenter Server | 9.8 | 01/22/2024 | TRUE | Memory Corruption | Memory Corruption | TRUE | Appliance | No POC, evidence of 2021 | https://www.mandiant.com/resources/blog/chinese-vmware-exploitation-since-2021 | ||||||||||||
5 | CVE-2023-35082 | Ivanti | Endpoint Manager Mobile (EPMM) and MobileIron Core | 10 | 01/18/2024 | FALSE | Authorization Bypass via Routing / Path Abuse | Routing / Path Abuse | FALSE | Appliance | https://www.rapid7.com/blog/post/2023/08/02/cve-2023-35082-mobileiron-core-unauthenticated-api-access-vulnerability/ | |||||||||||||
11 | CVE-2024-21887 | Ivanti | Connect Secure and Policy Secure | 9.1 | 01/10/2024 | FALSE | Authorization Bypass via Routing / Path Abuse | Routing / Path Abuse | TRUE | Appliance | https://attackerkb.com/topics/AdUh6by52K/cve-2023-46805/rapid7-analysis | |||||||||||||
12 | CVE-2023-29357 | Microsoft | SharePoint Server | 9.8 | 01/10/2024 | FALSE | Authorization Bypass via Insecure Exposed Function | Insecure Exposed Function | FALSE | Enterprise Software | alg none | https://testbnull.medium.com/p2o-vancouver-2023-v%C3%A0i-d%C3%B2ng-v%E1%BB%81-sharepoint-pre-auth-rce-chain-cve-2023-29357-cve-2023-24955-ed | ||||||||||||
13 | CVE-2023-27524 | Apache | Superset | 9.8 | 01/08/2024 | FALSE | Authorization Bypass via Default Secret | Default Secret | FALSE | Enterprise Middleware | https://www.horizon3.ai/cve-2023-27524-insecure-default-configuration-in-apache-superset-leads-to-remote-code-execution/ | |||||||||||||
15 | CVE-2023-38203 | Adobe | ColdFusion | 9.8 | 01/08/2024 | FALSE | Deserialization via Insecure Exposed Function | Insecure Exposed Function | FALSE | Enterprise Middleware | https://blog.projectdiscovery.io/adobe-coldfusion-rce/ | |||||||||||||
18 | CVE-2023-29300 | Adobe | ColdFusion | 9.8 | 01/08/2024 | FALSE | Deserialization via Insecure Exposed Function | Insecure Exposed Function | FALSE | Enterprise Middleware | https://www.rapid7.com/blog/post/2023/07/17/etr-active-exploitation-of-multiple-adobe-coldfusion-vulnerabilities/ | |||||||||||||
23 | CVE-2023-6448 | Unitronics | Vision PLC and HMI | 9.8 | 12/11/2023 | FALSE | Authorization Bypass via Default Secret | Default Secret | TRUE | PLC | No POC - 1111 | https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems | ||||||||||||
24 | CVE-2023-41265 | Qlik | Sense | 9.9 | 12/07/2023 | FALSE | Authorization Bypass via Request Smuggling | Request Smuggling | FALSE | Enterprise Software | https://www.praetorian.com/blog/qlik-sense-technical-exploit/ | |||||||||||||
32 | CVE-2023-6345 | Skia | 9.6 | 11/30/2023 | TRUE | Memory Corruption | Memory Corruption | TRUE | Embedded Library | https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html | ||||||||||||||
36 | CVE-2023-1671 | Sophos | Web Appliance | 9.8 | 11/16/2023 | FALSE | Command Injection via Insecure Exposed Function | Insecure Exposed Function | FALSE | Appliance | https://vulncheck.com/blog/cve-2023-1671-analysis | |||||||||||||
41 | CVE-2023-36845 | Juniper | Junos OS | 9.8 | 11/13/2023 | FALSE | File Write via Insecure Exposed Function | Insecure Exposed Function | FALSE | Appliance | PHP Magic | https://vulncheck.com/blog/juniper-cve-2023-36845 | ||||||||||||
43 | CVE-2023-47246 | SysAid | SysAid Server | 9.8 | 11/13/2023 | FALSE | File Write via Insecure Exposed Function | Insecure Exposed Function | TRUE | Enterprise Software | https://www.huntress.com/blog/critical-vulnerability-sysaid-cve-2023-47246 | |||||||||||||
48 | CVE-2023-22518 | Atlassian | Confluence Data Center and Server | 10 | 11/07/2023 | FALSE | Authorization Bypass via Insecure Exposed Function | Insecure Exposed Function | FALSE | Enterprise Software | Setup Abuse | https://github.com/ForceFledgling/CVE-2023-22518 | ||||||||||||
49 | CVE-2023-46604 | Apache | ActiveMQ | 9.8 | 11/02/2023 | FALSE | Deserialization via Insecure Exposed Function | Insecure Exposed Function | FALSE | Enterprise Middleware | https://exp10it.io/2023/10/apache-activemq-%E7%89%88%E6%9C%AC-5.18.3-rce-%E5%88%86%E6%9E%90/ | |||||||||||||
51 | CVE-2023-46747 | F5 | BIG-IP Configuration Utility | 9.8 | 10/31/2023 | FALSE | Authorization Bypass via Request Smuggling | Request Smuggling | FALSE | Appliance | Out-of-date dependency | https://www.praetorian.com/blog/refresh-compromising-f5-big-ip-with-request-smuggling-cve-2023-46747/?ref=blog.projectdiscovery.io | ||||||||||||
56 | CVE-2023-20198 | Cisco | IOS XE Web UI | 10 | 10/16/2023 | FALSE | Authorization Bypass via Routing / Path Abuse | Routing / Path Abuse | TRUE | Appliance | Path Normalization | https://www.horizon3.ai/cisco-ios-xe-cve-2023-20198-deep-dive-and-poc/ | ||||||||||||
63 | CVE-2023-22515 | Atlassian | Confluence Data Center and Server | 10 | 10/05/2023 | FALSE | Authorization Bypass via Insecure Exposed Function | Insecure Exposed Function | TRUE | Enterprise Software | Setup Abuse | https://attackerkb.com/topics/Q5f0ItSzw5/cve-2023-22515/rapid7-analysis | ||||||||||||
65 | CVE-2023-42793 | JetBrains | TeamCity | 9.8 | 10/04/2023 | FALSE | Authorization Bypass via Routing / Path Abuse | Routing / Path Abuse | FALSE | Enterprise Software | https://www.sonarsource.com/blog/teamcity-vulnerability/ | |||||||||||||
70 | CVE-2023-41993 | Apple | Multiple Products | 9.8 | 09/25/2023 | TRUE | Memory Corruption | Memory Corruption | TRUE | Cell Phone | https://github.com/po6ix/POC-for-CVE-2023-41993 | |||||||||||||
84 | CVE-2023-20269 | Cisco | Adaptive Security Appliance and Firepower Threat Defense | 9.1 | 09/13/2023 | FALSE | Credential Brute Force via Routing / Path Abuse | Routing / Path Abuse | TRUE | Appliance | No POC | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC | ||||||||||||
91 | CVE-2023-33246 | Apache | RocketMQ | 9.8 | 09/06/2023 | FALSE | Command Injection via Insecure Exposed Function | Insecure Exposed Function | Enterprise Middleware | https://attackerkb.com/topics/YBI7e7fY0a/cve-2023-33246 | ||||||||||||||
94 | CVE-2023-38035 | Ivanti | Sentry | 9.8 | 08/22/2023 | FALSE | Authorization Bypass via Insecure Exposed Function | Insecure Exposed Function | Appliance | https://www.horizon3.ai/ivanti-sentry-authentication-bypass-cve-2023-38035-deep-dive/ | ||||||||||||||
96 | CVE-2023-26359 | Adobe | ColdFusion | 9.8 | 08/21/2023 | FALSE | Deserialization via Insecure Exposed Function | Insecure Exposed Function | Enterprise Middleware | https://attackerkb.com/topics/F36ClHTTIQ/cve-2023-26360/rapid7-analysis | ||||||||||||||
97 | CVE-2023-24489 | Citrix | Content Collaboration | 9.8 | 08/16/2023 | FALSE | Authorization Bypass via Weak Encryption | Weak Encryption | Appliance | https://blog.assetnote.io/2023/07/04/citrix-sharefile-rce/ | ||||||||||||||
103 | CVE-2023-35078 | Ivanti | Endpoint Manager Mobile (EPMM) | 10 | 07/25/2023 | FALSE | Authorization Bypass via Routing / Path Abuse | Routing / Path Abuse | Appliance | https://attackerkb.com/topics/8vqyuSfHRq/cve-2023-35078 | ||||||||||||||
106 | CVE-2023-3519 | Citrix | NetScaler ADC and NetScaler Gateway | 9.8 | 07/19/2023 | TRUE | Memory Corruption | Memory Corruption | Appliance | https://bishopfox.com/blog/analysis-exploitation-cve-2023-3519 | ||||||||||||||
128 | CVE-2023-27992 | Zyxel | Multiple Network-Attached Storage (NAS) Devices | 9.8 | 06/23/2023 | FALSE | Command Injection via Insecure Exposed Function | Insecure Exposed Function | Appliance | https://securityintelligence.com/x-force/ibm-identifies-zero-day-vulnerability-zyxel-nas-devices/ | ||||||||||||||
130 | CVE-2023-20887 | VMware | Aria Operations for Networks | 9.8 | 06/22/2023 | FALSE | Authorization Bypass via Routing / Path Abuse | Routing / Path Abuse | Appliance | https://github.com/sinsinology/CVE-2023-20887 | ||||||||||||||
135 | CVE-2023-27997 | Fortinet | FortiOS and FortiProxy SSL-VPN | 9.8 | 06/13/2023 | TRUE | Memory Corruption | Memory Corruption | TRUE | Appliance | https://blog.lexfo.fr/xortigate-cve-2023-27997.html, https://www.fortinet.com/blog/psirt-blogs/analysis-of-cve-2023-27997-and-clarifications-on-volt-typhoon-campaign | |||||||||||||
137 | CVE-2023-33010 | Zyxel | Multiple Firewalls | 9.8 | 06/05/2023 | TRUE | Memory Corruption | Memory Corruption | FALSE | Appliance | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls | |||||||||||||
138 | CVE-2023-33009 | Zyxel | Multiple Firewalls | 9.8 | 06/05/2023 | TRUE | Memory Corruption | Memory Corruption | FALSE | Appliance | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls | |||||||||||||
139 | CVE-2023-34362 | Progress | MOVEit Transfer | 9.8 | 06/02/2023 | FALSE | SQL Injection via Routing / Path Abuse | Routing / Path Abuse | Enterprise Software | https://www.horizon3.ai/moveit-transfer-cve-2023-34362-deep-dive-and-indicators-of-compromise/ | ||||||||||||||
140 | CVE-2023-28771 | Zyxel | Multiple Firewalls | 9.8 | 05/31/2023 | FALSE | Command Injection via Insecure Exposed Function | Insecure Exposed Function | Appliance | https://attackerkb.com/topics/N3i8dxpFKS/cve-2023-28771/rapid7-analysis | ||||||||||||||
141 | CVE-2023-2868 | Barracuda Networks | Email Security Gateway (ESG) Appliance | 9.8 | 05/26/2023 | FALSE | Command Injection via Insecure Exposed Function | Insecure Exposed Function | Appliance | https://attackerkb.com/topics/2Z0CWopGPX/cve-2023-2868/rapid7-analysis | ||||||||||||||
154 | CVE-2023-25717 | Ruckus Wireless | Multiple Products | 9.8 | 05/12/2023 | FALSE | Command Injection via Insecure Exposed Function | Insecure Exposed Function | Appliance | https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/ | ||||||||||||||
159 | CVE-2023-2136 | Chrome | 9.6 | 04/21/2023 | TRUE | Memory Corruption | Memory Corruption | TRUE | Browser | https://bugs.chromium.org/p/chromium/issues/detail?id=1432603 | ||||||||||||||
161 | CVE-2023-27350 | PaperCut | MF/NG | 9.8 | 04/21/2023 | FALSE | Authentication Bypass via Insecure Exposed Function | Insecure Exposed Function | Enterprise Software | Setup Abuse | https://www.horizon3.ai/papercut-cve-2023-27350-deep-dive-and-indicators-of-compromise/ | |||||||||||||
166 | CVE-2023-29492 | Novi Survey | Novi Survey | 9.8 | 04/13/2023 | FALSE | Deserialization via Insecure Exposed Function | Insecure Exposed Function | Enterprise Software | No POC | https://nvd.nist.gov/vuln/detail/CVE-2023-29492 | |||||||||||||
187 | CVE-2023-23397 | Microsoft | Office | 9.8 | 03/14/2023 | FALSE | Authorization Bypass via Insecure Exposed Function | Insecure Exposed Function | Enterprise Software | UNC Path | https://unit42.paloaltonetworks.com/threat-brief-cve-2023-23397/ | |||||||||||||
213 | ||||||||||||||||||||||||
214 | ||||||||||||||||||||||||
215 | ||||||||||||||||||||||||
216 | ||||||||||||||||||||||||
217 | ||||||||||||||||||||||||
218 | ||||||||||||||||||||||||
219 | ||||||||||||||||||||||||
220 | ||||||||||||||||||||||||
221 | ||||||||||||||||||||||||
222 | ||||||||||||||||||||||||
223 | ||||||||||||||||||||||||
224 | ||||||||||||||||||||||||
225 | ||||||||||||||||||||||||
226 | ||||||||||||||||||||||||
227 | ||||||||||||||||||||||||
228 | ||||||||||||||||||||||||
229 | ||||||||||||||||||||||||
230 | ||||||||||||||||||||||||
231 | ||||||||||||||||||||||||
232 | ||||||||||||||||||||||||
233 | ||||||||||||||||||||||||
234 | ||||||||||||||||||||||||
235 | ||||||||||||||||||||||||
236 | ||||||||||||||||||||||||
237 | ||||||||||||||||||||||||
238 | ||||||||||||||||||||||||
239 | ||||||||||||||||||||||||
240 | ||||||||||||||||||||||||
241 | ||||||||||||||||||||||||
242 | ||||||||||||||||||||||||
243 | ||||||||||||||||||||||||
244 | ||||||||||||||||||||||||
245 | ||||||||||||||||||||||||
246 | ||||||||||||||||||||||||
247 | ||||||||||||||||||||||||
248 | ||||||||||||||||||||||||
249 | ||||||||||||||||||||||||
250 | ||||||||||||||||||||||||
251 | ||||||||||||||||||||||||
252 | ||||||||||||||||||||||||
253 | ||||||||||||||||||||||||
254 | ||||||||||||||||||||||||
255 | ||||||||||||||||||||||||
256 | ||||||||||||||||||||||||
257 | ||||||||||||||||||||||||
258 | ||||||||||||||||||||||||
259 | ||||||||||||||||||||||||
260 | ||||||||||||||||||||||||
261 | ||||||||||||||||||||||||
262 | ||||||||||||||||||||||||
263 | ||||||||||||||||||||||||
264 | ||||||||||||||||||||||||
265 | ||||||||||||||||||||||||
266 | ||||||||||||||||||||||||
267 | ||||||||||||||||||||||||
268 | ||||||||||||||||||||||||
269 | ||||||||||||||||||||||||
270 |