Severity Date Published Date Updated Check Point Reference Source Industry Reference Description
High 23 Mar 2023 23 Mar 2023 CPAI-2023-0062 CVE-2022-4153
CVE-2022-4156
CVE-2022-4158
CVE-2022-4159
CVE-2022-4160
CVE-2022-4161
CVE-2022-4162
CVE-2022-4163
CVE-2022-4164
CVE-2022-4165
CVE-2022-4166
WordPress Contest Gallery Plugin SQL Injection (CVE-2022-4153; CVE-2022-4156; CVE-2022-4158; CVE-2022-4159; CVE-2022-4160; CVE-2022-4161; CVE-2022-4162; CVE-2022-4163; CVE-2022-4164; CVE-2022-4165; CVE-2022-4166)
High 22 Mar 2023 22 Mar 2023 CPAI-2023-0140 WordPress Multiple Plugins Directory Traversal
High 22 Mar 2023 22 Mar 2023 CPAI-2023-0135 Microsoft Windows NTLM Information Disclosure
High 22 Mar 2023 22 Mar 2023 CPAI-2023-0093 SSLv3 Deprecated Version
High 22 Mar 2023 22 Mar 2023 CPAI-2023-0092 TLSv1.1 Deprecated Version
High 22 Mar 2023 22 Mar 2023 CPAI-2023-0091 TLSv1.0 Deprecated Version
Critical 22 Mar 2023 22 Mar 2023 CPAI-2022-1045 CVE-2022-38916
Pagekit Arbitrary File Upload (CVE-2022-38916)
Critical 21 Mar 2023 21 Mar 2023 CPAI-2020-3791 CVE-2020-10567
Responsive Filemanager Arbitrary File Upload (CVE-2020-10567)
High 21 Mar 2023 21 Mar 2023 CPAI-2023-0134 Emotet UPS Phishing Email Campaign
High 21 Mar 2023 21 Mar 2023 CPAI-2023-0133 Hancitor Phishing Email Campaign
Critical 21 Mar 2023 21 Mar 2023 CPAI-2019-2860 CVE-2019-7269
Linear eMerge Command Injection (CVE-2019-7269)
Critical 21 Mar 2023 21 Mar 2023 CPAI-2019-2850 CVE-2019-7266
CVE-2019-7268
Linear eMerge Arbitrary File Upload (CVE-2019-7266; CVE-2019-7268)
High 21 Mar 2023 21 Mar 2023 CPAI-2022-1362 CVE-2022-45275
Dynamic Transaction Queuing System Arbitrary File Upload (CVE-2022-45275)
Critical 21 Mar 2023 21 Mar 2023 CPAI-2021-1680 CVE-2021-34427
Eclipse BIRT Unrestricted File Upload (CVE-2021-34427)
Critical 21 Mar 2023 21 Mar 2023 CPAI-2019-2842 CVE-2019-7267
Linear eMerge Path Traversal (CVE-2019-7267)
Critical 21 Mar 2023 21 Mar 2023 CPAI-2023-0146 Vulnerability Scanning Techniques
Critical 18 Jan 2023 21 Mar 2023 CPAI-2022-1128 CVE-2022-46169
Cacti Command Injection (CVE-2022-46169)
High 21 Mar 2023 21 Mar 2023 CPAI-2023-0143 Darkside Ransomware Phishing Email Campaign
High 21 Mar 2023 21 Mar 2023 CPAI-2023-0141 Dridex Phishing Email Campaign
Medium 19 Mar 2023 19 Mar 2023 CPAI-2017-1627 CVE-2017-5040
Google Chrome Information Disclosure (CVE-2017-5040)
Critical 19 Mar 2023 19 Mar 2023 CPAI-2022-1364 CVE-2022-39952
Fortinet FortiNAC Arbitrary File Write (CVE-2022-39952)
High 19 Mar 2023 19 Mar 2023 CPAI-2023-0139 WordPress Job Manager Plugin Arbitrary File Upload
Critical 17 Mar 2023 17 Mar 2023 CPAI-2023-0144 Microsoft CVE-2023-23397 CVE-2023-23397
Microsoft Outlook Privilege Escalation (CVE-2023-23397)
High 16 Mar 2023 16 Mar 2023 CPAI-2023-0100 Microsoft CVE-2023-23416 CVE-2023-23416
Microsoft Windows Cryptographic Services Remote Code Execution (CVE-2023-23416)
High 28 Feb 2023 16 Mar 2023 CPAI-2020-3742 CVE-2020-6541
Google Chrome Use After Free (CVE-2020-6541)
High 5 Feb 2023 16 Mar 2023 CPAI-2023-0060 Google Chrome Integer Overflow
High 22 Jan 2023 16 Mar 2023 CPAI-2022-1141 CVE-2022-47966
Zoho ManageEngine Remote Code Execution (CVE-2022-47966)
Critical 15 Mar 2023 15 Mar 2023 CPAI-2019-2755 CVE-2019-10123
AIS logistics SQL Injection (CVE-2019-10123)
Critical 15 Mar 2023 15 Mar 2023 CPAI-2019-2857 CVE-2019-13585
FANUC Robotics Virtual Robot Controller Buffer Overflow (CVE-2019-13585)
High 15 Mar 2023 15 Mar 2023 CPAI-2022-1322 CVE-2022-40127
Apache Airflow Command Injection (CVE-2022-40127)
High 26 Feb 2023 15 Mar 2023 CPAI-2022-1239 CVE-2022-46071
CVE-2022-46127
CVE-2022-46472
CVE-2022-46946
CVE-2022-46947
CVE-2022-46949
Helmet Store Showroom Site SQL injection (CVE-2022-46071; CVE-2022-46127; CVE-2022-46472; CVE-2022-46946; CVE-2022-46947; CVE-2022-46949)
High 15 Mar 2023 15 Mar 2023 CPAI-2022-1213 CVE-2022-4732
Microweber Project Path Traversal (CVE-2022-4732)
Medium 14 Mar 2023 14 Mar 2023 CPAI-2023-0126 Microsoft CVE-2023-24880 CVE-2023-24880
Microsoft Windows SmartScreen Security Feature Bypass (CVE-2023-24880)
High 14 Mar 2023 14 Mar 2023 CPAI-2023-0105 Microsoft CVE-2023-23410 CVE-2023-23410
Microsoft Windows HTTP.sys Elevation of Privilege (CVE-2023-23410)
High 13 Mar 2023 13 Mar 2023 CPAI-2023-0120 Matanbuchus Phishing Campaign
Medium 13 Mar 2023 13 Mar 2023 CPAI-2021-1585 CVE-2021-20323
Red Hat Keycloak Cross-Site Scripting (CVE-2021-20323)
High 3 Jan 2023 13 Mar 2023 CPAI-2018-2269 CVE-2018-18820
Icecast Server Stack Buffer Overflow (CVE-2018-18820)
Medium 12 Mar 2023 12 Mar 2023 CPAI-2020-3777 CVE-2020-8227
Nextcloud Desktop Client Path Traversal (CVE-2020-8227)
High 12 Mar 2023 12 Mar 2023 CPAI-2018-2339 CVE-2018-3758
Node.js Express Cart Directory Traversal (CVE-2018-3758)
Critical 12 Mar 2023 12 Mar 2023 CPAI-2019-2839 CVE-2019-16119
WordPress 10Web Photo Gallery Plugin SQL injection (CVE-2019-16119)
Critical 12 Mar 2023 12 Mar 2023 CPAI-2022-1331 CVE-2022-45025
Markdown Preview Enhanced Command Injection (CVE-2022-45025)
Critical 9 Mar 2023 9 Mar 2023 CPAI-2022-1228 CVE-2022-38488
Logrocket Oauth2 Example SQL Injection (CVE-2022-38488)
High 9 Mar 2023 9 Mar 2023 CPAI-2019-2734 CVE-2019-6710
CVE-2019-7391
Zyxel Multiple Products Cross-Site Request Forgery (CVE-2019-7391; CVE-2019-6710)
High 9 Mar 2023 9 Mar 2023 CPAI-2017-1617 CVE-2017-8740
Microsoft Edge Memory Corruption (CVE-2017-8740)
High 8 Mar 2023 8 Mar 2023 CPAI-2023-0107 Astaroth Boleto Phishing Email Campaign
Critical 8 Mar 2023 8 Mar 2023 CPAI-2022-1326 CVE-2022-3900
WordPress Cooked Pro Plugin Insecure Deserialization (CVE-2022-3900)
Critical 8 Mar 2023 8 Mar 2023 CPAI-2021-1676 CVE-2021-43267
Linux Kernel TIPC Heap Overflow (CVE-2021-43267)
High 8 Mar 2023 8 Mar 2023 CPAI-2021-1628 CVE-2021-38001
Google Chrome V8 Type Confusion (CVE-2021-38001)
High 8 Mar 2023 8 Mar 2023 CPAI-2022-1242 CVE-2022-37958
Microsoft Windows NEGOEX Buffer Overflow (CVE-2022-37958)
Critical 8 Mar 2023 8 Mar 2023 CPAI-2022-1241 CVE-2022-43781
Atlassian Bitbucket Command Injection (CVE-2022-43781)
×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK