Dernières vulnérabilités du Jeudi 10 Août 2023

Dernières vulnérabilités du Jeudi 10 Août 2023
https://www.securitricks.com/content/images/size/w600/format/webp/2023/12/VULNERABILITIES-REPORTS-LOGO.png
{{titre}}

Dernière mise à jour efféctuée le 10/08/2023 à 23:58:02

(1) Vulnérabilité(s) CRITICAL [9.0, 10.0]

Source : hackerone.com

Vulnérabilité ID : CVE-2023-35085

Première publication le : 10-08-2023 19:15:09
Dernière modification le : 10-08-2023 19:15:09

Description :
An integer overflow vulnerability in all UniFi Access Points and Switches, excluding the Switch Flex Mini, with SNMP Monitoring and default settings enabled could allow a Remote Code Execution (RCE). Affected Products: All UniFi Access Points (Version 6.5.50 and earlier) All UniFi Switches (Version 6.5.32 and earlier) -USW Flex Mini excluded. Mitigation: Update UniFi Access Points to Version 6.5.62 or later. Update the UniFi Switches to Version 6.5.59 or later.

CVE ID : CVE-2023-35085
Source : support@hackerone.com
Score CVSS : 9.0

Références :
https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 | source : support@hackerone.com


(37) Vulnérabilité(s) HIGH [7.0, 8.9]

Source : wordfence.com

Vulnérabilité ID : CVE-2023-4276

Première publication le : 10-08-2023 07:15:37
Dernière modification le : 10-08-2023 12:43:50

Description :
The Absolute Privacy plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.1. This is due to missing nonce validation on the 'abpr_profileShortcode' function. This makes it possible for unauthenticated attackers to change user email and password via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2023-4276
Source : security@wordfence.com
Score CVSS : 8.8

Références :
https://plugins.trac.wordpress.org/browser/absolute-privacy/trunk/profile_page.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/f3855e84-b97e-4729-8a48-55f2a2444e2c?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2023-4277

Première publication le : 10-08-2023 07:15:37
Dernière modification le : 10-08-2023 12:43:50

Description :
The Realia plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.4.0. This is due to missing nonce validation on the 'process_change_profile_form' function. This makes it possible for unauthenticated attackers to change user email via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2023-4277
Source : security@wordfence.com
Score CVSS : 8.8

Références :
https://plugins.trac.wordpress.org/browser/realia/tags/1.4.0/includes/post-types/class-realia-post-type-user.php#L112 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/06f33e18-0bdd-4c56-a8df-fc1969b9ecf8?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Source : checkmk.com

Vulnérabilité ID : CVE-2023-31209

Première publication le : 10-08-2023 09:15:12
Dernière modification le : 10-08-2023 12:43:50

Description :
Improper neutralization of active check command arguments in Checkmk < 2.1.0p32, < 2.0.0p38, < 2.2.0p4 leads to arbitrary command execution for authenticated users.

CVE ID : CVE-2023-31209
Source : security@checkmk.com
Score CVSS : 8.8

Références :
https://checkmk.com/werk/15194 | source : security@checkmk.com

Vulnérabilité : CWE-74


Source : hackerone.com

Vulnérabilité ID : CVE-2023-32560

Première publication le : 10-08-2023 20:15:10
Dernière modification le : 10-08-2023 20:15:10

Description :
An attacker can send a specially crafted message to the Wavelink Avalanche Manager, which could result in service disruption or arbitrary code execution. Thanks to a Researcher at Tenable for finding and reporting. Fixed in version 6.4.1.

CVE ID : CVE-2023-32560
Source : support@hackerone.com
Score CVSS : 8.8

Références :
https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US | source : support@hackerone.com


Vulnérabilité ID : CVE-2023-32563

Première publication le : 10-08-2023 20:15:10
Dernière modification le : 10-08-2023 20:15:10

Description :
An unauthenticated attacker could achieve the code execution through a RemoteControl server.

CVE ID : CVE-2023-32563
Source : support@hackerone.com
Score CVSS : 8.8

Références :
https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US | source : support@hackerone.com


Vulnérabilité ID : CVE-2023-38034

Première publication le : 10-08-2023 19:15:09
Dernière modification le : 10-08-2023 19:15:09

Description :
A command injection vulnerability in the DHCP Client function of all UniFi Access Points and Switches, excluding the Switch Flex Mini, could allow a Remote Code Execution (RCE). Affected Products: All UniFi Access Points (Version 6.5.53 and earlier) All UniFi Switches (Version 6.5.32 and earlier) -USW Flex Mini excluded. Mitigation: Update UniFi Access Points to Version 6.5.62 or later. Update UniFi Switches to Version 6.5.59 or later.

CVE ID : CVE-2023-38034
Source : support@hackerone.com
Score CVSS : 8.3

Références :
https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 | source : support@hackerone.com


Vulnérabilité ID : CVE-2023-32561

Première publication le : 10-08-2023 20:15:10
Dernière modification le : 10-08-2023 20:15:10

Description :
A previously generated artifact by an administrator could be accessed by an attacker. The contents of this artifact could lead to authentication bypass. Fixed in version 6.4.1.

CVE ID : CVE-2023-32561
Source : support@hackerone.com
Score CVSS : 7.1

Références :
https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US | source : support@hackerone.com


Source : samsung.com

Vulnérabilité ID : CVE-2023-30680

Première publication le : 10-08-2023 02:15:10
Dernière modification le : 10-08-2023 12:43:50

Description :
Improper privilege management vulnerability in MMIGroup prior to SMR Aug-2023 Release 1 allows code execution with privilege.

CVE ID : CVE-2023-30680
Source : mobile.security@samsung.com
Score CVSS : 8.4

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-269


Vulnérabilité ID : CVE-2023-30691

Première publication le : 10-08-2023 02:15:11
Dernière modification le : 10-08-2023 12:43:50

Description :
Parcel mismatch in AuthenticationConfig prior to SMR Aug-2023 Release 1 allows local attacker to privilege escalation.

CVE ID : CVE-2023-30691
Source : mobile.security@samsung.com
Score CVSS : 8.4

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-20


Vulnérabilité ID : CVE-2023-30679

Première publication le : 10-08-2023 02:15:10
Dernière modification le : 10-08-2023 12:43:50

Description :
Improper access control in HDCP trustlet prior to SMR Aug-2023 Release 1 allows local attackers to execute arbitrary code.

CVE ID : CVE-2023-30679
Source : mobile.security@samsung.com
Score CVSS : 7.8

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-284


Vulnérabilité ID : CVE-2023-30699

Première publication le : 10-08-2023 02:15:12
Dernière modification le : 10-08-2023 12:43:50

Description :
Out-of-bounds write vulnerability in parser_hvcC function of libsimba library prior to SMR Aug-2023 Release 1 allows code execution by remote attackers.

CVE ID : CVE-2023-30699
Source : mobile.security@samsung.com
Score CVSS : 7.5

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-787


Source : github.com

Vulnérabilité ID : CVE-2023-39963

Première publication le : 10-08-2023 18:15:10
Dernière modification le : 10-08-2023 18:15:10

Description :
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 20.0.0 and prior to versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, a missing password confirmation allowed an attacker, after successfully stealing a session from a logged in user, to create app passwords for the victim. Nextcloud server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.

CVE ID : CVE-2023-39963
Source : security-advisories@github.com
Score CVSS : 8.1

Références :
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j4qm-5q5x-54m5 | source : security-advisories@github.com
https://github.com/nextcloud/server/pull/39416 | source : security-advisories@github.com
https://hackerone.com/reports/2067572 | source : security-advisories@github.com

Vulnérabilité : CWE-284


Vulnérabilité ID : CVE-2023-39962

Première publication le : 10-08-2023 18:15:10
Dernière modification le : 10-08-2023 18:15:10

Description :
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 19.0.0 and prior to versions 19.0.13.10, 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, a malicious user could delete any personal or global external storage, making them inaccessible for everyone else as well. Nextcloud server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 19.0.13.10, 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. As a workaround, disable app files_external. This also makes the external storage inaccessible but retains the configurations until a patched version has been deployed.

CVE ID : CVE-2023-39962
Source : security-advisories@github.com
Score CVSS : 7.7

Références :
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xwxx-2752-w3xm | source : security-advisories@github.com
https://github.com/nextcloud/server/pull/39323 | source : security-advisories@github.com
https://hackerone.com/reports/2047168 | source : security-advisories@github.com

Vulnérabilité : CWE-284


Vulnérabilité ID : CVE-2023-39964

Première publication le : 10-08-2023 18:15:11
Dernière modification le : 10-08-2023 18:15:11

Description :
1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, arbitrary file reads allow an attacker to read arbitrary important configuration files on the server. In the `api/v1/file.go` file, there is a function called `LoadFromFile`, which directly reads the file by obtaining the requested path `parameter[path]`. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability. Version 1.5.0 has a patch for this issue.

CVE ID : CVE-2023-39964
Source : security-advisories@github.com
Score CVSS : 7.5

Références :
https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0 | source : security-advisories@github.com
https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-pv7q-v9mv-9mh5 | source : security-advisories@github.com

Vulnérabilité : CWE-22


Vulnérabilité ID : CVE-2023-39966

Première publication le : 10-08-2023 18:15:11
Dernière modification le : 10-08-2023 18:15:11

Description :
1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, an arbitrary file write vulnerability could lead to direct control of the server. In the `api/v1/file.go` file, there is a function called `SaveContentthat,It `recieves JSON data sent by users in the form of a POST request. And the lack of parameter filtering allows for arbitrary file write operations. Version 1.5.0 contains a patch for this issue.

CVE ID : CVE-2023-39966
Source : security-advisories@github.com
Score CVSS : 7.5

Références :
https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0 | source : security-advisories@github.com
https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-hf7j-xj3w-87g4 | source : security-advisories@github.com

Vulnérabilité : CWE-862


Vulnérabilité ID : CVE-2023-39957

Première publication le : 10-08-2023 16:15:09
Dernière modification le : 10-08-2023 18:13:59

Description :
Nextcloud Talk Android allows users to place video and audio calls through Nextcloud on Android. Prior to version 17.0.0, an unprotected intend allowed malicious third party apps to trick the Talk Android app into writing files outside of its intended cache directory. Nextcloud Talk Android version 17.0.0 has a patch for this issue. No known workarounds are available.

CVE ID : CVE-2023-39957
Source : security-advisories@github.com
Score CVSS : 7.2

Références :
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36f7-93f3-mcfj | source : security-advisories@github.com
https://github.com/nextcloud/talk-android/pull/3064 | source : security-advisories@github.com
https://hackerone.com/reports/1997029 | source : security-advisories@github.com

Vulnérabilité : CWE-22


Source : adobe.com

Vulnérabilité ID : CVE-2023-29320

Première publication le : 10-08-2023 14:15:11
Dernière modification le : 10-08-2023 14:47:06

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Violation of Secure Design Principles vulnerability that could result in arbitrary code execution in the context of the current user by bypassing the API blacklisting feature. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-29320
Source : psirt@adobe.com
Score CVSS : 7.8

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-657


Vulnérabilité ID : CVE-2023-38222

Première publication le : 10-08-2023 14:15:12
Dernière modification le : 10-08-2023 14:47:06

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38222
Source : psirt@adobe.com
Score CVSS : 7.8

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-416


Vulnérabilité ID : CVE-2023-38223

Première publication le : 10-08-2023 14:15:12
Dernière modification le : 10-08-2023 14:47:06

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38223
Source : psirt@adobe.com
Score CVSS : 7.8

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-824


Vulnérabilité ID : CVE-2023-38224

Première publication le : 10-08-2023 14:15:12
Dernière modification le : 10-08-2023 14:47:06

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38224
Source : psirt@adobe.com
Score CVSS : 7.8

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-416


Vulnérabilité ID : CVE-2023-38225

Première publication le : 10-08-2023 14:15:12
Dernière modification le : 10-08-2023 14:47:06

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38225
Source : psirt@adobe.com
Score CVSS : 7.8

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-416


Vulnérabilité ID : CVE-2023-38226

Première publication le : 10-08-2023 14:15:12
Dernière modification le : 10-08-2023 14:47:06

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38226
Source : psirt@adobe.com
Score CVSS : 7.8

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-824


Vulnérabilité ID : CVE-2023-38227

Première publication le : 10-08-2023 14:15:12
Dernière modification le : 10-08-2023 14:47:06

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38227
Source : psirt@adobe.com
Score CVSS : 7.8

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-416


Vulnérabilité ID : CVE-2023-38228

Première publication le : 10-08-2023 14:15:12
Dernière modification le : 10-08-2023 14:47:06

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38228
Source : psirt@adobe.com
Score CVSS : 7.8

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-416


Vulnérabilité ID : CVE-2023-38229

Première publication le : 10-08-2023 14:15:13
Dernière modification le : 10-08-2023 14:47:06

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38229
Source : psirt@adobe.com
Score CVSS : 7.8

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Vulnérabilité ID : CVE-2023-38231

Première publication le : 10-08-2023 14:15:13
Dernière modification le : 10-08-2023 14:47:06

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38231
Source : psirt@adobe.com
Score CVSS : 7.8

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-787


Vulnérabilité ID : CVE-2023-38233

Première publication le : 10-08-2023 14:15:13
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38233
Source : psirt@adobe.com
Score CVSS : 7.8

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-787


Vulnérabilité ID : CVE-2023-38234

Première publication le : 10-08-2023 14:15:13
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38234
Source : psirt@adobe.com
Score CVSS : 7.8

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-824


Vulnérabilité ID : CVE-2023-38235

Première publication le : 10-08-2023 14:15:13
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38235
Source : psirt@adobe.com
Score CVSS : 7.8

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Vulnérabilité ID : CVE-2023-38246

Première publication le : 10-08-2023 14:15:14
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38246
Source : psirt@adobe.com
Score CVSS : 7.8

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-824


Source : redhat.com

Vulnérabilité ID : CVE-2023-4128

Première publication le : 10-08-2023 17:15:12
Dernière modification le : 10-08-2023 18:13:59

Description :
A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue.

CVE ID : CVE-2023-4128
Source : secalert@redhat.com
Score CVSS : 7.8

Références :
https://access.redhat.com/security/cve/CVE-2023-4128 | source : secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2225511 | source : secalert@redhat.com
https://lore.kernel.org/netdev/193d6cdf-d6c9-f9be-c36a-b2a7551d5fb6@mojatatu.com/ | source : secalert@redhat.com


Source : oppo.com

Vulnérabilité ID : CVE-2023-26309

Première publication le : 10-08-2023 09:15:09
Dernière modification le : 10-08-2023 12:43:50

Description :
A remote code execution vulnerability in the webview component of OnePlus Mall app.

CVE ID : CVE-2023-26309
Source : security@oppo.com
Score CVSS : 7.4

Références :
https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1689464826201645056 | source : security@oppo.com


Vulnérabilité ID : CVE-2023-26311

Première publication le : 10-08-2023 11:15:12
Dernière modification le : 10-08-2023 12:43:50

Description :
A remote code execution vulnerability in the webview component of OPPO Store app.

CVE ID : CVE-2023-26311
Source : security@oppo.com
Score CVSS : 7.4

Références :
https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1689584995217448960 | source : security@oppo.com


Source : patchstack.com

Vulnérabilité ID : CVE-2023-37988

Première publication le : 10-08-2023 11:15:12
Dernière modification le : 10-08-2023 12:43:50

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Creative Solutions Contact Form Generator plugin <= 2.5.5 versions.

CVE ID : CVE-2023-37988
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/contact-form-generator/wordpress-contact-form-generator-plugin-2-5-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-30481

Première publication le : 10-08-2023 12:15:10
Dernière modification le : 10-08-2023 12:43:50

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Alexey Golubnichenko AGP Font Awesome Collection plugin <= 3.2.4 versions.

CVE ID : CVE-2023-30481
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/agp-font-awesome-collection/wordpress-agp-font-awesome-collection-plugin-3-2-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-28779

Première publication le : 10-08-2023 13:15:10
Dernière modification le : 10-08-2023 14:47:06

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Vladimir Statsenko Terms descriptions plugin <= 3.4.4 versions.

CVE ID : CVE-2023-28779
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/terms-descriptions/wordpress-terms-descriptions-plugin-3-4-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-39314

Première publication le : 10-08-2023 13:15:10
Dernière modification le : 10-08-2023 14:47:06

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Teplitsa of social technologies Leyka plugin <= 3.30.2 versions.

CVE ID : CVE-2023-39314
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/leyka/wordpress-leyka-plugin-3-30-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


(65) Vulnérabilité(s) MEDIUM [4.0, 6.9]

Source : samsung.com

Vulnérabilité ID : CVE-2023-30705

Première publication le : 10-08-2023 02:15:12
Dernière modification le : 10-08-2023 12:43:50

Description :
Improper sanitization of incoming intent in Galaxy Store prior to version 4.5.56.6?allows local attackers to access privileged content providers as Galaxy Store permission.

CVE ID : CVE-2023-30705
Source : mobile.security@samsung.com
Score CVSS : 6.8

Références :
https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-863


Vulnérabilité ID : CVE-2023-30654

Première publication le : 10-08-2023 02:15:10
Dernière modification le : 10-08-2023 12:43:50

Description :
Improper access control vulnerability in SLocationService prior to SMR Aug-2023 Release 1 allows local attacker to update fake location.

CVE ID : CVE-2023-30654
Source : mobile.security@samsung.com
Score CVSS : 6.7

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-20


Vulnérabilité ID : CVE-2023-30686

Première publication le : 10-08-2023 02:15:11
Dernière modification le : 10-08-2023 12:43:50

Description :
Out-of-bounds Write in ReqDataRaw of libsec-ril prior to SMR Aug-2023 Release 1 allows local attacker to execute arbitrary code.

CVE ID : CVE-2023-30686
Source : mobile.security@samsung.com
Score CVSS : 6.7

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-787


Vulnérabilité ID : CVE-2023-30687

Première publication le : 10-08-2023 02:15:11
Dernière modification le : 10-08-2023 12:43:50

Description :
Out-of-bounds Write in RmtUimApdu of libsec-ril prior to SMR Aug-2023 Release 1 allows local attacker to execute arbitrary code.

CVE ID : CVE-2023-30687
Source : mobile.security@samsung.com
Score CVSS : 6.7

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-787


Vulnérabilité ID : CVE-2023-30688

Première publication le : 10-08-2023 02:15:11
Dernière modification le : 10-08-2023 12:43:50

Description :
Out-of-bounds Write in MakeUiccAuthForOem of libsec-ril prior to SMR Aug-2023 Release 1 allows local attacker to execute arbitrary code.

CVE ID : CVE-2023-30688
Source : mobile.security@samsung.com
Score CVSS : 6.7

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-787


Vulnérabilité ID : CVE-2023-30689

Première publication le : 10-08-2023 02:15:11
Dernière modification le : 10-08-2023 12:43:50

Description :
Out-of-bounds Write in BuildOemEmbmsGetSigStrengthResponse of libsec-ril prior to SMR Aug-2023 Release 1 allows local attacker to execute arbitrary code.

CVE ID : CVE-2023-30689
Source : mobile.security@samsung.com
Score CVSS : 6.7

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-787


Vulnérabilité ID : CVE-2023-30693

Première publication le : 10-08-2023 02:15:11
Dernière modification le : 10-08-2023 12:43:50

Description :
Out-of-bounds Write in DoOemFactorySendFactoryBypassCommand of libsec-ril prior to SMR Aug-2023 Release 1 allows local attacker to execute arbitrary code.

CVE ID : CVE-2023-30693
Source : mobile.security@samsung.com
Score CVSS : 6.7

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-787


Vulnérabilité ID : CVE-2023-30694

Première publication le : 10-08-2023 02:15:11
Dernière modification le : 10-08-2023 12:43:50

Description :
Out-of-bounds Write in IpcTxPcscTransmitApdu of libsec-ril prior to SMR Aug-2023 Release 1 allows local attacker to execute arbitrary code.

CVE ID : CVE-2023-30694
Source : mobile.security@samsung.com
Score CVSS : 6.7

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-787


Vulnérabilité ID : CVE-2023-30695

Première publication le : 10-08-2023 02:15:11
Dernière modification le : 10-08-2023 12:43:50

Description :
Out-of-bounds Write vulnerability in SSHDCPAPP TA prior to &quot;SAMSUNG ELECTONICS, CO, LTD. - System Hardware Update - 7/13/2023&quot; in Windows Update for Galaxy book Go, Galaxy book Go 5G, Galaxy book2 Go and Galaxy book2 Pro 360 allows local attacker to execute arbitrary code.

CVE ID : CVE-2023-30695
Source : mobile.security@samsung.com
Score CVSS : 6.7

Références :
https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-787


Vulnérabilité ID : CVE-2023-30702

Première publication le : 10-08-2023 02:15:12
Dernière modification le : 10-08-2023 12:43:50

Description :
Stack overflow vulnerability in SSHDCPAPP TA prior to &quot;SAMSUNG ELECTONICS, CO, LTD. - System Hardware Update - 7/13/2023&quot; in Windows Update for Galaxy book Go, Galaxy book Go 5G, Galaxy book2 Go and Galaxy book2 Pro 360 allows local attacker to execute arbitrary code.

CVE ID : CVE-2023-30702
Source : mobile.security@samsung.com
Score CVSS : 6.7

Références :
https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-121


Vulnérabilité ID : CVE-2023-30698

Première publication le : 10-08-2023 02:15:12
Dernière modification le : 10-08-2023 12:43:50

Description :
Improper access control vulnerability in TelephonyUI prior to SMR Aug-2023 Release 1 allows local attacker to connect BLE without privilege.

CVE ID : CVE-2023-30698
Source : mobile.security@samsung.com
Score CVSS : 5.5

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-284


Vulnérabilité ID : CVE-2023-30700

Première publication le : 10-08-2023 02:15:12
Dernière modification le : 10-08-2023 12:43:50

Description :
PendingIntent hijacking vulnerability in SemWifiApTimeOutImpl in framework prior to SMR Aug-2023 Release 1 allows local attackers to access ContentProvider without proper permission.

CVE ID : CVE-2023-30700
Source : mobile.security@samsung.com
Score CVSS : 5.3

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-287


Vulnérabilité ID : CVE-2023-30701

Première publication le : 10-08-2023 02:15:12
Dernière modification le : 10-08-2023 12:43:50

Description :
PendingIntent hijacking in WifiGeofenceManager prior to SMR Aug-2023 Release 1 allows local attacker to arbitrary file access.

CVE ID : CVE-2023-30701
Source : mobile.security@samsung.com
Score CVSS : 4.7

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-284


Vulnérabilité ID : CVE-2023-30681

Première publication le : 10-08-2023 02:15:10
Dernière modification le : 10-08-2023 12:43:50

Description :
An improper input validation vulnerability within initialize function in HAL VaultKeeper prior to SMR Aug-2023 Release 1 allows attacker to cause out-of-bounds write.

CVE ID : CVE-2023-30681
Source : mobile.security@samsung.com
Score CVSS : 4.4

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-122


Vulnérabilité ID : CVE-2023-30696

Première publication le : 10-08-2023 02:15:12
Dernière modification le : 10-08-2023 12:43:50

Description :
An improper input validation in IpcTxGetVerifyAkey in libsec-ril prior to SMR Aug-2023 Release 1 allows attacker to cause out-of-bounds write.

CVE ID : CVE-2023-30696
Source : mobile.security@samsung.com
Score CVSS : 4.4

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-122


Vulnérabilité ID : CVE-2023-30697

Première publication le : 10-08-2023 02:15:12
Dernière modification le : 10-08-2023 12:43:50

Description :
An improper input validation in IpcTxCfgSetSimlockPayload in libsec-ril prior to SMR Aug-2023 Release 1 allows attacker to cause out-of-bounds write.

CVE ID : CVE-2023-30697
Source : mobile.security@samsung.com
Score CVSS : 4.4

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-122


Vulnérabilité ID : CVE-2023-30682

Première publication le : 10-08-2023 02:15:10
Dernière modification le : 10-08-2023 12:43:50

Description :
Improper access control in Telecom prior to SMR Aug-2023 Release 1 allows local attackers to call silenceRinger API without permission.

CVE ID : CVE-2023-30682
Source : mobile.security@samsung.com
Score CVSS : 4.3

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-284


Vulnérabilité ID : CVE-2023-30683

Première publication le : 10-08-2023 02:15:11
Dernière modification le : 10-08-2023 12:43:50

Description :
Improper access control in Telecom prior to SMR Aug-2023 Release 1 allows local attackers to call endCall API without permission.

CVE ID : CVE-2023-30683
Source : mobile.security@samsung.com
Score CVSS : 4.3

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-284


Vulnérabilité ID : CVE-2023-30684

Première publication le : 10-08-2023 02:15:11
Dernière modification le : 10-08-2023 12:43:50

Description :
Improper access control in Samsung Telecom prior to SMR Aug-2023 Release 1 allows local attackers to call acceptRingingCall API without permission.

CVE ID : CVE-2023-30684
Source : mobile.security@samsung.com
Score CVSS : 4.3

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-284


Vulnérabilité ID : CVE-2023-30685

Première publication le : 10-08-2023 02:15:11
Dernière modification le : 10-08-2023 12:43:50

Description :
Improper access control vulnerability in Telecom prior to SMR Aug-2023 Release 1 allows local attakcers to change TTY mode.

CVE ID : CVE-2023-30685
Source : mobile.security@samsung.com
Score CVSS : 4.3

Références :
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-284


Source : hackerone.com

Vulnérabilité ID : CVE-2023-32562

Première publication le : 10-08-2023 20:15:10
Dernière modification le : 10-08-2023 20:15:10

Description :
An unrestricted upload of file with dangerous type vulnerability exists in Avalanche versions 6.3.x and below that could allow an attacker to achieve a remove code execution. Fixed in version 6.4.1.

CVE ID : CVE-2023-32562
Source : support@hackerone.com
Score CVSS : 6.8

Références :
https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US | source : support@hackerone.com


Vulnérabilité ID : CVE-2023-32564

Première publication le : 10-08-2023 20:15:10
Dernière modification le : 10-08-2023 20:15:10

Description :
An unrestricted upload of file with dangerous type vulnerability exists in Avalanche versions 6.4.1 and below that could allow an attacker to achieve a remove code execution.

CVE ID : CVE-2023-32564
Source : support@hackerone.com
Score CVSS : 6.8

Références :
https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US | source : support@hackerone.com


Vulnérabilité ID : CVE-2023-32566

Première publication le : 10-08-2023 19:15:09
Dernière modification le : 10-08-2023 19:15:09

Description :
An attacker can send a specially crafted request which could lead to leakage of sensitive data or potentially a resource-based DoS attack. Fixed in version 6.4.1.

CVE ID : CVE-2023-32566
Source : support@hackerone.com
Score CVSS : 6.3

Références :
https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US | source : support@hackerone.com


Vulnérabilité ID : CVE-2023-32565

Première publication le : 10-08-2023 20:15:10
Dernière modification le : 10-08-2023 20:15:10

Description :
An attacker can send a specially crafted request which could lead to leakage of sensitive data or potentially a resource-based DoS attack. Fixed in version 6.4.1.

CVE ID : CVE-2023-32565
Source : support@hackerone.com
Score CVSS : 6.3

Références :
https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US | source : support@hackerone.com


Source : hcl.com

Vulnérabilité ID : CVE-2023-23342

Première publication le : 10-08-2023 19:15:09
Dernière modification le : 10-08-2023 19:15:09

Description :
If certain local files are manipulated in a certain manner, the validation to use the cryptographic keys can be circumvented.

CVE ID : CVE-2023-23342
Source : psirt@hcl.com
Score CVSS : 6.6

Références :
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0106600 | source : psirt@hcl.com


Source : patchstack.com

Vulnérabilité ID : CVE-2023-23826

Première publication le : 10-08-2023 10:15:09
Dernière modification le : 10-08-2023 12:43:50

Description :
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Arsham Mirshah Add Posts to Pages plugin <= 1.4.1 versions.

CVE ID : CVE-2023-23826
Source : audit@patchstack.com
Score CVSS : 6.5

Références :
https://patchstack.com/database/vulnerability/add-posts-to-pages/wordpress-add-posts-to-pages-plugin-1-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-23798

Première publication le : 10-08-2023 11:15:10
Dernière modification le : 10-08-2023 12:43:50

Description :
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Muneeb Layer Slider plugin <= 1.1.9.7 versions.

CVE ID : CVE-2023-23798
Source : audit@patchstack.com
Score CVSS : 6.5

Références :
https://patchstack.com/database/vulnerability/slider-slideshow/wordpress-layer-slider-plugin-1-1-9-7-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-24009

Première publication le : 10-08-2023 11:15:11
Dernière modification le : 10-08-2023 12:43:50

Description :
Auth. (subscriber+) Reflected Cross-site Scripting (XSS) vulnerability in Wpazure Themes Upfrontwp theme <= 1.1 versions.

CVE ID : CVE-2023-24009
Source : audit@patchstack.com
Score CVSS : 6.5

Références :
https://patchstack.com/database/vulnerability/upfrontwp/wordpress-upfrontwp-theme-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-23828

Première publication le : 10-08-2023 13:15:09
Dernière modification le : 10-08-2023 14:47:10

Description :
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Swashata WP Category Post List Widget plugin <= 2.0.3 versions.

CVE ID : CVE-2023-23828
Source : audit@patchstack.com
Score CVSS : 6.5

Références :
https://patchstack.com/database/vulnerability/wp-category-posts-list/wordpress-wp-category-post-list-widget-plugin-2-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-24393

Première publication le : 10-08-2023 13:15:10
Dernière modification le : 10-08-2023 14:47:10

Description :
Auth. (editor+) Stored Cross-Site Scripting (XSS) vulnerability in Sk. Abul Hasan Animated Number Counters plugin <= 1.6 versions.

CVE ID : CVE-2023-24393
Source : audit@patchstack.com
Score CVSS : 6.5

Références :
https://patchstack.com/database/vulnerability/animated-number-counters/wordpress-animated-number-counters-plugin-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-37983

Première publication le : 10-08-2023 13:15:10
Dernière modification le : 10-08-2023 14:47:06

Description :
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Noël Jackson Art Direction plugin <= 0.2.4 versions.

CVE ID : CVE-2023-37983
Source : audit@patchstack.com
Score CVSS : 6.5

Références :
https://patchstack.com/database/vulnerability/art-direction/wordpress-art-direction-plugin-0-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2022-44629

Première publication le : 10-08-2023 10:15:09
Dernière modification le : 10-08-2023 12:43:50

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Catalyst Connect Catalyst Connect Zoho CRM Client Portal plugin <= 2.0.0 versions.

CVE ID : CVE-2022-44629
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/catalyst-connect-client-portal/wordpress-catalyst-connect-zoho-crm-client-portal-plugin-2-0-0-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-24389

Première publication le : 10-08-2023 10:15:10
Dernière modification le : 10-08-2023 12:43:50

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in brandiD Social Proof (Testimonial) Slider plugin <= 2.2.3 versions.

CVE ID : CVE-2023-24389
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/social-proof-testimonials-slider/wordpress-social-proof-testimonial-slider-plugin-2-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-23871

Première publication le : 10-08-2023 11:15:11
Dernière modification le : 10-08-2023 12:43:50

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Webdzier Button plugin <= 1.1.23 versions.

CVE ID : CVE-2023-23871
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/button/wordpress-button-plugin-1-1-20-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-34374

Première publication le : 10-08-2023 12:15:10
Dernière modification le : 10-08-2023 12:43:50

Description :
Auth. (editor+) Stored Cross-Site Scripting (XSS) vulnerability in Rahul Aryan AnsPress plugin <= 4.3.0 versions.

CVE ID : CVE-2023-34374
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/anspress-question-answer/wordpress-anspress-question-and-answer-plugin-4-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-36530

Première publication le : 10-08-2023 12:15:11
Dernière modification le : 10-08-2023 12:43:50

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Smartypants SP Project & Document Manager plugin <= 4.67 versions.

CVE ID : CVE-2023-36530
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/sp-client-document-manager/wordpress-sp-project-document-manager-plugin-4-67-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-24391

Première publication le : 10-08-2023 13:15:10
Dernière modification le : 10-08-2023 14:47:10

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Spider Teams ApplyOnline plugin <= 2.5 versions.

CVE ID : CVE-2023-24391
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/apply-online/wordpress-applyonline-application-form-builder-and-manager-plugin-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-37388

Première publication le : 10-08-2023 14:15:12
Dernière modification le : 10-08-2023 14:47:06

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Sudipto Pratap Mahato Simple Light Weight Social Share plugin <= 2.0 versions.

CVE ID : CVE-2023-37388
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/only-tweet-like-share-and-google-1/wordpress-simple-light-weight-social-share-tweet-like-share-and-linkedin-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-38397

Première publication le : 10-08-2023 14:15:15
Dernière modification le : 10-08-2023 14:46:58

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Eggemplo Gestion-Pymes plugin <= 1.5.6 versions.

CVE ID : CVE-2023-38397
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/gestion-pymes/wordpress-gestion-pymes-plugin-1-5-6-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-23900

Première publication le : 10-08-2023 12:15:10
Dernière modification le : 10-08-2023 12:43:50

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in YIKES, Inc. Easy Forms for Mailchimp plugin <= 6.8.8 versions.

CVE ID : CVE-2023-23900
Source : audit@patchstack.com
Score CVSS : 5.8

Références :
https://patchstack.com/database/vulnerability/yikes-inc-easy-mailchimp-extender/wordpress-easy-forms-for-mailchimp-plugin-6-8-8-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2022-27861

Première publication le : 10-08-2023 10:15:09
Dernière modification le : 10-08-2023 12:43:50

Description :
Unauth. Open Redirect vulnerability in Arscode Ninja Popups plugin <= 4.7.5 versions.

CVE ID : CVE-2022-27861
Source : audit@patchstack.com
Score CVSS : 4.7

Références :
https://patchstack.com/database/vulnerability/arscode-ninja-popups/wordpress-ninja-popups-plugin-4-7-5-unauth-open-redirect-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-601


Source : github.com

Vulnérabilité ID : CVE-2023-39952

Première publication le : 10-08-2023 14:15:15
Dernière modification le : 10-08-2023 14:46:58

Description :
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 22.0.0 and prior to versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3, and 27.0.1, a user can access files inside a subfolder of a groupfolder accessible to them, even if advanced permissions would block access to the subfolder. Nextcloud Server versions 25.0.8, 26.0.3, and 27.0.1 and Nextcloud Enterprise Server versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3, and 27.0.1 contain a patch for this issue. No known workarounds are available.

CVE ID : CVE-2023-39952
Source : security-advisories@github.com
Score CVSS : 6.5

Références :
https://github.com/nextcloud/groupfolders/issues/1906 | source : security-advisories@github.com
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-cq8w-v4fh-4rjq | source : security-advisories@github.com
https://github.com/nextcloud/server/pull/38890 | source : security-advisories@github.com
https://hackerone.com/reports/1808079 | source : security-advisories@github.com

Vulnérabilité : CWE-284


Vulnérabilité ID : CVE-2023-39965

Première publication le : 10-08-2023 18:15:11
Dernière modification le : 10-08-2023 18:15:11

Description :
1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, authenticated attackers can download arbitrary files through the API interface. This code has unauthorized access. Attackers can freely download the file content on the target system. This may cause a large amount of information leakage. Version 1.5.0 has a patch for this issue.

CVE ID : CVE-2023-39965
Source : security-advisories@github.com
Score CVSS : 6.5

Références :
https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0 | source : security-advisories@github.com
https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555 | source : security-advisories@github.com

Vulnérabilité : CWE-863


Vulnérabilité ID : CVE-2023-39958

Première publication le : 10-08-2023 18:15:09
Dernière modification le : 10-08-2023 18:15:09

Description :
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 22.0.0 and prior to versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, missing protection allows an attacker to brute force the client secrets of configured OAuth2 clients. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.

CVE ID : CVE-2023-39958
Source : security-advisories@github.com
Score CVSS : 5.8

Références :
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vv27-g2hq-v48h | source : security-advisories@github.com
https://github.com/nextcloud/server/pull/38773 | source : security-advisories@github.com
https://hackerone.com/reports/1258448 | source : security-advisories@github.com

Vulnérabilité : CWE-307


Vulnérabilité ID : CVE-2023-40014

Première publication le : 10-08-2023 20:15:10
Dernière modification le : 10-08-2023 20:15:10

Description :
OpenZeppelin Contracts is a library for secure smart contract development. Starting in version 4.0.0 and prior to version 4.9.3, contracts using `ERC2771Context` along with a custom trusted forwarder may see `_msgSender` return `address(0)` in calls that originate from the forwarder with calldata shorter than 20 bytes. This combination of circumstances does not appear to be common, in particular it is not the case for `MinimalForwarder` from OpenZeppelin Contracts, or any deployed forwarder the team is aware of, given that the signer address is appended to all calls that originate from these forwarders. The problem has been patched in v4.9.3.

CVE ID : CVE-2023-40014
Source : security-advisories@github.com
Score CVSS : 5.3

Références :
https://github.com/OpenZeppelin/openzeppelin-contracts/commit/9445f96223041abf2bf08daa56f8da50b674cbcd | source : security-advisories@github.com
https://github.com/OpenZeppelin/openzeppelin-contracts/commit/e4435eed757d4309436b1e06608e97b6d6e2fdb5 | source : security-advisories@github.com
https://github.com/OpenZeppelin/openzeppelin-contracts/pull/4481 | source : security-advisories@github.com
https://github.com/OpenZeppelin/openzeppelin-contracts/pull/4484 | source : security-advisories@github.com
https://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.9.3 | source : security-advisories@github.com
https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-g4vp-m682-qqmp | source : security-advisories@github.com

Vulnérabilité : CWE-116


Vulnérabilité ID : CVE-2023-39953

Première publication le : 10-08-2023 14:15:15
Dernière modification le : 10-08-2023 14:46:58

Description :
user_oidc provides the OIDC connect user backend for Nextcloud, an open-source cloud platform. Starting in version 1.0.0 and prior to version 1.3.3, missing verification of the issuer would have allowed an attacker to perform a man-in-the-middle attack returning corrupted or known token they also have access to. user_oidc 1.3.3 contains a patch. No known workarounds are available.

CVE ID : CVE-2023-39953
Source : security-advisories@github.com
Score CVSS : 4.8

Références :
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xx3h-v363-q36j | source : security-advisories@github.com
https://github.com/nextcloud/user_oidc/pull/642 | source : security-advisories@github.com
https://hackerone.com/reports/2021684 | source : security-advisories@github.com

Vulnérabilité : CWE-303


Source : wordfence.com

Vulnérabilité ID : CVE-2023-4283

Première publication le : 10-08-2023 12:15:12
Dernière modification le : 10-08-2023 12:43:50

Description :
The EmbedPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'embedpress_calendar' shortcode in versions up to, and including, 3.8.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-4283
Source : security@wordfence.com
Score CVSS : 6.4

Références :
https://plugins.trac.wordpress.org/browser/embedpress/tags/3.8.2/EmbedPress/ThirdParty/Googlecalendar/Embedpress_Google_Helper.php#L522 | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2950211/embedpress#file18 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/b340eda1-e9d2-40b6-89f9-41d995ce3555?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-4282

Première publication le : 10-08-2023 12:15:12
Dernière modification le : 10-08-2023 12:43:50

Description :
The EmbedPress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'admin_post_remove' and 'remove_private_data' functions in versions up to, and including, 3.8.2. This makes it possible for authenticated attackers with subscriber privileges or above, to delete plugin settings.

CVE ID : CVE-2023-4282
Source : security@wordfence.com
Score CVSS : 5.4

Références :
https://plugins.trac.wordpress.org/browser/embedpress/tags/3.8.2/EmbedPress/ThirdParty/Googlecalendar/Embedpress_Google_Helper.php#L801 | source : security@wordfence.com
https://plugins.trac.wordpress.org/browser/embedpress/tags/3.8.2/EmbedPress/ThirdParty/Googlecalendar/Embedpress_Google_Helper.php#L807 | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2950211/embedpress#file18 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/5fa2ec9e-2859-4a96-9e33-9e22d37e544f?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-862


Source : adobe.com

Vulnérabilité ID : CVE-2023-29303

Première publication le : 10-08-2023 14:15:11
Dernière modification le : 10-08-2023 14:47:06

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-29303
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-416


Vulnérabilité ID : CVE-2023-38210

Première publication le : 10-08-2023 14:15:12
Dernière modification le : 10-08-2023 14:47:06

Description :
Adobe XMP Toolkit versions 2022.06 is affected by a Uncontrolled Resource Consumption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38210
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/xmpcore/apsb23-45.html | source : psirt@adobe.com

Vulnérabilité : CWE-400


Vulnérabilité ID : CVE-2023-38230

Première publication le : 10-08-2023 14:15:13
Dernière modification le : 10-08-2023 14:47:06

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38230
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-416


Vulnérabilité ID : CVE-2023-38232

Première publication le : 10-08-2023 14:15:13
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38232
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Vulnérabilité ID : CVE-2023-38236

Première publication le : 10-08-2023 14:15:13
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38236
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Vulnérabilité ID : CVE-2023-38237

Première publication le : 10-08-2023 14:15:13
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38237
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Vulnérabilité ID : CVE-2023-38238

Première publication le : 10-08-2023 14:15:13
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38238
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-416


Vulnérabilité ID : CVE-2023-38239

Première publication le : 10-08-2023 14:15:14
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38239
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Vulnérabilité ID : CVE-2023-38240

Première publication le : 10-08-2023 14:15:14
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38240
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Vulnérabilité ID : CVE-2023-38241

Première publication le : 10-08-2023 14:15:14
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38241
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Vulnérabilité ID : CVE-2023-38242

Première publication le : 10-08-2023 14:15:14
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38242
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Vulnérabilité ID : CVE-2023-38243

Première publication le : 10-08-2023 14:15:14
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38243
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-416


Vulnérabilité ID : CVE-2023-38244

Première publication le : 10-08-2023 14:15:14
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38244
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Vulnérabilité ID : CVE-2023-38245

Première publication le : 10-08-2023 14:15:14
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue requires user interaction in that a victim must open a maliciously crafted Microsoft Office file, or visit an attacker controlled web page.

CVE ID : CVE-2023-38245
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-200


Vulnérabilité ID : CVE-2023-38247

Première publication le : 10-08-2023 14:15:14
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38247
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Vulnérabilité ID : CVE-2023-38248

Première publication le : 10-08-2023 14:15:15
Dernière modification le : 10-08-2023 14:46:58

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-38248
Source : psirt@adobe.com
Score CVSS : 5.5

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Vulnérabilité ID : CVE-2023-29299

Première publication le : 10-08-2023 14:15:11
Dernière modification le : 10-08-2023 14:47:06

Description :
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Untrusted Search Path vulnerability that could lead to Application denial-of-service. An attacker could leverage this vulnerability if the default PowerShell Set-ExecutionPolicy is set to Unrestricted, making the attack complexity high. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE ID : CVE-2023-29299
Source : psirt@adobe.com
Score CVSS : 4.7

Références :
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | source : psirt@adobe.com

Vulnérabilité : CWE-426


(6) Vulnérabilité(s) LOW [0.1, 3.9]

Source : samsung.com

Vulnérabilité ID : CVE-2023-30704

Première publication le : 10-08-2023 02:15:12
Dernière modification le : 10-08-2023 12:43:50

Description :
Improper Authorization vulnerability in Samsung Internet prior to version 22.0.0.35 allows physical attacker access downloaded files in Secret Mode without user authentication.

CVE ID : CVE-2023-30704
Source : mobile.security@samsung.com
Score CVSS : 3.8

Références :
https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-285


Vulnérabilité ID : CVE-2023-30703

Première publication le : 10-08-2023 02:15:12
Dernière modification le : 10-08-2023 12:43:50

Description :
Improper URL validation vulnerability in Samsung Members prior to version 14.0.07.1 allows attackers to access sensitive information.

CVE ID : CVE-2023-30703
Source : mobile.security@samsung.com
Score CVSS : 3.3

Références :
https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=08 | source : mobile.security@samsung.com

Vulnérabilité : CWE-20


Source : github.com

Vulnérabilité ID : CVE-2023-39954

Première publication le : 10-08-2023 15:15:09
Dernière modification le : 10-08-2023 18:13:59

Description :
user_oidc provides the OIDC connect user backend for Nextcloud, an open-source cloud platform. Starting in version 1.0.0 and prior to version 1.3.3, an attacker that obtained at least read access to a snapshot of the database can impersonate the Nextcloud server towards linked servers. user_oidc 1.3.3 contains a patch. No known workarounds are available.

CVE ID : CVE-2023-39954
Source : security-advisories@github.com
Score CVSS : 3.8

Références :
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f92-5c8p-f6gq | source : security-advisories@github.com
https://github.com/nextcloud/user_oidc/pull/636 | source : security-advisories@github.com
https://hackerone.com/reports/1994328 | source : security-advisories@github.com

Vulnérabilité : CWE-311


Vulnérabilité ID : CVE-2023-39955

Première publication le : 10-08-2023 15:15:09
Dernière modification le : 10-08-2023 18:13:59

Description :
Notes is a note-taking app for Nextcloud, an open-source cloud platform. Starting in version 4.4.0 and prior to version 4.8.0, when creating a note file with HTML, the content is rendered in the preview instead of the file being offered to download. Nextcloud Notes app version 4.8.0 contains a patch for the issue. No known workarounds are available.

CVE ID : CVE-2023-39955
Source : security-advisories@github.com
Score CVSS : 3.5

Références :
https://github.com/nextcloud/notes/pull/1031 | source : security-advisories@github.com
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6g88-37x7-4vw6 | source : security-advisories@github.com
https://hackerone.com/reports/1924355 | source : security-advisories@github.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-39959

Première publication le : 10-08-2023 18:15:10
Dernière modification le : 10-08-2023 18:15:10

Description :
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.9, 26.0.4, and 27.0.1, unauthenticated users could send a DAV request which reveals whether a calendar or an address book with the given identifier exists for the victim. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.

CVE ID : CVE-2023-39959
Source : security-advisories@github.com
Score CVSS : 3.5

Références :
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g97r-8ffm-hfpj | source : security-advisories@github.com
https://github.com/nextcloud/server/pull/38747 | source : security-advisories@github.com
https://hackerone.com/reports/1832126 | source : security-advisories@github.com

Vulnérabilité : CWE-284


Vulnérabilité ID : CVE-2023-39961

Première publication le : 10-08-2023 18:15:10
Dernière modification le : 10-08-2023 18:15:10

Description :
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 24.0.4 and prior to versions 25.0.9, 26.0.4, and 27.0.1, when a folder with images or an image was shared without download permissions, the user could add the image inline into a text file and download it. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.

CVE ID : CVE-2023-39961
Source : security-advisories@github.com
Score CVSS : 3.5

Références :
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qhgm-w4gx-gvgp | source : security-advisories@github.com
https://github.com/nextcloud/text/pull/4481 | source : security-advisories@github.com
https://hackerone.com/reports/1965156 | source : security-advisories@github.com

Vulnérabilité : CWE-284


(22) Vulnérabilité(s) NO SCORE [0.0, 0.0]

Source : mitre.org

Vulnérabilité ID : CVE-2023-37069

Première publication le : 10-08-2023 13:15:10
Dernière modification le : 10-08-2023 14:47:06

Description :
Code-Projects Online Hospital Management System V1.0 is vulnerable to SQL Injection (SQLI) attacks, which allow an attacker to manipulate the SQL queries executed by the application. The application fails to properly validate user-supplied input in the login id and password fields during the login process, enabling an attacker to inject malicious SQL code.

CVE ID : CVE-2023-37069
Source : cve@mitre.org
Score CVSS : /

Références :
https://code-projects.org/online-hospital-management-system-in-php-with-source-code/ | source : cve@mitre.org
https://github.com/Mr-Secure-Code/My-CVE/blob/main/CVE-2023-37069-Exploit.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-37734

Première publication le : 10-08-2023 14:15:12
Dernière modification le : 10-08-2023 14:47:06

Description :
EZ softmagic MP3 Audio Converter 2.7.3.700 was discovered to contain a buffer overflow.

CVE ID : CVE-2023-37734
Source : cve@mitre.org
Score CVSS : /

Références :
https://medium.com/@jraiv02/cve-2023-37734-buffer-overflow-in-mp3-audio-converter-318fd8271911 | source : cve@mitre.org
https://www.exploit-db.com/exploits/10374 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-37543

Première publication le : 10-08-2023 15:15:09
Dernière modification le : 10-08-2023 18:13:59

Description :
Cacti before 1.2.6 allows IDOR (Insecure Direct Object Reference) for accessing any graph via a modified local_graph_id parameter to graph_xport.php. This is a different vulnerability than CVE-2019-16723.

CVE ID : CVE-2023-37543
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Cacti/cacti/security/advisories/GHSA-4x82-8w8m-w8hj | source : cve@mitre.org
https://medium.com/@hussainfathy99/exciting-news-my-first-cve-discovery-cve-2023-37543-idor-vulnerability-in-cacti-bbb6c386afed | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-38830

Première publication le : 10-08-2023 15:15:09
Dernière modification le : 10-08-2023 18:13:59

Description :
An information leak in PHPJabbers Yacht Listing Script v1.0 allows attackers to export clients' credit card numbers from the Reservations module.

CVE ID : CVE-2023-38830
Source : cve@mitre.org
Score CVSS : /

Références :
https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-2-4fa5e2ccfe2e | source : cve@mitre.org
https://www.phpjabbers.com/yacht-listing-script | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39776

Première publication le : 10-08-2023 15:15:09
Dernière modification le : 10-08-2023 18:13:59

Description :
A File Upload vulnerability in PHPJabbers Ticket Support Script v3.2 allows attackers to execute arbitrary code via uploading a crafted file.

CVE ID : CVE-2023-39776
Source : cve@mitre.org
Score CVSS : /

Références :
https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-2-4fa5e2ccfe2e | source : cve@mitre.org
https://www.phpjabbers.com/ticket-support-script | source : cve@mitre.org


Vulnérabilité ID : CVE-2022-47636

Première publication le : 10-08-2023 16:15:09
Dernière modification le : 10-08-2023 18:13:59

Description :
A DLL hijacking vulnerability has been discovered in OutSystems Service Studio 11 11.53.30 build 61739. When a user open a .oml file (OutSystems Modeling Language), the application will load the following DLLs from the same directory av_libGLESv2.dll, libcef.DLL, user32.dll, and d3d10warp.dll. Using a crafted DLL, it is possible to execute arbitrary code in the context of the current logged in user.

CVE ID : CVE-2022-47636
Source : cve@mitre.org
Score CVSS : /

Références :
https://www.exploit-db.com/exploits/51678 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40216

Première publication le : 10-08-2023 16:15:09
Dernière modification le : 10-08-2023 18:13:59

Description :
OpenBSD 7.3 before errata 014 is missing an argument-count bounds check in console terminal emulation. This could cause incorrect memory access and a kernel crash after receiving crafted DCS or CSI terminal escape sequences.

CVE ID : CVE-2023-40216
Source : cve@mitre.org
Score CVSS : /

Références :
https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/014_wscons.patch.sig | source : cve@mitre.org
https://github.com/openbsd/src/commit/9d3f688f46eba347e96ff0ae9506ef2061622e0c | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-36309

Première publication le : 10-08-2023 17:15:10
Dernière modification le : 10-08-2023 18:13:59

Description :
There is a Cross Site Scripting (XSS) vulnerability in the "action" parameter of index.php in PHPJabbers Document Creator v1.0.

CVE ID : CVE-2023-36309
Source : cve@mitre.org
Score CVSS : /

Références :
https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-1-6703becb4cd4 | source : cve@mitre.org
https://www.phpjabbers.com/document-creator | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-36310

Première publication le : 10-08-2023 17:15:10
Dernière modification le : 10-08-2023 18:13:59

Description :
There is a Cross Site Scripting (XSS) vulnerability in the "column" parameter of index.php in PHPJabbers Document Creator v1.0.

CVE ID : CVE-2023-36310
Source : cve@mitre.org
Score CVSS : /

Références :
https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-1-6703becb4cd4 | source : cve@mitre.org
https://www.phpjabbers.com/document-creator | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-36311

Première publication le : 10-08-2023 17:15:10
Dernière modification le : 10-08-2023 18:13:59

Description :
There is a SQL injection (SQLi) vulnerability in the "column" parameter of index.php in PHPJabbers Document Creator v1.0.

CVE ID : CVE-2023-36311
Source : cve@mitre.org
Score CVSS : /

Références :
https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-1-6703becb4cd4 | source : cve@mitre.org
https://www.phpjabbers.com/document-creator | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-36312

Première publication le : 10-08-2023 17:15:11
Dernière modification le : 10-08-2023 18:13:59

Description :
There is a Cross Site Scripting (XSS) vulnerability in the value-enum-o_bf_include_timezone parameter of index.php in PHPJabbers Callback Widget v1.0.

CVE ID : CVE-2023-36312
Source : cve@mitre.org
Score CVSS : /

Références :
https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-1-6703becb4cd4 | source : cve@mitre.org
https://www.phpjabbers.com/callback-widget/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-36313

Première publication le : 10-08-2023 17:15:11
Dernière modification le : 10-08-2023 18:13:59

Description :
PHPJabbers Document Creator v1.0 is vulnerable to Cross Site Scripting (XSS) via all post parameters of "Export Requests" aside from "request_feed".

CVE ID : CVE-2023-36313
Source : cve@mitre.org
Score CVSS : /

Références :
https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-1-6703becb4cd4 | source : cve@mitre.org
https://www.phpjabbers.com/document-creator | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-36314

Première publication le : 10-08-2023 17:15:11
Dernière modification le : 10-08-2023 18:13:59

Description :
There is a Cross Site Scripting (XSS) vulnerability in the value-text-o_sms_email_request_message parameters of index.php in PHPJabbers Callback Widget v1.0.

CVE ID : CVE-2023-36314
Source : cve@mitre.org
Score CVSS : /

Références :
https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-1-6703becb4cd4 | source : cve@mitre.org
https://www.phpjabbers.com/callback-widget | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-36315

Première publication le : 10-08-2023 17:15:11
Dernière modification le : 10-08-2023 18:13:59

Description :
There is a Cross Site Scripting (XSS) vulnerability in the "action" parameter of index.php in PHPJabbers Callback Widget v1.0.

CVE ID : CVE-2023-36315
Source : cve@mitre.org
Score CVSS : /

Références :
https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-1-6703becb4cd4 | source : cve@mitre.org
https://www.phpjabbers.com/callback-widget | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-37625

Première publication le : 10-08-2023 20:15:10
Dernière modification le : 10-08-2023 20:15:10

Description :
A stored cross-site scripting (XSS) vulnerability in Netbox v3.4.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Custom Link templates.

CVE ID : CVE-2023-37625
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/benjaminpsinclair/Netbox-CVE | source : cve@mitre.org
https://github.com/benjaminpsinclair/Netbox-CVE-2023-37625 | source : cve@mitre.org
https://github.com/netbox-community/netbox/issues/12205 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39805

Première publication le : 10-08-2023 20:15:10
Dernière modification le : 10-08-2023 20:15:10

Description :
iCMS v7.0.16 was discovered to contain a SQL injection vulnerability via the where parameter at admincp.php.

CVE ID : CVE-2023-39805
Source : cve@mitre.org
Score CVSS : /

Références :
http://icms.com | source : cve@mitre.org
http://icmsdev.com | source : cve@mitre.org
https://gist.github.com/ChubbyZ/3ad434bd5fc2ab1242dd32500384cfb5 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39806

Première publication le : 10-08-2023 20:15:10
Dernière modification le : 10-08-2023 20:15:10

Description :
iCMS v7.0.16 was discovered to contain a SQL injection vulnerability via the bakupdata function.

CVE ID : CVE-2023-39806
Source : cve@mitre.org
Score CVSS : /

Références :
http://icms.com | source : cve@mitre.org
http://icmsdev.com | source : cve@mitre.org
https://gist.github.com/ChubbyZ/27fa6f43699c9964ddfa701614fc4d5e | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40224

Première publication le : 10-08-2023 20:15:11
Dernière modification le : 10-08-2023 20:15:11

Description :
MISP 2.4174 allows XSS in app/View/Events/index.ctp.

CVE ID : CVE-2023-40224
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/MISP/MISP/commit/0274f8b6332e82317c9529b583d03897adf5883e | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-38333

Première publication le : 10-08-2023 21:15:10
Dernière modification le : 10-08-2023 21:15:10

Description :
Zoho ManageEngine Applications Manager through 16530 allows reflected XSS while logged in.

CVE ID : CVE-2023-38333
Source : cve@mitre.org
Score CVSS : /

Références :
https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2023-38333.html | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40225

Première publication le : 10-08-2023 21:15:10
Dernière modification le : 10-08-2023 21:15:10

Description :
HAProxy through 2.0.32, 2.1.x and 2.2.x through 2.2.30, 2.3.x and 2.4.x through 2.4.23, 2.5.x and 2.6.x before 2.6.15, 2.7.x before 2.7.10, and 2.8.x before 2.8.2 forwards empty Content-Length headers, violating RFC 9110 section 8.6. In uncommon cases, an HTTP/1 server behind HAProxy may interpret the payload as an extra request.

CVE ID : CVE-2023-40225
Source : cve@mitre.org
Score CVSS : /

Références :
https://cwe.mitre.org/data/definitions/436.html | source : cve@mitre.org
https://github.com/haproxy/haproxy/commit/6492f1f29d738457ea9f382aca54537f35f9d856 | source : cve@mitre.org
https://github.com/haproxy/haproxy/issues/2237 | source : cve@mitre.org
https://www.haproxy.org/download/2.6/src/CHANGELOG | source : cve@mitre.org
https://www.haproxy.org/download/2.7/src/CHANGELOG | source : cve@mitre.org
https://www.haproxy.org/download/2.8/src/CHANGELOG | source : cve@mitre.org


Source : hackerone.com

Vulnérabilité ID : CVE-2023-32567

Première publication le : 10-08-2023 19:15:09
Dernière modification le : 10-08-2023 19:15:09

Description :
Ivanti Avalanche decodeToMap XML External Entity Processing. Fixed in version 6.4.1.

CVE ID : CVE-2023-32567
Source : support@hackerone.com
Score CVSS : /

Références :
https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US | source : support@hackerone.com


Vulnérabilité ID : CVE-2023-28129

Première publication le : 10-08-2023 20:15:09
Dernière modification le : 10-08-2023 20:15:09

Description :
Desktop & Server Management (DSM) may have a possible execution of arbitrary commands.

CVE ID : CVE-2023-28129
Source : support@hackerone.com
Score CVSS : /

Références :
https://forums.ivanti.com/s/article/SA-2023-07-26-CVE-2023-28129 | source : support@hackerone.com


Ce site web utilise l'API de la NVD, mais n'est pas approuvé ou certifié par la NVD.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.