Dernières vulnérabilités du Jeudi 24 Août 2023

Dernières vulnérabilités du Jeudi 24 Août 2023
https://www.securitricks.com/content/images/size/w600/format/webp/2023/12/VULNERABILITIES-REPORTS-LOGO.png
{{titre}}

Dernière mise à jour efféctuée le 24/08/2023 à 23:58:02

(4) Vulnérabilité(s) CRITICAL [9.0, 10.0]

Source : sick.de

Vulnérabilité ID : CVE-2023-4419

Première publication le : 24-08-2023 19:15:43
Dernière modification le : 24-08-2023 19:55:57

Description :
The LMS5xx uses hard-coded credentials, which potentially allow low-skilled unauthorized remote attackers to reconfigure settings and /or disrupt the functionality of the device.

CVE ID : CVE-2023-4419
Source : psirt@sick.de
Score CVSS : 9.8

Références :
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json | source : psirt@sick.de
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf | source : psirt@sick.de
https://sick.com/psirt | source : psirt@sick.de


Vulnérabilité ID : CVE-2023-4420

Première publication le : 24-08-2023 19:15:43
Dernière modification le : 24-08-2023 19:55:57

Description :
A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK LMS5xx. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the LMS5xx and the Client, and potentially manipulate the data being transmitted.

CVE ID : CVE-2023-4420
Source : psirt@sick.de
Score CVSS : 9.8

Références :
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json | source : psirt@sick.de
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf | source : psirt@sick.de
https://sick.com/psirt | source : psirt@sick.de


Source : github.com

Vulnérabilité ID : CVE-2023-40572

Première publication le : 24-08-2023 02:15:09
Dernière modification le : 24-08-2023 12:55:22

Description :
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The create action is vulnerable to a CSRF attack, allowing script and thus remote code execution when targeting a user with script/programming right, thus compromising the confidentiality, integrity and availability of the whole XWiki installation. When a user with script right views this image and a log message `ERROR foo - Script executed!` appears in the log, the XWiki installation is vulnerable. This has been patched in XWiki 14.10.9 and 15.4RC1 by requiring a CSRF token for the actual page creation.

CVE ID : CVE-2023-40572
Source : security-advisories@github.com
Score CVSS : 9.0

Références :
https://github.com/xwiki/xwiki-platform/commit/4b20528808d0c311290b0d9ab2cfc44063380ef7 | source : security-advisories@github.com
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8m-7h83-9f6m | source : security-advisories@github.com
https://jira.xwiki.org/browse/XWIKI-20849 | source : security-advisories@github.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2023-40573

Première publication le : 24-08-2023 02:15:09
Dernière modification le : 24-08-2023 12:55:22

Description :
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki supports scheduled jobs that contain Groovy scripts. Currently, the job checks the content author of the job for programming right. However, modifying or adding a job script to a document doesn't modify the content author. Together with a CSRF vulnerability in the job scheduler, this can be exploited for remote code execution by an attacker with edit right on the wiki. If the attack is successful, an error log entry with "Job content executed" will be produced. This vulnerability has been patched in XWiki 14.10.9 and 15.4RC1.

CVE ID : CVE-2023-40573
Source : security-advisories@github.com
Score CVSS : 9.0

Références :
https://github.com/xwiki/xwiki-platform/commit/fcdcfed3fe2e8a3cad66ae0610795a2d58ab9662 | source : security-advisories@github.com
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8xhr-x3v8-rghj | source : security-advisories@github.com
https://jira.xwiki.org/browse/XWIKI-20852 | source : security-advisories@github.com

Vulnérabilité : CWE-284


(9) Vulnérabilité(s) HIGH [7.0, 8.9]

Source : dragos.com

Vulnérabilité ID : CVE-2023-40706

Première publication le : 24-08-2023 17:15:08
Dernière modification le : 24-08-2023 19:56:03

Description :
There is no limit on the number of login attempts in the web server for the SNAP PAC S1 Firmware version R10.3b. This could allow for a brute-force attack on the built-in web server login.

CVE ID : CVE-2023-40706
Source : ot-cert@dragos.com
Score CVSS : 8.6

Références :
https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-02 | source : ot-cert@dragos.com

Vulnérabilité : CWE-307


Vulnérabilité ID : CVE-2023-40707

Première publication le : 24-08-2023 17:15:08
Dernière modification le : 24-08-2023 19:56:03

Description :
There are no requirements for setting a complex password in the built-in web server of the SNAP PAC S1 Firmware version R10.3b, which could allow for a successful brute force attack if users don't set up complex credentials.

CVE ID : CVE-2023-40707
Source : ot-cert@dragos.com
Score CVSS : 8.6

Références :
https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-02 | source : ot-cert@dragos.com

Vulnérabilité : CWE-521


Source : cert-in.org.in

Vulnérabilité ID : CVE-2023-3705

Première publication le : 24-08-2023 08:15:09
Dernière modification le : 24-08-2023 12:55:22

Description :
The vulnerability exists in CP-Plus NVR due to an improper input handling at the web-based management interface of the affected product. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device. Successful exploitation of this vulnerability could allow the remote attacker to obtain sensitive information on the targeted device.

CVE ID : CVE-2023-3705
Source : vdisclose@cert-in.org.in
Score CVSS : 7.5

Références :
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0239 | source : vdisclose@cert-in.org.in

Vulnérabilité : CWE-200


Source : sick.de

Vulnérabilité ID : CVE-2023-31412

Première publication le : 24-08-2023 19:15:33
Dernière modification le : 24-08-2023 19:55:57

Description :
The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password.

CVE ID : CVE-2023-31412
Source : psirt@sick.de
Score CVSS : 7.5

Références :
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json | source : psirt@sick.de
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf | source : psirt@sick.de
https://sick.com/psirt | source : psirt@sick.de


Vulnérabilité ID : CVE-2023-4418

Première publication le : 24-08-2023 19:15:42
Dernière modification le : 24-08-2023 19:55:57

Description :
A remote unprivileged attacker can sent multiple packages to the LMS5xx to disrupt its availability through a TCP SYN-based denial-of-service (DDoS) attack. By exploiting this vulnerability, an attacker can flood the targeted LMS5xx with a high volume of TCP SYN requests, overwhelming its resources and causing it to become unresponsive or unavailable for legitimate users.

CVE ID : CVE-2023-4418
Source : psirt@sick.de
Score CVSS : 7.5

Références :
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json | source : psirt@sick.de
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf | source : psirt@sick.de
https://sick.com/psirt | source : psirt@sick.de


Source : patchstack.com

Vulnérabilité ID : CVE-2023-32510

Première publication le : 24-08-2023 12:15:07
Dernière modification le : 24-08-2023 12:55:22

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rolf van Gelder Order Your Posts Manually plugin <= 2.2.5 versions.

CVE ID : CVE-2023-32510
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/order-your-posts-manually/wordpress-order-your-posts-manually-plugin-2-2-5-reflected-cross-site-scripting-xss-vulnerability-2?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32511

Première publication le : 24-08-2023 12:15:07
Dernière modification le : 24-08-2023 12:55:22

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Booking Ultra Pro Booking Ultra Pro Appointments Booking Calendar Plugin plugin <= 1.1.8 versions.

CVE ID : CVE-2023-32511
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/booking-ultra-pro/wordpress-booking-ultra-pro-appointments-booking-calendar-plugin-plugin-1-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32516

Première publication le : 24-08-2023 12:15:07
Dernière modification le : 24-08-2023 12:55:22

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in GloriaFood Restaurant Menu – Food Ordering System – Table Reservation plugin <= 2.3.6 versions.

CVE ID : CVE-2023-32516
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/menu-ordering-reservations/wordpress-restaurant-menu-food-ordering-system-table-reservation-plugin-2-3-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Source : qnapsecurity.com.tw

Vulnérabilité ID : CVE-2023-34971

Première publication le : 24-08-2023 17:15:08
Dernière modification le : 24-08-2023 19:56:03

Description :
An inadequate encryption strength vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows local network clients to decrypt the data using brute force attacks via unspecified vectors. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QTS 4.5.4.2467 build 20230718 and later QuTS hero h5.1.0.2424 build 20230609 and later QuTS hero h4.5.4.2476 build 20230728 and later

CVE ID : CVE-2023-34971
Source : security@qnapsecurity.com.tw
Score CVSS : 7.1

Références :
https://www.qnap.com/en/security-advisory/qsa-23-60 | source : security@qnapsecurity.com.tw

Vulnérabilité : CWE-326


(12) Vulnérabilité(s) MEDIUM [4.0, 6.9]

Source : dragos.com

Vulnérabilité ID : CVE-2023-40709

Première publication le : 24-08-2023 17:15:09
Dernière modification le : 24-08-2023 19:55:57

Description :
An adversary could crash the entire device by sending a large quantity of ICMP requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the SNAP PAC S1 Firmware version R10.3b

CVE ID : CVE-2023-40709
Source : ot-cert@dragos.com
Score CVSS : 6.8

Références :
https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-02 | source : ot-cert@dragos.com

Vulnérabilité : CWE-400


Vulnérabilité ID : CVE-2023-40710

Première publication le : 24-08-2023 17:15:09
Dernière modification le : 24-08-2023 19:55:57

Description :
An adversary could cause a continuous restart loop to the entire device by sending a large quantity of HTTP GET requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the SNAP PAC S1 Firmware version R10.3b

CVE ID : CVE-2023-40710
Source : ot-cert@dragos.com
Score CVSS : 6.8

Références :
https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-02 | source : ot-cert@dragos.com

Vulnérabilité : CWE-400


Vulnérabilité ID : CVE-2023-40708

Première publication le : 24-08-2023 17:15:09
Dernière modification le : 24-08-2023 19:56:03

Description :
The File Transfer Protocol (FTP) port is open by default in the SNAP PAC S1 Firmware version R10.3b. This could allow an adversary to access some device files.

CVE ID : CVE-2023-40708
Source : ot-cert@dragos.com
Score CVSS : 5.8

Références :
https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-02 | source : ot-cert@dragos.com

Vulnérabilité : CWE-284


Source : us.ibm.com

Vulnérabilité ID : CVE-2023-40371

Première publication le : 24-08-2023 14:15:10
Dernière modification le : 24-08-2023 19:56:03

Description :
IBM AIX 7.2, 7.3, VIOS 3.1's OpenSSH implementation could allow a non-privileged local user to access files outside of those allowed due to improper access controls. IBM X-Force ID: 263476.

CVE ID : CVE-2023-40371
Source : psirt@us.ibm.com
Score CVSS : 6.2

Références :
https://exchange.xforce.ibmcloud.com/vulnerabilities/263476 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7028420 | source : psirt@us.ibm.com

Vulnérabilité : CWE-200


Source : moxa.com

Vulnérabilité ID : CVE-2023-4227

Première publication le : 24-08-2023 06:15:44
Dernière modification le : 24-08-2023 12:55:22

Description :
A vulnerability has been identified in the ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which can be exploited by malicious actors to potentially gain unauthorized access to the product. This could lead to security breaches, data theft, and unauthorized manipulation of sensitive information. The vulnerability is attributed to the presence of an unauthorized service, which could potentially enable unauthorized access to the. device.

CVE ID : CVE-2023-4227
Source : psirt@moxa.com
Score CVSS : 5.3

Références :
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230310-iologik-4000-series-multiple-web-server-vulnerabilities-and-improper-access-control-vulnerability | source : psirt@moxa.com

Vulnérabilité : CWE-284


Vulnérabilité ID : CVE-2023-4230

Première publication le : 24-08-2023 07:15:12
Dernière modification le : 24-08-2023 12:55:22

Description :
A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which has the potential to facilitate the collection of information on ioLogik 4000 Series devices. This vulnerability may enable attackers to gather information for the purpose of assessing vulnerabilities and potential attack vectors.

CVE ID : CVE-2023-4230
Source : psirt@moxa.com
Score CVSS : 5.3

Références :
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230310-iologik-4000-series-multiple-web-server-vulnerabilities-and-improper-access-control-vulnerability | source : psirt@moxa.com

Vulnérabilité : CWE-200


Vulnérabilité ID : CVE-2023-4229

Première publication le : 24-08-2023 07:15:11
Dernière modification le : 24-08-2023 12:55:22

Description :
A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, potentially exposing users to security risks. This vulnerability may allow attackers to trick users into interacting with malicious content, leading to unintended actions or unauthorized data disclosures.

CVE ID : CVE-2023-4229
Source : psirt@moxa.com
Score CVSS : 4.3

Références :
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230310-iologik-4000-series-multiple-web-server-vulnerabilities-and-improper-access-control-vulnerability | source : psirt@moxa.com

Vulnérabilité : CWE-1021


Source : cert-in.org.in

Vulnérabilité ID : CVE-2023-3704

Première publication le : 24-08-2023 07:15:11
Dernière modification le : 24-08-2023 12:55:22

Description :
The vulnerability exists in CP-Plus DVR due to an improper input validation within the web-based management interface of the affected products. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device. Successful exploitation of this vulnerability could allow the remote attacker to change system time of the targeted device.

CVE ID : CVE-2023-3704
Source : vdisclose@cert-in.org.in
Score CVSS : 5.3

Références :
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0240 | source : vdisclose@cert-in.org.in


Source : gitlab.com

Vulnérabilité ID : CVE-2023-4511

Première publication le : 24-08-2023 07:15:12
Dernière modification le : 24-08-2023 12:55:22

Description :
BT SDP dissector infinite loop in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file

CVE ID : CVE-2023-4511
Source : cve@gitlab.com
Score CVSS : 5.3

Références :
https://gitlab.com/wireshark/wireshark/-/issues/19258 | source : cve@gitlab.com
https://www.wireshark.org/security/wnpa-sec-2023-24.html | source : cve@gitlab.com

Vulnérabilité : CWE-835


Vulnérabilité ID : CVE-2023-4512

Première publication le : 24-08-2023 07:15:12
Dernière modification le : 24-08-2023 12:55:22

Description :
CBOR dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file

CVE ID : CVE-2023-4512
Source : cve@gitlab.com
Score CVSS : 5.3

Références :
https://gitlab.com/wireshark/wireshark/-/issues/19144 | source : cve@gitlab.com
https://www.wireshark.org/security/wnpa-sec-2023-23.html | source : cve@gitlab.com

Vulnérabilité : CWE-674


Vulnérabilité ID : CVE-2023-4513

Première publication le : 24-08-2023 07:15:12
Dernière modification le : 24-08-2023 12:55:22

Description :
BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file

CVE ID : CVE-2023-4513
Source : cve@gitlab.com
Score CVSS : 5.3

Références :
https://gitlab.com/wireshark/wireshark/-/issues/19259 | source : cve@gitlab.com
https://www.wireshark.org/security/wnpa-sec-2023-25.html | source : cve@gitlab.com

Vulnérabilité : CWE-401


Source : vmware.com

Vulnérabilité ID : CVE-2023-34040

Première publication le : 24-08-2023 13:15:07
Dernière modification le : 24-08-2023 19:56:03

Description :
In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and earlier, a possible deserialization attack vector existed, but only if unusual configuration was applied. An attacker would have to construct a malicious serialized object in one of the deserialization exception record headers. Specifically, an application is vulnerable when all of the following are true: * The user does not configure an ErrorHandlingDeserializer for the key and/or value of the record * The user explicitly sets container properties checkDeserExWhenKeyNull and/or checkDeserExWhenValueNull container properties to true. * The user allows untrusted sources to publish to a Kafka topic By default, these properties are false, and the container only attempts to deserialize the headers if an ErrorHandlingDeserializer is configured. The ErrorHandlingDeserializer prevents the vulnerability by removing any such malicious headers before processing the record.

CVE ID : CVE-2023-34040
Source : security@vmware.com
Score CVSS : 5.3

Références :
https://spring.io/security/cve-2023-34040 | source : security@vmware.com

Vulnérabilité : CWE-502


(3) Vulnérabilité(s) LOW [0.1, 3.9]

Source : qnapsecurity.com.tw

Vulnérabilité ID : CVE-2023-34972

Première publication le : 24-08-2023 17:15:08
Dernière modification le : 24-08-2023 19:56:03

Description :
A cleartext transmission of sensitive information vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows local network clients to read the contents of unexpected sensitive data via unspecified vectors. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QuTS hero h5.1.0.2424 build 20230609 and later

CVE ID : CVE-2023-34972
Source : security@qnapsecurity.com.tw
Score CVSS : 3.5

Références :
https://www.qnap.com/en/security-advisory/qsa-23-58 | source : security@qnapsecurity.com.tw

Vulnérabilité : CWE-319


Vulnérabilité ID : CVE-2023-34973

Première publication le : 24-08-2023 17:15:08
Dernière modification le : 24-08-2023 19:56:03

Description :
An insufficient entropy vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows remote users to predict secret via unspecified vectors. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QuTS hero h5.1.0.2424 build 20230609 and later

CVE ID : CVE-2023-34973
Source : security@qnapsecurity.com.tw
Score CVSS : 3.1

Références :
https://www.qnap.com/en/security-advisory/qsa-23-59 | source : security@qnapsecurity.com.tw

Vulnérabilité : CWE-331


Source : moxa.com

Vulnérabilité ID : CVE-2023-4228

Première publication le : 24-08-2023 07:15:11
Dernière modification le : 24-08-2023 12:55:22

Description :
A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, where the session cookies attribute is not set properly in the affected application. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation.

CVE ID : CVE-2023-4228
Source : psirt@moxa.com
Score CVSS : 3.1

Références :
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230310-iologik-4000-series-multiple-web-server-vulnerabilities-and-improper-access-control-vulnerability | source : psirt@moxa.com

Vulnérabilité : CWE-1004


(23) Vulnérabilité(s) NO SCORE [0.0, 0.0]

Source : hackerone.com

Vulnérabilité ID : CVE-2023-32559

Première publication le : 24-08-2023 02:15:09
Dernière modification le : 24-08-2023 12:55:22

Description :
A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the policy mechanism by requiring internal modules and eventually take advantage of `process.binding('spawn_sync')` run arbitrary code, outside of the limits defined in a `policy.json` file. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.

CVE ID : CVE-2023-32559
Source : support@hackerone.com
Score CVSS : /

Références :
https://hackerone.com/reports/1946470 | source : support@hackerone.com


Source : redhat.com

Vulnérabilité ID : CVE-2023-38288

Première publication le : 24-08-2023 09:15:10
Dernière modification le : 24-08-2023 09:15:10

Description :
** REJECT ** Not a Security Issue.

CVE ID : CVE-2023-38288
Source : secalert@redhat.com
Score CVSS : /

Références :


Vulnérabilité ID : CVE-2023-38289

Première publication le : 24-08-2023 09:15:10
Dernière modification le : 24-08-2023 09:15:10

Description :
** REJECT ** Not a Security Issue.

CVE ID : CVE-2023-38289
Source : secalert@redhat.com
Score CVSS : /

Références :


Source : mitre.org

Vulnérabilité ID : CVE-2023-40874

Première publication le : 24-08-2023 15:15:07
Dernière modification le : 24-08-2023 19:56:03

Description :
DedeCMS up to and including 5.7.110 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities at /dede/vote_add.php via the votename and voteitem1 parameters.

CVE ID : CVE-2023-40874
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/DiliLearngent/BugReport/blob/main/php/DedeCMS/xss1.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40875

Première publication le : 24-08-2023 15:15:07
Dernière modification le : 24-08-2023 19:56:03

Description :
DedeCMS up to and including 5.7.110 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities at /dede/vote_edit.php via the votename and votenote parameters.

CVE ID : CVE-2023-40875
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/DiliLearngent/BugReport/blob/main/php/DedeCMS/xss2.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40876

Première publication le : 24-08-2023 15:15:07
Dernière modification le : 24-08-2023 19:56:03

Description :
DedeCMS up to and including 5.7.110 was discovered to contain a cross-site scripting (XSS) vulnerability at /dede/freelist_add.php via the title parameter.

CVE ID : CVE-2023-40876
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/DiliLearngent/BugReport/blob/main/php/DedeCMS/xss3.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40877

Première publication le : 24-08-2023 15:15:07
Dernière modification le : 24-08-2023 19:56:03

Description :
DedeCMS up to and including 5.7.110 was discovered to contain a cross-site scripting (XSS) vulnerability at /dede/freelist_edit.php via the title parameter.

CVE ID : CVE-2023-40877
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/DiliLearngent/BugReport/blob/main/php/DedeCMS/xss4.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39834

Première publication le : 24-08-2023 18:15:07
Dernière modification le : 24-08-2023 19:55:57

Description :
PbootCMS below v3.2.0 was discovered to contain a command injection vulnerability via create_function.

CVE ID : CVE-2023-39834
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Pbootcms/Pbootcms/issues/8 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40891

Première publication le : 24-08-2023 18:15:07
Dernière modification le : 24-08-2023 19:55:57

Description :
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter firewallEn at /goform/SetFirewallCfg.

CVE ID : CVE-2023-40891
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/peris-navince/founded-0-days/blob/main/ac8/formSetFirewallCfg/1.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40892

Première publication le : 24-08-2023 18:15:07
Dernière modification le : 24-08-2023 19:55:57

Description :
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter schedStartTime and schedEndTime at /goform/openSchedWifi.

CVE ID : CVE-2023-40892
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/peris-navince/founded-0-days/blob/main/ac8/setSchedEWifi/1.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40893

Première publication le : 24-08-2023 18:15:07
Dernière modification le : 24-08-2023 19:55:57

Description :
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter time at /goform/PowerSaveSet.

CVE ID : CVE-2023-40893
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/peris-navince/founded-0-days/blob/main/ac8/setSmartPowerManagement/1.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40894

Première publication le : 24-08-2023 18:15:07
Dernière modification le : 24-08-2023 19:55:57

Description :
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list at /goform/SetStaticRouteCfg.

CVE ID : CVE-2023-40894
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/peris-navince/founded-0-days/blob/main/ac8/fromSetStaticRouteCfg/1.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40895

Première publication le : 24-08-2023 18:15:07
Dernière modification le : 24-08-2023 19:55:57

Description :
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list at /goform/SetVirtualServerCfg.

CVE ID : CVE-2023-40895
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/peris-navince/founded-0-days/blob/main/ac8/formSetVirtualSer/1.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40896

Première publication le : 24-08-2023 18:15:07
Dernière modification le : 24-08-2023 19:55:57

Description :
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list and bindnum at /goform/SetIpMacBind.

CVE ID : CVE-2023-40896
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/peris-navince/founded-0-days/blob/main/ac8/SetIpMacBind/1.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40897

Première publication le : 24-08-2023 18:15:08
Dernière modification le : 24-08-2023 19:55:57

Description :
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter mac at /goform/GetParentControlInfo.

CVE ID : CVE-2023-40897
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/peris-navince/founded-0-days/blob/main/ac8/GetParentControlInfo/1.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40898

Première publication le : 24-08-2023 18:15:08
Dernière modification le : 24-08-2023 19:55:57

Description :
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter timeZone at /goform/SetSysTimeCfg.

CVE ID : CVE-2023-40898
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/peris-navince/founded-0-days/blob/main/ac8/SetSysTimeCfg/1.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40899

Première publication le : 24-08-2023 18:15:08
Dernière modification le : 24-08-2023 19:55:57

Description :
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter macFilterType and parameter deviceList at /goform/setMacFilterCfg.

CVE ID : CVE-2023-40899
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/peris-navince/founded-0-days/blob/main/ac8/formSetMacFilterCfg/1.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40900

Première publication le : 24-08-2023 18:15:08
Dernière modification le : 24-08-2023 19:55:57

Description :
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list at /goform/SetNetControlList.

CVE ID : CVE-2023-40900
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/peris-navince/founded-0-days/blob/main/ac8/formSetQosBand/1.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40901

Première publication le : 24-08-2023 18:15:08
Dernière modification le : 24-08-2023 19:55:57

Description :
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter macFilterType and parameter deviceList at url /goform/setMacFilterCfg.

CVE ID : CVE-2023-40901
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/peris-navince/founded-0-days/blob/main/ac10/fromSetStaticRouteCfg/1.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40902

Première publication le : 24-08-2023 18:15:08
Dernière modification le : 24-08-2023 19:55:57

Description :
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter list and bindnum at /goform/SetIpMacBind.

CVE ID : CVE-2023-40902
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/peris-navince/founded-0-days/blob/main/ac10/SetIpMacBind/1.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40904

Première publication le : 24-08-2023 18:15:08
Dernière modification le : 24-08-2023 19:55:57

Description :
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter macFilterType and parameter deviceList at /goform/setMacFilterCfg.

CVE ID : CVE-2023-40904
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/peris-navince/founded-0-days/blob/main/ac10/formSetMacFilterCfg/1.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39801

Première publication le : 24-08-2023 20:15:08
Dernière modification le : 24-08-2023 20:15:08

Description :
A lack of exception handling in the Renault Easy Link Multimedia System Software Version 283C35519R allows attackers to cause a Denial of Service (DoS) via supplying crafted WMA files when connecting a device to the vehicle's USB plug and play feature.

CVE ID : CVE-2023-39801
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/zj3t/Automotive-vulnerabilities/blob/main/RENAULT/ZOE_EV_2021/Vuln%232/README.md | source : cve@mitre.org


Source : mozilla.org

Vulnérabilité ID : CVE-2022-46884

Première publication le : 24-08-2023 17:15:08
Dernière modification le : 24-08-2023 19:56:03

Description :
A potential use-after-free vulnerability existed in SVG Images if the Refresh Driver was destroyed at an inopportune time. This could have lead to memory corruption or a potentially exploitable crash. *Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 106. This vulnerability affects Firefox < 106.

CVE ID : CVE-2022-46884
Source : security@mozilla.org
Score CVSS : /

Références :
https://bugzilla.mozilla.org/show_bug.cgi?id=1786818 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2022-44/ | source : security@mozilla.org


Ce site web utilise l'API de la NVD, mais n'est pas approuvé ou certifié par la NVD.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.