Dernières vulnérabilités du Mercredi 12 Juillet 2023

Dernières vulnérabilités du Mercredi 12 Juillet 2023
{{titre}}

Dernière mise à jour efféctuée le 12/07/2023 à 16:25:51

(2) Vulnérabilité(s) CRITICAL [9.0, 10.0]

Source : rockwellautomation.com

Vulnérabilité ID : CVE-2023-3595

Première publication le : 12-07-2023 13:15:09
Dernière modification le : 12-07-2023 14:15:10

Description :
Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.

CVE ID : CVE-2023-3595
Source : PSIRT@rockwellautomation.com
Score CVSS : 9.8

Références :
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010 | source : PSIRT@rockwellautomation.com

Vulnérabilité : CWE-787


Source : apache.org

Vulnérabilité ID : CVE-2023-30429

Première publication le : 12-07-2023 10:15:09
Dernière modification le : 12-07-2023 12:46:11

Description :
Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar. This issue affects Apache Pulsar: before 2.10.4, and 2.11.0. When a client connects to the Pulsar Function Worker via the Pulsar Proxy where the Pulsar Proxy uses mTLS authentication to authenticate with the Pulsar Function Worker, the Pulsar Function Worker incorrectly performs authorization by using the Proxy's role for authorization instead of the client's role, which can lead to privilege escalation, especially if the proxy is configured with a superuser role. The recommended mitigation for impacted users is to upgrade the Pulsar Function Worker to a patched version. 2.10 Pulsar Function Worker users should upgrade to at least 2.10.4. 2.11 Pulsar Function Worker users should upgrade to at least 2.11.1. 3.0 Pulsar Function Worker users are unaffected. Any users running the Pulsar Function Worker for 2.9.* and earlier should upgrade to one of the above patched versions.

CVE ID : CVE-2023-30429
Source : security@apache.org
Score CVSS : 9.6

Références :
https://lists.apache.org/thread/v0gcvvxswr830314q4b1kybsfmcf3jf8 | source : security@apache.org

Vulnérabilité : CWE-863


(28) Vulnérabilité(s) HIGH [7.0, 8.9]

Source : wordfence.com

Vulnérabilité ID : CVE-2023-3105

Première publication le : 12-07-2023 05:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
The LearnDash LMS plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 4.6.0. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for attackers with with existing account access at any level, to change user passwords and potentially take over administrator accounts.

CVE ID : CVE-2023-3105
Source : security@wordfence.com
Score CVSS : 8.8

Références :
https://www.learndash.com/release-notes/ | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/2318b3e1-268d-45fa-83bf-c6e88f1b9013?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-639


Vulnérabilité ID : CVE-2023-3525

Première publication le : 12-07-2023 05:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
The Getnet Argentina para Woocommerce plugin for WordPress is vulnerable to authorization bypass due to missing validation on the 'webhook' function in versions up to, and including, 0.0.4. This makes it possible for unauthenticated attackers to set their payment status to 'APPROVED' without payment.

CVE ID : CVE-2023-3525
Source : security@wordfence.com
Score CVSS : 7.5

Références :
https://www.wordfence.com/threat-intel/vulnerabilities/id/245e9117-ca63-458e-a094-60a759f5ec19?source=cve | source : security@wordfence.com
https://www.youtube.com/watch?v=xTyWqh93AM0 | source : security@wordfence.com

Vulnérabilité : CWE-639


Vulnérabilité ID : CVE-2023-3023

Première publication le : 12-07-2023 05:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The WP EasyCart plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in versions up to, and including, 5.4.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level or above permissions, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CVE ID : CVE-2023-3023
Source : security@wordfence.com
Score CVSS : 7.2

Références :
https://plugins.trac.wordpress.org/changeset/2923668/wp-easycart/trunk/admin/inc/wp_easycart_admin_table.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/c9c1ddaf-4bf2-4937-b7bf-a09162db043e?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-3080

Première publication le : 12-07-2023 05:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The WP Mail Catcher plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 2.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-3080
Source : security@wordfence.com
Score CVSS : 7.2

Références :
https://plugins.trac.wordpress.org/changeset/2924014/wp-mail-catcher | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/1525e1c9-4b94-4f9f-92c5-fc69fe000771?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3081

Première publication le : 12-07-2023 05:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The WP Mail Logging plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 1.11.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: An incomplete fix was released in 1.11.1.

CVE ID : CVE-2023-3081
Source : security@wordfence.com
Score CVSS : 7.2

Références :
https://plugins.trac.wordpress.org/changeset/2923464/wp-mail-logging | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2925728/wp-mail-logging | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/ef20b3e6-d8f4-458e-b604-b46ef16e229e?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3082

Première publication le : 12-07-2023 05:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.5.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-3082
Source : security@wordfence.com
Score CVSS : 7.2

Références :
https://plugins.trac.wordpress.org/changeset/2935537/post-smtp | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/6ecd0fa6-4fdb-4780-9560-0bb126800685?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3087

Première publication le : 12-07-2023 05:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The FluentSMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 2.2.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-3087
Source : security@wordfence.com
Score CVSS : 7.2

Références :
https://plugins.trac.wordpress.org/changeset/2935217/fluent-smtp/trunk/app/Models/Logger.php | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2935217/fluent-smtp/trunk/app/Services/Mailer/BaseHandler.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/fa47a794-e5ce-491d-a10b-c7c5718aa853?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3088

Première publication le : 12-07-2023 05:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The WP Mail Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-3088
Source : security@wordfence.com
Score CVSS : 7.2

Références :
https://plugins.trac.wordpress.org/changeset/2931706/wp-mail-log | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/86ee1acb-6f0c-40e6-80a0-fc93b61c1602?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3092

Première publication le : 12-07-2023 05:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The SMTP Mail plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 1.2.16 due to insufficient input sanitization and output escaping when the 'Save Data SendMail' feature is enabled. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-3092
Source : security@wordfence.com
Score CVSS : 7.2

Références :
https://plugins.trac.wordpress.org/browser/smtp-mail/trunk/includes/data-list-table.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/8ae734d1-0cd4-4ff5-8448-828b0fb64f70?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3093

Première publication le : 12-07-2023 05:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.4.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-3093
Source : security@wordfence.com
Score CVSS : 7.2

Références :
https://plugins.trac.wordpress.org/changeset/2922163/ | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/68e6ec3a-c5fd-4f63-a9a0-2c9ddfb96e2e?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3122

Première publication le : 12-07-2023 05:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
The GD Mail Queue plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 3.9.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-3122
Source : security@wordfence.com
Score CVSS : 7.2

Références :
https://plugins.trac.wordpress.org/changeset/2923988/gd-mail-queue | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/0b668f45-c7fb-481b-bc8e-115e5b7248c9?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3135

Première publication le : 12-07-2023 05:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
The Mailtree Log Mail plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-3135
Source : security@wordfence.com
Score CVSS : 7.2

Références :
https://plugins.trac.wordpress.org/changeset/2928716/mailtree-log-mail | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/24d0229c-0f1b-42df-b89a-ce0b8a3fda7e?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3158

Première publication le : 12-07-2023 05:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
The Mail Control plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 0.2.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-3158
Source : security@wordfence.com
Score CVSS : 7.2

Références :
https://plugins.trac.wordpress.org/browser/mail-control/trunk/includes/admin.php#L42 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/77537eb8-1c84-4702-aba1-727b0de1c3e1?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3166

Première publication le : 12-07-2023 05:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
The Lana Email Logger plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, Lana Email Logger due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-3166
Source : security@wordfence.com
Score CVSS : 7.2

Références :
https://plugins.trac.wordpress.org/changeset/2923581/lana-email-logger#file1 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/d5f372bf-6b13-4ba7-8b8b-9d3b500e4420?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3167

Première publication le : 12-07-2023 05:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
The Mail Queue plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-3167
Source : security@wordfence.com
Score CVSS : 7.2

Références :
https://plugins.trac.wordpress.org/changeset/2924661/mail-queue | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/d4aaca22-76b9-42ec-a960-65d44d696324?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3168

Première publication le : 12-07-2023 05:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
The WP Reroute Email plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 1.4.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-3168
Source : security@wordfence.com
Score CVSS : 7.2

Références :
https://plugins.trac.wordpress.org/changeset/2933637/wp-reroute-email | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/4a0e962b-b6a0-4179-91d0-5ede508a9895?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Source : se.com

Vulnérabilité ID : CVE-2023-37196

Première publication le : 12-07-2023 07:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
A CWE-89: Improper Neutralization of Special Elements vulnerability used in an SQL Command ('SQL Injection') vulnerability exists that could allow a user already authenticated on DCE to access unauthorized content, change, or delete content, or perform unauthorized actions when tampering with the alert settings of endpoints on DCE.

CVE ID : CVE-2023-37196
Source : cybersecurity@se.com
Score CVSS : 8.8

Références :
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-192-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-192-01.pdf | source : cybersecurity@se.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-37197

Première publication le : 12-07-2023 07:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
A CWE-89: Improper Neutralization of Special Elements vulnerability used in an SQL Command ('SQL Injection') vulnerability exists that could allow a user already authenticated on DCE to access unauthorized content, change, or delete content, or perform unauthorized actions when tampering with the mass configuration settings of endpoints on DCE.

CVE ID : CVE-2023-37197
Source : cybersecurity@se.com
Score CVSS : 8.8

Références :
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-192-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-192-01.pdf | source : cybersecurity@se.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-29414

Première publication le : 12-07-2023 09:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
A CWE-120: Buffer Copy without Checking Size of Input (Classic Buffer Overflow) vulnerability exists that could cause user privilege escalation if a local user sends specific string input to a local function call.

CVE ID : CVE-2023-29414
Source : cybersecurity@se.com
Score CVSS : 7.8

Références :
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-192-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-192-03.pdf | source : cybersecurity@se.com

Vulnérabilité : CWE-120


Source : apache.org

Vulnérabilité ID : CVE-2023-30428

Première publication le : 12-07-2023 10:15:09
Dernière modification le : 12-07-2023 12:46:11

Description :
Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar Broker's Rest Producer allows authenticated user with a custom HTTP header to produce a message to any topic using the broker's admin role. This issue affects Apache Pulsar Brokers: from 2.9.0 through 2.9.5, from 2.10.0 before 2.10.4, 2.11.0. The vulnerability is exploitable when an attacker can connect directly to the Pulsar Broker. If an attacker is connecting through the Pulsar Proxy, there is no known way to exploit this authorization vulnerability. There are two known risks for affected users. First, an attacker could produce garbage messages to any topic in the cluster. Second, an attacker could produce messages to the topic level policies topic for other tenants and influence topic settings that could lead to exfiltration and/or deletion of messages for other tenants. 2.8 Pulsar Broker users and earlier are unaffected. 2.9 Pulsar Broker users should upgrade to one of the patched versions. 2.10 Pulsar Broker users should upgrade to at least 2.10.4. 2.11 Pulsar Broker users should upgrade to at least 2.11.1. 3.0 Pulsar Broker users are unaffected.

CVE ID : CVE-2023-30428
Source : security@apache.org
Score CVSS : 8.2

Références :
https://lists.apache.org/thread/v39hqtgrmyxr85rmofwvgrktnflbq3q5 | source : security@apache.org

Vulnérabilité : CWE-863


Vulnérabilité ID : CVE-2023-37579

Première publication le : 12-07-2023 10:15:11
Dernière modification le : 12-07-2023 12:46:11

Description :
Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar Function Worker. This issue affects Apache Pulsar: before 2.10.4, and 2.11.0. Any authenticated user can retrieve a source's configuration or a sink's configuration without authorization. Many sources and sinks contain credentials in the configuration, which could lead to leaked credentials. This vulnerability is mitigated by the fact that there is not a known way for an authenticated user to enumerate another tenant's sources or sinks, meaning the source or sink name would need to be guessed in order to exploit this vulnerability. The recommended mitigation for impacted users is to upgrade the Pulsar Function Worker to a patched version. 2.10 Pulsar Function Worker users should upgrade to at least 2.10.4. 2.11 Pulsar Function Worker users should upgrade to at least 2.11.1. 3.0 Pulsar Function Worker users are unaffected. Any users running the Pulsar Function Worker for 2.9.* and earlier should upgrade to one of the above patched versions.

CVE ID : CVE-2023-37579
Source : security@apache.org
Score CVSS : 8.2

Références :
https://lists.apache.org/thread/0dmn3cb5n2p08o3cpj3ycfhzfqs2ppwz | source : security@apache.org

Vulnérabilité : CWE-863


Vulnérabilité ID : CVE-2022-42009

Première publication le : 12-07-2023 10:15:09
Dernière modification le : 12-07-2023 12:46:11

Description :
SpringEL injection in the server agent in Apache Ambari version 2.7.0 to 2.7.6 allows a malicious authenticated user to execute arbitrary code remotely. Users are recommended to upgrade to 2.7.7.

CVE ID : CVE-2022-42009
Source : security@apache.org
Score CVSS : 8.0

Références :
https://lists.apache.org/thread/6xf477ttz1oxmg0bx0tpdoz2mlqd7sbc | source : security@apache.org

Vulnérabilité : CWE-917


Vulnérabilité ID : CVE-2022-45855

Première publication le : 12-07-2023 10:15:09
Dernière modification le : 12-07-2023 12:46:11

Description :
SpringEL injection in the metrics source in Apache Ambari version 2.7.0 to 2.7.6 allows a malicious authenticated user to execute arbitrary code remotely. Users are recommended to upgrade to 2.7.7.

CVE ID : CVE-2022-45855
Source : security@apache.org
Score CVSS : 8.0

Références :
https://lists.apache.org/thread/302c4hwfjy9lx63jrbhcdx948pxc54l1 | source : security@apache.org

Vulnérabilité : CWE-917


Source : 3ds.com

Vulnérabilité ID : CVE-2023-2762

Première publication le : 12-07-2023 08:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
A Use-After-Free vulnerability in SLDPRT file reading procedure exists in SOLIDWORKS Desktop from Release SOLIDWORKS 2021 through Release SOLIDWORKS 2023. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted SLDPRT file.

CVE ID : CVE-2023-2762
Source : 3DS.Information-Security@3ds.com
Score CVSS : 7.8

Références :
https://www.3ds.com/vulnerability/advisories | source : 3DS.Information-Security@3ds.com

Vulnérabilité : CWE-416


Vulnérabilité ID : CVE-2023-2763

Première publication le : 12-07-2023 08:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
Use-After-Free, Out-of-bounds Write and Heap-based Buffer Overflow vulnerabilities exist in the DWG and DXF file reading procedure in SOLIDWORKS Desktop from Release SOLIDWORKS 2021 through Release SOLIDWORKS 2023. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted DWG or DXF file.

CVE ID : CVE-2023-2763
Source : 3DS.Information-Security@3ds.com
Score CVSS : 7.8

Références :
https://www.3ds.com/vulnerability/advisories | source : 3DS.Information-Security@3ds.com

Vulnérabilité : CWE-416Vulnérabilité : CWE-787


Source : adobe.com

Vulnérabilité ID : CVE-2021-43757

Première publication le : 12-07-2023 12:15:09
Dernière modification le : 12-07-2023 12:46:11

Description :
Adobe Media Encoder versions 22.0, 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious 3GP ?file

CVE ID : CVE-2021-43757
Source : psirt@adobe.com
Score CVSS : 7.8

Références :
https://helpx.adobe.com/security/products/media-encoder/apsb21-118.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Source : rockwellautomation.com

Vulnérabilité ID : CVE-2023-3596

Première publication le : 12-07-2023 13:15:09
Dernière modification le : 12-07-2023 13:56:22

Description :
Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.

CVE ID : CVE-2023-3596
Source : PSIRT@rockwellautomation.com
Score CVSS : 7.5

Références :
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010 | source : PSIRT@rockwellautomation.com

Vulnérabilité : CWE-787


Source : cisco.com

Vulnérabilité ID : CVE-2023-20185

Première publication le : 12-07-2023 14:15:09
Dernière modification le : 12-07-2023 14:15:09

Description :
A vulnerability in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, remote attacker to read or modify intersite encrypted traffic. This vulnerability is due to an issue with the implementation of the ciphers that are used by the CloudSec encryption feature on affected switches. An attacker with an on-path position between the ACI sites could exploit this vulnerability by intercepting intersite encrypted traffic and using cryptanalytic techniques to break the encryption. A successful exploit could allow the attacker to read or modify the traffic that is transmitted between the sites. Cisco has not released and will not release software updates that address this vulnerability.

CVE ID : CVE-2023-20185
Source : ykramarz@cisco.com
Score CVSS : 7.4

Références :
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aci-cloudsec-enc-Vs5Wn2sX | source : ykramarz@cisco.com


(48) Vulnérabilité(s) MEDIUM [4.0, 6.9]

Source : se.com

Vulnérabilité ID : CVE-2023-37198

Première publication le : 12-07-2023 07:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that could cause remote code execution when an admin user on DCE uploads or tampers with install packages.

CVE ID : CVE-2023-37198
Source : cybersecurity@se.com
Score CVSS : 6.8

Références :
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-192-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-192-01.pdf | source : cybersecurity@se.com

Vulnérabilité : CWE-94


Vulnérabilité ID : CVE-2023-37199

Première publication le : 12-07-2023 08:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that could cause remote code execution when an admin user on DCE tampers with backups which are then manually restored.

CVE ID : CVE-2023-37199
Source : cybersecurity@se.com
Score CVSS : 6.8

Références :
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-192-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-192-01.pdf | source : cybersecurity@se.com

Vulnérabilité : CWE-94


Vulnérabilité ID : CVE-2023-37200

Première publication le : 12-07-2023 08:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
A CWE-611: Improper Restriction of XML External Entity Reference vulnerability exists that could cause loss of confidentiality when replacing a project file on the local filesystem and after manual restart of the server.

CVE ID : CVE-2023-37200
Source : cybersecurity@se.com
Score CVSS : 5.5

Références :
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-192-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-192-02.pdf | source : cybersecurity@se.com

Vulnérabilité : CWE-611


Source : redhat.com

Vulnérabilité ID : CVE-2023-3106

Première publication le : 12-07-2023 09:15:14
Dernière modification le : 12-07-2023 12:46:11

Description :
A NULL pointer dereference vulnerability was found in netlink_dump. This issue can occur when the Netlink socket receives the message(sendmsg) for the XFRM_MSG_GETSA, XFRM_MSG_GETPOLICY type message, and the DUMP flag is set and can cause a denial of service or possibly another unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely.

CVE ID : CVE-2023-3106
Source : secalert@redhat.com
Score CVSS : 6.6

Références :
https://access.redhat.com/security/cve/CVE-2023-3106 | source : secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2221501 | source : secalert@redhat.com
https://github.com/torvalds/linux/commit/1ba5bf993c6a3142e18e68ea6452b347f9cb5635 | source : secalert@redhat.com


Source : wordfence.com

Vulnérabilité ID : CVE-2023-3011

Première publication le : 12-07-2023 05:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The ARMember plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.0.5. This is due to missing or incorrect nonce validation on the arm_check_user_cap function. This makes it possible for unauthenticated attackers to perform multiple unauthorized actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2023-3011
Source : security@wordfence.com
Score CVSS : 6.5

Références :
https://plugins.trac.wordpress.org/changeset/2932691/armember-membership/trunk/autoload.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/42f5f29b-2d83-4b15-82aa-0598f8a2317b?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4417

Première publication le : 12-07-2023 04:15:11
Dernière modification le : 12-07-2023 12:46:41

Description :
The Forminator – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.13.4. This is due to missing or incorrect nonce validation on the listen_for_saving_export_schedule() function. This makes it possible for unauthenticated attackers to export form submissions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4417
Source : security@wordfence.com
Score CVSS : 5.4

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2368977/forminator/trunk/library/class-export.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/cdee0cd8-b83b-4436-aebe-533f5af03ef1?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2023-2517

Première publication le : 12-07-2023 05:15:09
Dernière modification le : 12-07-2023 12:46:41

Description :
The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.3.2. This is due to missing or incorrect nonce validation on the permalink_setup function. This makes it possible for unauthenticated attackers to change the permalink structure via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. While nonce verification is implemented, verification only takes place when a nonce is provided.

CVE ID : CVE-2023-2517
Source : security@wordfence.com
Score CVSS : 5.4

Références :
https://plugins.trac.wordpress.org/browser/metform/trunk/plugin.php#L544 | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2907471/metform/trunk?contextall=1&old=2896914&old_path=%2Fmetform%2Ftrunk | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2924362%40metform%2Ftrunk&old=2910040%40metform%2Ftrunk&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/ca66afc3-a749-4ddc-8e2f-959f65cebd45?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2023-3369

Première publication le : 12-07-2023 05:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
The About Me 3000 widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 2.2.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

CVE ID : CVE-2023-3369
Source : security@wordfence.com
Score CVSS : 4.4

Références :
https://plugins.trac.wordpress.org/browser/about-me-3000/trunk/aboutme3000.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/be6f660f-041a-42f2-ab5b-72aedf75727d?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2020-36750

Première publication le : 12-07-2023 04:15:10
Dernière modification le : 12-07-2023 12:46:41

Description :
The EWWW Image Optimizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.8.1. This is due to missing or incorrect nonce validation on the ewww_ngg_bulk_init() function. This makes it possible for unauthenticated attackers to perform bulk image optimization via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2020-36750
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2417429/ewww-image-optimizer/trunk/classes/class-ewww-nextgen.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/8ef33e3c-187a-45d9-9dac-0895dce34216?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4407

Première publication le : 12-07-2023 04:15:10
Dernière modification le : 12-07-2023 12:46:41

Description :
The Custom Banners plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.2.2 This is due to missing or incorrect nonce validation on the saveCustomFields() function. This makes it possible for unauthenticated attackers to save custom fields via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4407
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2473385%40custom-banners&new=2473385%40custom-banners&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/8f4c086d-8209-4212-9d91-67238c1a9143?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4408

Première publication le : 12-07-2023 04:15:10
Dernière modification le : 12-07-2023 12:46:41

Description :
The DW Question & Answer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.8. This is due to missing or incorrect nonce validation on the update_answer() function. This makes it possible for unauthenticated attackers to update answers to questions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4408
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/browser/dw-question-answer/trunk/inc/Handle.php#L138 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/9852e499-f413-4218-9bac-6c2be62ecc32?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4409

Première publication le : 12-07-2023 04:15:10
Dernière modification le : 12-07-2023 12:46:41

Description :
The WooCommerce Etsy Integration plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.3.1. This is due to missing or incorrect nonce validation on the etcpf_delete_feed() function. This makes it possible for unauthenticated attackers to delete an export feed via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4409
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2573194 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/99489cc0-2e73-4d55-b95f-46d574897fac?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4410

Première publication le : 12-07-2023 04:15:10
Dernière modification le : 12-07-2023 12:46:41

Description :
The Qtranslate Slug plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.18. This is due to missing or incorrect nonce validation on the save_postdata() function. This makes it possible for unauthenticated attackers to save post data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4410
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/browser/qtranslate-slug/trunk/includes/class-qtranslate-slug.php#L2099 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/9d682596-c32d-4abd-ba39-b57fc45c9ce0?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4411

Première publication le : 12-07-2023 04:15:10
Dernière modification le : 12-07-2023 12:46:41

Description :
The WP EasyPay – Square for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.2.0. This is due to missing or incorrect nonce validation on the wpep_download_transaction_in_excel() function. This makes it possible for unauthenticated attackers to trigger a transactions download via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4411
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/browser/wp-easy-pay/trunk/wpep_setup.php?rev=2426641#L219 | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2551919%40wp-easy-pay&new=2551919%40wp-easy-pay&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/a1fbb3a6-fcc2-47c5-a086-331e69292add?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4412

Première publication le : 12-07-2023 04:15:10
Dernière modification le : 12-07-2023 12:46:41

Description :
The WP Prayer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.5. This is due to missing or incorrect nonce validation on the save() and export() functions. This makes it possible for unauthenticated attackers to save plugin settings and trigger a data export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4412
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2543740%40wp-prayer&new=2543740%40wp-prayer&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/a7efbdb1-989f-4171-ab55-aff66014337a?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4413

Première publication le : 12-07-2023 04:15:11
Dernière modification le : 12-07-2023 12:46:41

Description :
The Process Steps Template Designer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.1. This is due to missing or incorrect nonce validation on the save() function. This makes it possible for unauthenticated attackers to save field icons via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4413
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2473649%40process-steps-template-designer&new=2473649%40process-steps-template-designer&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/a98f6a68-5863-4147-86c4-8c19af469be3?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4414

Première publication le : 12-07-2023 04:15:11
Dernière modification le : 12-07-2023 12:46:41

Description :
The Abandoned Cart Lite for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.8.5. This is due to missing or incorrect nonce validation on the wcal_preview_emails() function. This makes it possible for unauthenticated attackers to generate email preview templates via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4414
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2473720/woocommerce-abandoned-cart/trunk/woocommerce-ac.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/ab5d87d2-f3cb-4926-9cbf-acdbe9169f64?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4415

Première publication le : 12-07-2023 04:15:11
Dernière modification le : 12-07-2023 12:46:41

Description :
The Sunshine Photo Cart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.8.28 This is due to missing or incorrect nonce validation on the sunshine_products_quicksave_post() function. This makes it possible for unauthenticated attackers to save custom post data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4415
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2548557/sunshine-photo-cart/tags/2.8.29/admin/sunshine-products.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/c043510b-6aeb-4e91-80f0-a62970c01b1d?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4416

Première publication le : 12-07-2023 04:15:11
Dernière modification le : 12-07-2023 12:46:41

Description :
The wp-mpdf plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.5.1. This is due to missing or incorrect nonce validation on the mpdf_admin_savepost() function. This makes it possible for unauthenticated attackers to save post data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4416
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2549363/wp-mpdf/trunk/wp-mpdf.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/c47386ee-25c8-4a77-92e8-5a82afc9c826?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2020-36752

Première publication le : 12-07-2023 05:15:08
Dernière modification le : 12-07-2023 12:46:41

Description :
The Coming Soon & Maintenance Mode Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.57. This is due to missing or incorrect nonce validation on the save_meta_box() function. This makes it possible for unauthenticated attackers to save meta boxes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2020-36752
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2368978%40nifty-coming-soon-and-under-construction-page&new=2368978%40nifty-coming-soon-and-under-construction-page&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/d283527a-a955-4f82-9827-81a71158d8e2?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2023-2561

Première publication le : 12-07-2023 05:15:09
Dernière modification le : 12-07-2023 12:46:41

Description :
The Gallery Metabox for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the gallery_remove function in versions up to, and including, 1.5. This makes it possible for subscriber-level attackers to modify galleries attached to posts and pages with this plugin.

CVE ID : CVE-2023-2561
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://plugins.trac.wordpress.org/browser/gallery-metabox/trunk/gallery-metabox.php?rev=611664#L233 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/faad339f-96d6-4937-a1f3-9d2d19bc6395?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-862


Vulnérabilité ID : CVE-2023-2562

Première publication le : 12-07-2023 05:15:09
Dernière modification le : 12-07-2023 12:46:41

Description :
The Gallery Metabox for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the refresh_metabox function in versions up to, and including, 1.5. This makes it possible for subscriber-level attackers to obtain a list of images attached to a post.

CVE ID : CVE-2023-2562
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://plugins.trac.wordpress.org/browser/gallery-metabox/trunk/gallery-metabox.php?rev=611664#L203 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/951e4651-56d6-474d-84b3-5a7cfc357b9f?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-862


Vulnérabilité ID : CVE-2023-2869

Première publication le : 12-07-2023 05:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The WP-Members Membership plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the do_field_reorder function in versions up to, and including, 3.4.7.3. This makes it possible for authenticated attackers with subscriber-level access to reorder form elements on login forms.

CVE ID : CVE-2023-2869
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://plugins.trac.wordpress.org/browser/wp-members/trunk/includes/admin/tabs/class-wp-members-admin-tab-fields.php?rev=2895180#L799 | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2920897/wp-members/trunk/includes/admin/tabs/class-wp-members-admin-tab-fields.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/bf05a79a-0375-4c9d-bbf0-a87484327b87?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-862


Vulnérabilité ID : CVE-2023-3199

Première publication le : 12-07-2023 05:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_status_order_title function. This makes it possible for unauthenticated attackers to update status order title via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2023-3199
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://plugins.trac.wordpress.org/browser/mstore-api/trunk/mstore-api.php#L256 | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2925048%40mstore-api&new=2925048%40mstore-api&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/a604df5d-92b3-4df8-a7ef-00f0ee95cf0f?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2023-3202

Première publication le : 12-07-2023 05:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_firebase_server_key function. This makes it possible for unauthenticated attackers to update the firebase server key to push notification when order status changed via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2023-3202
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://plugins.trac.wordpress.org/browser/mstore-api/trunk/mstore-api.php#L232 | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2925048%40mstore-api&new=2925048%40mstore-api&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/d2b3612e-3c91-469b-98ef-fdb03b0ee9d9?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2020-36756

Première publication le : 12-07-2023 07:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The 10WebAnalytics plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.8. This is due to missing or incorrect nonce validation on the create_csv_file() function. This makes it possible for unauthenticated attackers to create a CSV file via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2020-36756
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2371142%40wd-google-analytics&new=2371142%40wd-google-analytics&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/db29f17d-1d2b-4f78-a78d-1579e2a5d975?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2020-36757

Première publication le : 12-07-2023 07:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The WP Hotel Booking plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.10.1. This is due to missing or incorrect nonce validation on the admin_add_order_item() function. This makes it possible for unauthenticated attackers to add an order item via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2020-36757
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2368289%40wp-hotel-booking&new=2368289%40wp-hotel-booking&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/dd9826d7-f8f5-4d3d-8145-3d4e6a63d784?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4419

Première publication le : 12-07-2023 07:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The WP-Backgrounds Lite plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.3. This is due to missing or incorrect nonce validation on the ino_save_data() function. This makes it possible for unauthenticated attackers to save meta data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4419
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/browser/wp-backgrounds-lite/trunk/inoplugs_background_plugin.php#L179 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/d7a05894-8f9d-442f-961c-2e80aa25c3db?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4420

Première publication le : 12-07-2023 07:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The Sell Media plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.5.5. This is due to missing or incorrect nonce validation on the sell_media_process() function. This makes it possible for unauthenticated attackers to sell media paypal orders via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4420
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2603629%40sell-media&new=2603629%40sell-media&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/da4592b6-5e84-4a89-9ade-6cc227740d32?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4421

Première publication le : 12-07-2023 07:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The Advanced Popups plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.1. This is due to missing or incorrect nonce validation on the metabox_popup_save() function. This makes it possible for unauthenticated attackers to save meta tags via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4421
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2548724%40advanced-popups&new=2548724%40advanced-popups&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/dc7b51e5-6eb7-41ba-add3-f083fb34c5e1?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4422

Première publication le : 12-07-2023 07:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The POST SMTP Mailer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.20. This is due to missing or incorrect nonce validation on the handleCsvExport() function. This makes it possible for unauthenticated attackers to trigger a CSV export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4422
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2473579%40post-smtp&new=2473579%40post-smtp&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/e018ca7c-06dd-4d40-91d4-4ed188b8aaf2?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4423

Première publication le : 12-07-2023 07:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
The RAYS Grid plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.2. This is due to missing or incorrect nonce validation on the rsgd_insert_update() function. This makes it possible for unauthenticated attackers to update post fields via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4423
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2572600/rays-grid/trunk/includes/class-db.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/e5911815-db53-46f2-a16d-ed21be20bbfb?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4424

Première publication le : 12-07-2023 07:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
The Slider Hero plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 8.2.0. This is due to missing or incorrect nonce validation on the qc_slider_hero_duplicate() function. This makes it possible for unauthenticated attackers to duplicate slides via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4424
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2548890/slider-hero/trunk/qcld-slider-main.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d195cd-4df8-4926-b834-d695fc05f81d?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2020-36760

Première publication le : 12-07-2023 08:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The Ocean Extra plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.5]. This is due to missing or incorrect nonce validation on the add_core_extensions_bundle_validation() function. This makes it possible for unauthenticated attackers to validate extension bundles via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2020-36760
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2391055%40ocean-extra&new=2391055%40ocean-extra&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/eb3ef121-13ea-4e42-90c1-1f4bd31ebbcf?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2020-36761

Première publication le : 12-07-2023 08:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The Top 10 plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.10.4. This is due to missing or incorrect nonce validation on the tptn_export_tables() function. This makes it possible for unauthenticated attackers to generate an export of the top 10 table via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2020-36761
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2368373%40top-10&new=2368373%40top-10&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/f0af86e4-c30b-49e2-ad6a-97a415a74d18?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4425

Première publication le : 12-07-2023 08:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The Defender Security plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.4.6. This is due to missing or incorrect nonce validation on the verify_otp_login_time() function. This makes it possible for unauthenticated attackers to verify a one time login via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4425
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2473684%40defender-security&new=2473684%40defender-security&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/e772fbbe-33d5-46fa-a041-ab07d3f9318f?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4426

Première publication le : 12-07-2023 08:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The Absolute Reviews plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.8. This is due to missing or incorrect nonce validation on the metabox_review_save() function. This makes it possible for unauthenticated attackers to save meta tags via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4426
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2548729%40absolute-reviews&new=2548729%40absolute-reviews&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/ec1ee47d-020c-482d-ad6f-663d78e624b8?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2021-4427

Première publication le : 12-07-2023 08:15:09
Dernière modification le : 12-07-2023 12:46:30

Description :
The Vuukle Comments, Reactions, Share Bar, Revenue plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.4.31. This is due to missing or incorrect nonce validation in the /admin/partials/free-comments-for-wordpress-vuukle-admin-display.php file. This makes it possible for unauthenticated attackers to edit the plugins settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2021-4427
Source : security@wordfence.com
Score CVSS : 4.3

Références :
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ | source : security@wordfence.com
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2553337%40free-comments-for-wordpress-vuukle&new=2553337%40free-comments-for-wordpress-vuukle&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/ff28f33f-85d1-4987-975b-ee3bbcb394f4?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Source : jetbrains.com

Vulnérabilité ID : CVE-2023-38068

Première publication le : 12-07-2023 13:15:09
Dernière modification le : 12-07-2023 13:56:22

Description :
In JetBrains YouTrack before 2023.1.16597 captcha was not properly validated for Helpdesk forms

CVE ID : CVE-2023-38068
Source : security@jetbrains.com
Score CVSS : 6.5

Références :
https://www.jetbrains.com/privacy-security/issues-fixed/ | source : security@jetbrains.com

Vulnérabilité : CWE-799


Vulnérabilité ID : CVE-2023-38061

Première publication le : 12-07-2023 13:15:09
Dernière modification le : 12-07-2023 13:56:22

Description :
In JetBrains TeamCity before 2023.05.1 stored XSS when using a custom theme was possible

CVE ID : CVE-2023-38061
Source : security@jetbrains.com
Score CVSS : 4.6

Références :
https://www.jetbrains.com/privacy-security/issues-fixed/ | source : security@jetbrains.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-38063

Première publication le : 12-07-2023 13:15:09
Dernière modification le : 12-07-2023 13:56:22

Description :
In JetBrains TeamCity before 2023.05.1 stored XSS while running custom builds was possible

CVE ID : CVE-2023-38063
Source : security@jetbrains.com
Score CVSS : 4.6

Références :
https://www.jetbrains.com/privacy-security/issues-fixed/ | source : security@jetbrains.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-38065

Première publication le : 12-07-2023 13:15:09
Dernière modification le : 12-07-2023 13:56:22

Description :
In JetBrains TeamCity before 2023.05.1 stored XSS while viewing the build log was possible

CVE ID : CVE-2023-38065
Source : security@jetbrains.com
Score CVSS : 4.6

Références :
https://www.jetbrains.com/privacy-security/issues-fixed/ | source : security@jetbrains.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-38066

Première publication le : 12-07-2023 13:15:09
Dernière modification le : 12-07-2023 13:56:22

Description :
In JetBrains TeamCity before 2023.05.1 reflected XSS via the Referer header was possible during artifact downloads

CVE ID : CVE-2023-38066
Source : security@jetbrains.com
Score CVSS : 4.6

Références :
https://www.jetbrains.com/privacy-security/issues-fixed/ | source : security@jetbrains.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-38062

Première publication le : 12-07-2023 13:15:09
Dernière modification le : 12-07-2023 13:56:22

Description :
In JetBrains TeamCity before 2023.05.1 parameters of the "password" type could be shown in the UI in certain composite build configurations

CVE ID : CVE-2023-38062
Source : security@jetbrains.com
Score CVSS : 4.3

Références :
https://www.jetbrains.com/privacy-security/issues-fixed/ | source : security@jetbrains.com

Vulnérabilité : CWE-200


Vulnérabilité ID : CVE-2023-38064

Première publication le : 12-07-2023 13:15:09
Dernière modification le : 12-07-2023 13:56:22

Description :
In JetBrains TeamCity before 2023.05.1 build chain parameters of the "password" type could be written to the agent log

CVE ID : CVE-2023-38064
Source : security@jetbrains.com
Score CVSS : 4.3

Références :
https://www.jetbrains.com/privacy-security/issues-fixed/ | source : security@jetbrains.com

Vulnérabilité : CWE-532


Vulnérabilité ID : CVE-2023-38067

Première publication le : 12-07-2023 13:15:09
Dernière modification le : 12-07-2023 13:56:22

Description :
In JetBrains TeamCity before 2023.05.1 build parameters of the "password" type could be written to the agent log

CVE ID : CVE-2023-38067
Source : security@jetbrains.com
Score CVSS : 4.3

Références :
https://www.jetbrains.com/privacy-security/issues-fixed/ | source : security@jetbrains.com

Vulnérabilité : CWE-532


Source : cisco.com

Vulnérabilité ID : CVE-2023-20210

Première publication le : 12-07-2023 14:15:09
Dernière modification le : 12-07-2023 14:15:09

Description :
A vulnerability in Cisco BroadWorks could allow an authenticated, local attacker to elevate privileges to the root user on an affected device. The vulnerability is due to insufficient input validation by the operating system CLI. An attacker could exploit this vulnerability by issuing a crafted command to the affected system. A successful exploit could allow the attacker to execute commands as the root user. To exploit this vulnerability, an attacker must have valid BroadWorks administrative privileges on the affected device.

CVE ID : CVE-2023-20210
Source : ykramarz@cisco.com
Score CVSS : 6.0

Références :
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-privesc-yw4ekrXW | source : ykramarz@cisco.com


Vulnérabilité ID : CVE-2023-20207

Première publication le : 12-07-2023 14:15:09
Dernière modification le : 12-07-2023 14:15:09

Description :
A vulnerability in the logging component of Cisco Duo Authentication Proxy could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system. This vulnerability exists because certain unencrypted credentials are stored. An attacker could exploit this vulnerability by accessing the logs on an affected system and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to view sensitive information in clear text.

CVE ID : CVE-2023-20207
Source : ykramarz@cisco.com
Score CVSS : 4.9

Références :
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-auth-info-JgkSWBLz | source : ykramarz@cisco.com


(6) Vulnérabilité(s) LOW [0.1, 3.9]

Source : adobe.com

Vulnérabilité ID : CVE-2021-43758

Première publication le : 12-07-2023 12:15:09
Dernière modification le : 12-07-2023 12:46:11

Description :
Adobe Media Encoder versions 22.0, 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious MP4 file.

CVE ID : CVE-2021-43758
Source : psirt@adobe.com
Score CVSS : 3.3

Références :
https://helpx.adobe.com/security/products/media-encoder/apsb21-118.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Vulnérabilité ID : CVE-2021-43759

Première publication le : 12-07-2023 12:15:09
Dernière modification le : 12-07-2023 12:46:11

Description :
Adobe Media Encoder versions 22.0, 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious MP4 file.

CVE ID : CVE-2021-43759
Source : psirt@adobe.com
Score CVSS : 3.3

Références :
https://helpx.adobe.com/security/products/media-encoder/apsb21-118.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Vulnérabilité ID : CVE-2021-43760

Première publication le : 12-07-2023 12:15:09
Dernière modification le : 12-07-2023 12:46:11

Description :
Adobe Media Encoder versions 22.0, 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious MOV file.

CVE ID : CVE-2021-43760
Source : psirt@adobe.com
Score CVSS : 3.3

Références :
https://helpx.adobe.com/security/products/media-encoder/apsb21-118.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Vulnérabilité ID : CVE-2021-44696

Première publication le : 12-07-2023 12:15:09
Dernière modification le : 12-07-2023 12:46:11

Description :
Adobe Prelude version 22.1.1 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious JPEG file.

CVE ID : CVE-2021-44696
Source : psirt@adobe.com
Score CVSS : 3.3

Références :
https://helpx.adobe.com/security/products/prelude/apsb21-114.html | source : psirt@adobe.com

Vulnérabilité : CWE-125


Source : jetbrains.com

Vulnérabilité ID : CVE-2023-38069

Première publication le : 12-07-2023 13:15:09
Dernière modification le : 12-07-2023 13:56:22

Description :
In JetBrains IntelliJ IDEA before 2023.1.4 license dialog could be suppressed in certain cases

CVE ID : CVE-2023-38069
Source : security@jetbrains.com
Score CVSS : 3.3

Références :
https://www.jetbrains.com/privacy-security/issues-fixed/ | source : security@jetbrains.com

Vulnérabilité : CWE-754


(72) Vulnérabilité(s) NO SCORE [0.0, 0.0]

Source : apache.org

Vulnérabilité ID : CVE-2023-31007

Première publication le : 12-07-2023 10:15:10
Dernière modification le : 12-07-2023 12:46:11

Description :
Improper Authentication vulnerability in Apache Software Foundation Apache Pulsar Broker allows a client to stay connected to a broker after authentication data expires if the client connected through the Pulsar Proxy when the broker is configured with authenticateOriginalAuthData=false or if a client connects directly to a broker with a specially crafted connect command when the broker is configured with authenticateOriginalAuthData=false. This issue affects Apache Pulsar: through 2.9.4, from 2.10.0 through 2.10.3, 2.11.0. 2.9 Pulsar Broker users should upgrade to at least 2.9.5. 2.10 Pulsar Broker users should upgrade to at least 2.10.4. 2.11 Pulsar Broker users should upgrade to at least 2.11.1. 3.0 Pulsar Broker users are unaffected. Any users running the Pulsar Broker for 2.8.* and earlier should upgrade to one of the above patched versions.

CVE ID : CVE-2023-31007
Source : security@apache.org
Score CVSS : 0.0

Références :
https://lists.apache.org/thread/qxn99xxyp0zv6jchjggn3soyo5gvqfxj | source : security@apache.org

Vulnérabilité : CWE-287


Vulnérabilité ID : CVE-2023-32200

Première publication le : 12-07-2023 08:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
There is insufficient restrictions of called script functions in Apache Jena versions 4.8.0 and earlier. It allows a remote user to execute javascript via a SPARQL query. This issue affects Apache Jena: from 3.7.0 through 4.8.0.

CVE ID : CVE-2023-32200
Source : security@apache.org
Score CVSS : /

Références :
https://lists.apache.org/thread/7hg0t2kws3fyr75dl7lll8389xzzc46z | source : security@apache.org
https://www.cve.org/CVERecord?id=CVE-2023-22665 | source : security@apache.org

Vulnérabilité : CWE-917


Vulnérabilité ID : CVE-2022-46651

Première publication le : 12-07-2023 10:15:09
Dernière modification le : 12-07-2023 12:46:11

Description :
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an unauthorized actor to gain access to sensitive information in Connection edit view. This vulnerability is considered low since it requires someone with access to Connection resources specifically updating the connection to exploit it. Users should upgrade to version 2.6.3 or later which has removed the vulnerability.

CVE ID : CVE-2022-46651
Source : security@apache.org
Score CVSS : /

Références :
https://github.com/apache/airflow/pull/32309 | source : security@apache.org
https://lists.apache.org/thread/n45h3y82og125rnlgt6rbm9szfb6q24d | source : security@apache.org

Vulnérabilité : CWE-200


Vulnérabilité ID : CVE-2023-22887

Première publication le : 12-07-2023 10:15:09
Dernière modification le : 12-07-2023 12:46:11

Description :
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to perform unauthorized file access outside the intended directory structure by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected

CVE ID : CVE-2023-22887
Source : security@apache.org
Score CVSS : /

Références :
https://github.com/apache/airflow/pull/32293 | source : security@apache.org
https://lists.apache.org/thread/rxddqs76r6rkxsg1n24d029zys67qwwo | source : security@apache.org

Vulnérabilité : CWE-22


Vulnérabilité ID : CVE-2023-22888

Première publication le : 12-07-2023 10:15:09
Dernière modification le : 12-07-2023 12:46:11

Description :
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to cause a service disruption by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected

CVE ID : CVE-2023-22888
Source : security@apache.org
Score CVSS : /

Références :
https://github.com/apache/airflow/pull/32293 | source : security@apache.org
https://lists.apache.org/thread/dnlht2hvm7k81k5tgjtsfmk27c76kq7z | source : security@apache.org

Vulnérabilité : CWE-20


Vulnérabilité ID : CVE-2023-35908

Première publication le : 12-07-2023 10:15:10
Dernière modification le : 12-07-2023 12:46:11

Description :
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows unauthorized read access to a DAG through the URL. It is recommended to upgrade to a version that is not affected

CVE ID : CVE-2023-35908
Source : security@apache.org
Score CVSS : /

Références :
https://github.com/apache/airflow/pull/32014 | source : security@apache.org
https://lists.apache.org/thread/vsflptk5dt30vrfggn96nx87d7zr6yvw | source : security@apache.org

Vulnérabilité : CWE-863


Vulnérabilité ID : CVE-2023-36543

Première publication le : 12-07-2023 10:15:10
Dernière modification le : 12-07-2023 12:46:11

Description :
Apache Airflow, versions before 2.6.3, has a vulnerability where an authenticated user can use crafted input to make the current request hang. It is recommended to upgrade to a version that is not affected

CVE ID : CVE-2023-36543
Source : security@apache.org
Score CVSS : /

Références :
https://github.com/apache/airflow/pull/32060 | source : security@apache.org
https://lists.apache.org/thread/tokfs980504ylgk3cv3hjlnrtbv4tng4 | source : security@apache.org

Vulnérabilité : CWE-20


Vulnérabilité ID : CVE-2023-37582

Première publication le : 12-07-2023 10:15:11
Dernière modification le : 12-07-2023 12:46:11

Description :
The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1. When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as. It is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks.

CVE ID : CVE-2023-37582
Source : security@apache.org
Score CVSS : /

Références :
http://www.openwall.com/lists/oss-security/2023/07/12/1 | source : security@apache.org
https://lists.apache.org/thread/m614czxtpvlztd7mfgcs2xcsg36rdbnc | source : security@apache.org

Vulnérabilité : CWE-94


Source : mitre.org

Vulnérabilité ID : CVE-2023-30226

Première publication le : 12-07-2023 02:15:09
Dernière modification le : 12-07-2023 12:46:41

Description :
An issue was discovered in function get_gnu_verneed in rizinorg Rizin prior to 0.5.0 verneed_entry allows attackers to cause a denial of service via crafted elf file.

CVE ID : CVE-2023-30226
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/ifyGecko/CVE-2023-30226 | source : cve@mitre.org
https://github.com/rizinorg/rizin/commit/a6d89de0d44e776f9bccc3a168fdc79f604e14ed | source : cve@mitre.org


Vulnérabilité ID : CVE-2020-20021

Première publication le : 12-07-2023 13:15:09
Dernière modification le : 12-07-2023 13:56:22

Description :
An issue discovered in MikroTik Router v6.46.3 and earlier allows attacker to cause denial of service via misconfiguration in the SSH daemon.

CVE ID : CVE-2020-20021
Source : cve@mitre.org
Score CVSS : /

Références :
http://mikrotik.com | source : cve@mitre.org
http://router.com | source : cve@mitre.org
https://www.exploit-db.com/exploits/48228 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-33668

Première publication le : 12-07-2023 13:15:09
Dernière modification le : 12-07-2023 13:56:22

Description :
DigiExam up to v14.0.2 lacks integrity checks for native modules, allowing attackers to access PII and takeover accounts on shared computers.

CVE ID : CVE-2023-33668
Source : cve@mitre.org
Score CVSS : /

Références :
http://digiexam.com | source : cve@mitre.org
https://github.com/lodi-g/CVE-2023-33668 | source : cve@mitre.org


Source : unisoc.com

Vulnérabilité ID : CVE-2022-48450

Première publication le : 12-07-2023 09:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
In bluetooth service, there is a possible missing params check. This could lead to local denial of service with System execution privileges needed.

CVE ID : CVE-2022-48450
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2022-48451

Première publication le : 12-07-2023 09:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
In bluetooth service, there is a possible out of bounds write due to race condition. This could lead to local denial of service with System execution privileges needed.

CVE ID : CVE-2022-48451
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30913

Première publication le : 12-07-2023 09:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30913
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30916

Première publication le : 12-07-2023 09:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
In DMService, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.

CVE ID : CVE-2023-30916
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30917

Première publication le : 12-07-2023 09:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
In DMService, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.

CVE ID : CVE-2023-30917
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30918

Première publication le : 12-07-2023 09:15:10
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30918
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30919

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In messaging service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30919
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30920

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In messaging service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30920
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30921

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In messaging service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30921
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30922

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In messaging service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30922
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30923

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In messaging service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30923
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30924

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In messaging service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30924
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30925

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In opm service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30925
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30926

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In opm service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30926
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30927

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30927
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30928

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.

CVE ID : CVE-2023-30928
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30929

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.

CVE ID : CVE-2023-30929
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30930

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30930
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30931

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30931
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30932

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30932
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30933

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30933
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30934

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30934
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30935

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30935
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30936

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30936
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30937

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30937
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30938

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30938
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30939

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30939
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30940

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30940
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30941

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30941
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-30942

Première publication le : 12-07-2023 09:15:11
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-30942
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-32788

Première publication le : 12-07-2023 09:15:12
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-32788
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-32789

Première publication le : 12-07-2023 09:15:12
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-32789
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33879

Première publication le : 12-07-2023 09:15:12
Dernière modification le : 12-07-2023 12:46:30

Description :
In music service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33879
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33880

Première publication le : 12-07-2023 09:15:12
Dernière modification le : 12-07-2023 12:46:30

Description :
In music service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33880
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33881

Première publication le : 12-07-2023 09:15:12
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33881
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33882

Première publication le : 12-07-2023 09:15:12
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33882
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33883

Première publication le : 12-07-2023 09:15:12
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33883
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33884

Première publication le : 12-07-2023 09:15:12
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33884
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33885

Première publication le : 12-07-2023 09:15:12
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33885
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33886

Première publication le : 12-07-2023 09:15:12
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33886
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33887

Première publication le : 12-07-2023 09:15:12
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33887
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33888

Première publication le : 12-07-2023 09:15:12
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33888
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33889

Première publication le : 12-07-2023 09:15:13
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33889
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33890

Première publication le : 12-07-2023 09:15:13
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33890
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33891

Première publication le : 12-07-2023 09:15:13
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33891
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33892

Première publication le : 12-07-2023 09:15:13
Dernière modification le : 12-07-2023 12:46:30

Description :
In fastDial service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33892
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33893

Première publication le : 12-07-2023 09:15:13
Dernière modification le : 12-07-2023 12:46:30

Description :
In fastDial service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33893
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33894

Première publication le : 12-07-2023 09:15:13
Dernière modification le : 12-07-2023 12:46:30

Description :
In fastDial service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33894
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33895

Première publication le : 12-07-2023 09:15:13
Dernière modification le : 12-07-2023 12:46:30

Description :
In fastDial service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33895
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33896

Première publication le : 12-07-2023 09:15:13
Dernière modification le : 12-07-2023 12:46:30

Description :
In libimpl-ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.

CVE ID : CVE-2023-33896
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33897

Première publication le : 12-07-2023 09:15:13
Dernière modification le : 12-07-2023 12:46:30

Description :
In libimpl-ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.

CVE ID : CVE-2023-33897
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33898

Première publication le : 12-07-2023 09:15:13
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33898
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33899

Première publication le : 12-07-2023 09:15:13
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33899
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33900

Première publication le : 12-07-2023 09:15:13
Dernière modification le : 12-07-2023 12:46:30

Description :
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33900
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33901

Première publication le : 12-07-2023 09:15:13
Dernière modification le : 12-07-2023 12:46:30

Description :
In bluetooth service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33901
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33902

Première publication le : 12-07-2023 09:15:13
Dernière modification le : 12-07-2023 12:46:30

Description :
In bluetooth service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

CVE ID : CVE-2023-33902
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33903

Première publication le : 12-07-2023 09:15:13
Dernière modification le : 12-07-2023 12:46:30

Description :
In FM service, there is a possible missing params check. This could lead to local denial of service with System execution privileges needed.

CVE ID : CVE-2023-33903
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33904

Première publication le : 12-07-2023 09:15:14
Dernière modification le : 12-07-2023 12:46:11

Description :
In hci_server, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.

CVE ID : CVE-2023-33904
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Vulnérabilité ID : CVE-2023-33905

Première publication le : 12-07-2023 09:15:14
Dernière modification le : 12-07-2023 12:46:11

Description :
In iwnpi server, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.

CVE ID : CVE-2023-33905
Source : security@unisoc.com
Score CVSS : /

Références :
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | source : security@unisoc.com


Source : mozilla.org

Vulnérabilité ID : CVE-2023-37455

Première publication le : 12-07-2023 14:15:09
Dernière modification le : 12-07-2023 14:15:09

Description :
The permission request prompt from the site in the background tab was overlaid on top of the site in the foreground tab. This vulnerability affects Firefox for iOS < 115.

CVE ID : CVE-2023-37455
Source : security@mozilla.org
Score CVSS : /

Références :
https://bugzilla.mozilla.org/show_bug.cgi?id=1786934 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-25/ | source : security@mozilla.org


Vulnérabilité ID : CVE-2023-37456

Première publication le : 12-07-2023 14:15:10
Dernière modification le : 12-07-2023 14:15:10

Description :
The session restore helper crashed whenever there was no parameter sent to the message handler. This vulnerability affects Firefox for iOS < 115.

CVE ID : CVE-2023-37456
Source : security@mozilla.org
Score CVSS : /

Références :
https://bugzilla.mozilla.org/show_bug.cgi?id=1795496 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-25/ | source : security@mozilla.org


Vulnérabilité ID : CVE-2023-3600

Première publication le : 12-07-2023 14:15:10
Dernière modification le : 12-07-2023 14:15:10

Description :
During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. This vulnerability affects Firefox < 115.0.2 and Firefox ESR < 115.0.2.

CVE ID : CVE-2023-3600
Source : security@mozilla.org
Score CVSS : /

Références :
https://bugzilla.mozilla.org/show_bug.cgi?id=1839703 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-26/ | source : security@mozilla.org


Ce site web utilise l'API de la NVD, mais n'est pas approuvé ou certifié par la NVD.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.