Dernières vulnérabilités du Vendredi 18 Août 2023

Dernières vulnérabilités du Vendredi 18 Août 2023
https://www.securitricks.com/content/images/size/w600/format/webp/2023/12/VULNERABILITIES-REPORTS-LOGO.png
{{titre}}

Dernière mise à jour efféctuée le 18/08/2023 à 23:58:02

(0) Vulnérabilité(s) CRITICAL [9.0, 10.0]

(10) Vulnérabilité(s) HIGH [7.0, 8.9]

Source : cisco.com

Vulnérabilité ID : CVE-2023-20212

Première publication le : 18-08-2023 20:15:09
Dernière modification le : 18-08-2023 20:15:09

Description :
A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition.

CVE ID : CVE-2023-20212
Source : ykramarz@cisco.com
Score CVSS : 7.5

Références :
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ | source : ykramarz@cisco.com


Source : vuldb.com

Vulnérabilité ID : CVE-2023-4415

Première publication le : 18-08-2023 16:15:11
Dernière modification le : 18-08-2023 16:39:17

Description :
A vulnerability was found in Ruijie RG-EW1200G 07161417 r483. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/sys/login. The manipulation leads to improper authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-237518 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-4415
Source : cna@vuldb.com
Score CVSS : 7.3

Références :
https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G-logic | source : cna@vuldb.com
https://vuldb.com/?ctiid.237518 | source : cna@vuldb.com
https://vuldb.com/?id.237518 | source : cna@vuldb.com

Vulnérabilité : CWE-287


Source : patchstack.com

Vulnérabilité ID : CVE-2023-31094

Première publication le : 18-08-2023 13:15:09
Dernière modification le : 18-08-2023 15:06:49

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Lauri Karisola / WP Trio Stock Sync for WooCommerce plugin <= 2.4.0 versions.

CVE ID : CVE-2023-31094
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/stock-sync-for-woocommerce/wordpress-stock-sync-for-woocommerce-plugin-2-4-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-31218

Première publication le : 18-08-2023 14:15:22
Dernière modification le : 18-08-2023 15:06:49

Description :
Cross-Site Request Forgery (CSRF) leading to Stored Cross-Site Scripting (XSS) vulnerability in realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional plugin <= 1.0.6 versions.

CVE ID : CVE-2023-31218
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/bulk-editor/wordpress-wolf-wordpress-posts-bulk-editor-and-manager-professional-plugin-1-0-6-cross-site-scripting-xss-via-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-352
Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32105

Première publication le : 18-08-2023 14:15:22
Dernière modification le : 18-08-2023 15:06:49

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ollybach WPPizza – A Restaurant Plugin plugin <= 3.17.1 versions.

CVE ID : CVE-2023-32105
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/wppizza/wordpress-wppizza-a-restaurant-plugin-plugin-3-17-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32106

Première publication le : 18-08-2023 14:15:22
Dernière modification le : 18-08-2023 15:06:49

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fahad Mahmood WP Docs plugin <= 1.9.9 versions.

CVE ID : CVE-2023-32106
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/wp-docs/wordpress-wp-docs-plugin-1-9-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32107

Première publication le : 18-08-2023 14:15:23
Dernière modification le : 18-08-2023 15:06:49

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Photo Gallery Team Photo Gallery by Ays – Responsive Image Gallery plugin <= 5.1.3 versions.

CVE ID : CVE-2023-32107
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/gallery-photo-gallery/wordpress-photo-gallery-by-ays-responsive-image-gallery-plugin-5-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-30499

Première publication le : 18-08-2023 15:15:09
Dernière modification le : 18-08-2023 16:39:17

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FolioVision FV Flowplayer Video Player plugin <= 7.5.32.7212 versions.

CVE ID : CVE-2023-30499
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/fv-wordpress-flowplayer/wordpress-fv-flowplayer-video-player-plugin-7-5-32-7212-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32108

Première publication le : 18-08-2023 15:15:10
Dernière modification le : 18-08-2023 16:39:17

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ignazio Scimone Albo Pretorio On line plugin <= 4.6.3 versions.

CVE ID : CVE-2023-32108
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/albo-pretorio-on-line/wordpress-albo-pretorio-on-line-plugin-4-6-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32109

Première publication le : 18-08-2023 15:15:10
Dernière modification le : 18-08-2023 16:39:17

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ignazio Scimone Albo Pretorio On line plugin <= 4.6.3 versions.

CVE ID : CVE-2023-32109
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/albo-pretorio-on-line/wordpress-albo-pretorio-on-line-plugin-4-6-3-reflected-cross-site-scripting-xss-vulnerability-2?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


(15) Vulnérabilité(s) MEDIUM [4.0, 6.9]

Source : huntr.dev

Vulnérabilité ID : CVE-2023-4422

Première publication le : 18-08-2023 19:15:13
Dernière modification le : 18-08-2023 20:11:33

Description :
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit prior to 2.6.3.

CVE ID : CVE-2023-4422
Source : security@huntr.dev
Score CVSS : 6.8

Références :
https://github.com/cockpit-hq/cockpit/commit/b8dad5e070608bb5e4ec58fabbee101b5af737cf | source : security@huntr.dev
https://huntr.dev/bounties/2e12b773-b6a2-48da-a4bb-55d5d1307d2e | source : security@huntr.dev

Vulnérabilité : CWE-79


Source : patchstack.com

Vulnérabilité ID : CVE-2023-32103

Première publication le : 18-08-2023 14:15:22
Dernière modification le : 18-08-2023 15:06:49

Description :
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Theme Palace TP Education plugin <= 4.4 versions.

CVE ID : CVE-2023-32103
Source : audit@patchstack.com
Score CVSS : 6.5

Références :
https://patchstack.com/database/vulnerability/tp-education/wordpress-tp-education-plugin-4-4-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-29387

Première publication le : 18-08-2023 15:15:09
Dernière modification le : 18-08-2023 16:39:17

Description :
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Julien Crego Manager for Icomoon plugin <= 2.0 versions.

CVE ID : CVE-2023-29387
Source : audit@patchstack.com
Score CVSS : 6.5

Références :
https://patchstack.com/database/vulnerability/manager-for-icomoon/wordpress-manager-for-icommon-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-30875

Première publication le : 18-08-2023 08:15:08
Dernière modification le : 18-08-2023 12:43:51

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in All My Web Needs Logo Scheduler plugin <= 1.2.0 versions.

CVE ID : CVE-2023-30875
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/logo-scheduler-great-for-holidays-events-and-more/wordpress-logo-scheduler-great-for-holidays-events-and-more-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-31228

Première publication le : 18-08-2023 13:15:09
Dernière modification le : 18-08-2023 15:06:49

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in CreativeMindsSolutions CM On Demand Search And Replace plugin <= 1.3.0 versions.

CVE ID : CVE-2023-31228
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/cm-on-demand-search-and-replace/wordpress-cm-on-demand-search-and-replace-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-31232

Première publication le : 18-08-2023 14:15:22
Dernière modification le : 18-08-2023 15:06:49

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in David Artiss Plugins List plugin <= 2.5 versions.

CVE ID : CVE-2023-31232
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/plugins-list/wordpress-plugins-list-plugin-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32130

Première publication le : 18-08-2023 16:15:10
Dernière modification le : 18-08-2023 16:39:17

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Daniel Powney Multi Rating plugin <= 5.0.6 versions.

CVE ID : CVE-2023-32130
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/multi-rating/wordpress-multi-rating-plugin-5-0-6-cross-site-scripting-xss?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32122

Première publication le : 18-08-2023 16:15:10
Dernière modification le : 18-08-2023 16:39:17

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Spiffy Plugins Spiffy Calendar plugin <= 4.9.3 versions.

CVE ID : CVE-2023-32122
Source : audit@patchstack.com
Score CVSS : 5.8

Références :
https://patchstack.com/database/vulnerability/spiffy-calendar/wordpress-spiffy-calendar-plugin-4-9-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Source : vuldb.com

Vulnérabilité ID : CVE-2023-4407

Première publication le : 18-08-2023 13:15:09
Dernière modification le : 18-08-2023 15:06:49

Description :
A vulnerability classified as critical was found in Codecanyon Credit Lite 1.5.4. Affected by this vulnerability is an unknown functionality of the file /portal/reports/account_statement of the component POST Request Handler. The manipulation of the argument date1/date2 leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-237511.

CVE ID : CVE-2023-4407
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://vuldb.com/?ctiid.237511 | source : cna@vuldb.com
https://vuldb.com/?id.237511 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4409

Première publication le : 18-08-2023 13:15:09
Dernière modification le : 18-08-2023 15:06:49

Description :
A vulnerability, which was classified as critical, has been found in NBS&HappySoftWeChat 1.1.6. Affected by this issue is some unknown functionality. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-237512.

CVE ID : CVE-2023-4409
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/ApricityXX/cve/blob/main/upload/upload.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.237512 | source : cna@vuldb.com
https://vuldb.com/?id.237512 | source : cna@vuldb.com

Vulnérabilité : CWE-434


Vulnérabilité ID : CVE-2023-4410

Première publication le : 18-08-2023 14:15:34
Dernière modification le : 18-08-2023 15:06:49

Description :
A vulnerability, which was classified as critical, was found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023. This affects the function setDiagnosisCfg. The manipulation leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-237513 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-4410
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8 | source : cna@vuldb.com
https://vuldb.com/?ctiid.237513 | source : cna@vuldb.com
https://vuldb.com/?id.237513 | source : cna@vuldb.com

Vulnérabilité : CWE-78


Vulnérabilité ID : CVE-2023-4411

Première publication le : 18-08-2023 14:15:35
Dernière modification le : 18-08-2023 15:06:49

Description :
A vulnerability has been found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023 and classified as critical. This vulnerability affects the function setTracerouteCfg. The manipulation leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-237514 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-4411
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8 | source : cna@vuldb.com
https://vuldb.com/?ctiid.237514 | source : cna@vuldb.com
https://vuldb.com/?id.237514 | source : cna@vuldb.com

Vulnérabilité : CWE-78


Vulnérabilité ID : CVE-2023-4412

Première publication le : 18-08-2023 15:15:10
Dernière modification le : 18-08-2023 16:39:17

Description :
A vulnerability was found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023 and classified as critical. This issue affects the function setWanCfg. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-237515. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-4412
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8 | source : cna@vuldb.com
https://vuldb.com/?ctiid.237515 | source : cna@vuldb.com
https://vuldb.com/?id.237515 | source : cna@vuldb.com

Vulnérabilité : CWE-78


Vulnérabilité ID : CVE-2023-4414

Première publication le : 18-08-2023 16:15:11
Dernière modification le : 18-08-2023 16:39:17

Description :
A vulnerability was found in Beijing Baichuo Smart S85F Management Platform up to 20230807. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /log/decodmail.php. The manipulation of the argument file leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-237517 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-4414
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/RCEraser/cve/blob/main/S85F.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.237517 | source : cna@vuldb.com
https://vuldb.com/?id.237517 | source : cna@vuldb.com

Vulnérabilité : CWE-77


Source : wordfence.com

Vulnérabilité ID : CVE-2023-4040

Première publication le : 18-08-2023 07:15:09
Dernière modification le : 18-08-2023 12:43:51

Description :
The Stripe Payment Plugin for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the eh_callback_handler function in versions up to, and including, 3.7.9. This makes it possible for unauthenticated attackers to modify the order status of arbitrary WooCommerce orders.

CVE ID : CVE-2023-4040
Source : security@wordfence.com
Score CVSS : 5.3

Références :
https://plugins.trac.wordpress.org/changeset/2954934/ | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/ef543c61-2acc-4b72-81ff-883960d4c7c3?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-862


(1) Vulnérabilité(s) LOW [0.1, 3.9]

Source : vuldb.com

Vulnérabilité ID : CVE-2023-4413

Première publication le : 18-08-2023 15:15:10
Dernière modification le : 18-08-2023 16:39:17

Description :
A vulnerability was found in rkhunter Rootkit Hunter 1.4.4/1.4.6. It has been classified as problematic. Affected is an unknown function of the file /var/log/rkhunter.log. The manipulation leads to sensitive information in log files. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-237516.

CVE ID : CVE-2023-4413
Source : cna@vuldb.com
Score CVSS : 2.5

Références :
https://gist.github.com/MatheuZSecurity/16ef0219db8f85f49f945a25d5eb42d7 | source : cna@vuldb.com
https://vuldb.com/?ctiid.237516 | source : cna@vuldb.com
https://vuldb.com/?id.237516 | source : cna@vuldb.com
https://youtu.be/etHt1TNAgs8 | source : cna@vuldb.com

Vulnérabilité : CWE-532


(28) Vulnérabilité(s) NO SCORE [0.0, 0.0]

Source : mitre.org

Vulnérabilité ID : CVE-2023-39125

Première publication le : 18-08-2023 00:15:10
Dernière modification le : 18-08-2023 12:43:51

Description :
NTSC-CRT 2.2.1 has an integer overflow and out-of-bounds write in loadBMP in bmp_rw.c because a file's width, height, and BPP are not validated. NOTE: the vendor's perspective is "this main application was not intended to be a well tested program, it's just something to demonstrate it works and for the user to see how to integrate it into their own programs."

CVE ID : CVE-2023-39125
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/LMP88959/NTSC-CRT/issues/32 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39665

Première publication le : 18-08-2023 03:15:21
Dernière modification le : 18-08-2023 12:43:51

Description :
** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the acStack_50 parameter.

CVE ID : CVE-2023-39665
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR-868L-bufferoverflow.md | source : cve@mitre.org
https://support.dlink.com/ | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39666

Première publication le : 18-08-2023 03:15:21
Dernière modification le : 18-08-2023 12:43:51

Description :
D-Link DIR-842 fw_revA_1-02_eu_multi_20151008 was discovered to contain multiple buffer overflows in the fgets function via the acStack_120 and acStack_220 parameters.

CVE ID : CVE-2023-39666
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR-842%20buffer%20overflow.md | source : cve@mitre.org
https://support.dlink.com/ | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39667

Première publication le : 18-08-2023 03:15:22
Dernière modification le : 18-08-2023 12:43:51

Description :
** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the param_2 parameter in the FUN_0000acb4 function.

CVE ID : CVE-2023-39667
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR-868L%20httpd-Improper%20Input%20Validation.md | source : cve@mitre.org
https://support.dlink.com/ | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39668

Première publication le : 18-08-2023 03:15:22
Dernière modification le : 18-08-2023 12:43:51

Description :
** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the param_2 parameter in the inet_ntoa() function.

CVE ID : CVE-2023-39668
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR-868L%20Buffer%20overflow%202.md | source : cve@mitre.org
https://support.dlink.com/ | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39669

Première publication le : 18-08-2023 03:15:22
Dernière modification le : 18-08-2023 12:43:51

Description :
D-Link DIR-880 A1_FW107WWb08 was discovered to contain a NULL pointer dereference in the function FUN_00010824.

CVE ID : CVE-2023-39669
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/880%20unchecked%20return%20value.md | source : cve@mitre.org
https://support.dlink.com/ | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39670

Première publication le : 18-08-2023 03:15:22
Dernière modification le : 18-08-2023 12:43:51

Description :
Tenda AC6 _US_AC6V1.0BR_V15.03.05.16 was discovered to contain a buffer overflow via the function fgets.

CVE ID : CVE-2023-39670
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/Tenda/AC6%20buffer%20overflow.md | source : cve@mitre.org
https://www.tendacn.com/download/list-3.html | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39671

Première publication le : 18-08-2023 03:15:23
Dernière modification le : 18-08-2023 12:43:51

Description :
D-Link DIR-880 A1_FW107WWb08 was discovered to contain a buffer overflow via the function FUN_0001be68.

CVE ID : CVE-2023-39671
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR880%20buffer%20overflow.md | source : cve@mitre.org
https://support.dlink.com/ | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39672

Première publication le : 18-08-2023 03:15:23
Dernière modification le : 18-08-2023 12:43:51

Description :
Tenda WH450 v1.0.0.18 was discovered to contain a buffer overflow via the function fgets.

CVE ID : CVE-2023-39672
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/Tenda/WH450%20buffer%20overflow.md | source : cve@mitre.org
https://www.tendacn.com/download/list-3.html | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39673

Première publication le : 18-08-2023 03:15:24
Dernière modification le : 18-08-2023 12:43:51

Description :
Tenda AC15 V1.0BR_V15.03.05.18_multi_TD01 was discovered to contain a buffer overflow via the function FUN_00010e34().

CVE ID : CVE-2023-39673
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/Tenda/AC15%20Impoper%20Input%20Validation.md | source : cve@mitre.org
https://www.tendacn.com/download/list-3.html | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39674

Première publication le : 18-08-2023 03:15:24
Dernière modification le : 18-08-2023 12:43:51

Description :
D-Link DIR-880 A1_FW107WWb08 was discovered to contain a buffer overflow via the function fgets.

CVE ID : CVE-2023-39674
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR880%20buffe%20overflow.md | source : cve@mitre.org
https://support.dlink.com/ | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-27576

Première publication le : 18-08-2023 15:15:09
Dernière modification le : 18-08-2023 16:39:17

Description :
An issue was discovered in phpList 3.6.12. Due to an access error, it was possible to manipulate and edit data of the system's super admin, allowing one to perform an account takeover of the user with super-admin permission.

CVE ID : CVE-2023-27576
Source : cve@mitre.org
Score CVSS : /

Références :
https://cupc4k3.lol/cve-2023-27576-hacking-phplist-how-i-gained-super-admin-access-44c7c90d82da | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-27471

Première publication le : 18-08-2023 19:15:12
Dernière modification le : 18-08-2023 20:11:33

Description :
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. UEFI implementations do not correctly protect and validate information contained in the 'MeSetup' UEFI variable. On some systems, this variable can be overwritten using operating system APIs. Exploitation of this vulnerability could potentially lead to denial of service for the platform.

CVE ID : CVE-2023-27471
Source : cve@mitre.org
Score CVSS : /

Références :
https://www.insyde.com/security-pledge/SA-2023036 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-38890

Première publication le : 18-08-2023 19:15:12
Dernière modification le : 18-08-2023 20:11:33

Description :
Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username field, enabling SQL Injection attacks.

CVE ID : CVE-2023-38890
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/akshadjoshi/CVE-2023-38890 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-38910

Première publication le : 18-08-2023 19:15:13
Dernière modification le : 18-08-2023 20:11:33

Description :
CSZ CMS 1.3.0 is vulnerable to cross-site scripting (XSS), which allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered in the 'Carousel Wiget' section and choosing our carousel widget created above, in 'Photo URL' and 'YouTube URL' plugin.

CVE ID : CVE-2023-38910
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/desencrypt/CVE/tree/main/CVE-2023- | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-38911

Première publication le : 18-08-2023 19:15:13
Dernière modification le : 18-08-2023 20:11:33

Description :
A Cross-Site Scripting (XSS) vulnerability in CSZ CMS 1.3.0 allows attackers to execute arbitrary code via a crafted payload to the Gallery parameter in the YouTube URL fields.

CVE ID : CVE-2023-38911
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/desencrypt/CVE/blob/main/CVE-2023-1/Readme.md | source : cve@mitre.org
https://github.com/desencrypt/CVE/tree/main/CVE-2023-1 | source : cve@mitre.org


Source : jpcert.or.jp

Vulnérabilité ID : CVE-2023-32626

Première publication le : 18-08-2023 10:15:09
Dernière modification le : 18-08-2023 12:43:51

Description :
Hidden functionality vulnerability in LAN-W300N/RS all versions, and LAN-W300N/PR5 all versions allows an unauthenticated attacker to log in to the product's certain management console and execute arbitrary OS commands.

CVE ID : CVE-2023-32626
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-35991

Première publication le : 18-08-2023 10:15:10
Dernière modification le : 18-08-2023 12:43:51

Description :
Hidden functionality vulnerability in LOGITEC wireless LAN routers allows an unauthenticated attacker to log in to the product's certain management console and execute arbitrary OS commands. Affected products and versions are as follows: LAN-W300N/DR all versions, LAN-WH300N/DR all versions, LAN-W300N/P all versions, LAN-WH450N/GP all versions, LAN-WH300AN/DGP all versions, LAN-WH300N/DGP all versions, and LAN-WH300ANDGPE all versions.

CVE ID : CVE-2023-35991
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-38132

Première publication le : 18-08-2023 10:15:11
Dernière modification le : 18-08-2023 12:43:51

Description :
LAN-W451NGR all versions provided by LOGITEC CORPORATION contains an improper access control vulnerability, which allows an unauthenticated attacker to log in to telnet service.

CVE ID : CVE-2023-38132
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-38576

Première publication le : 18-08-2023 10:15:11
Dernière modification le : 18-08-2023 12:43:51

Description :
Hidden functionality vulnerability in LAN-WH300N/RE all versions provided by LOGITEC CORPORATION allows an authenticated user to execute arbitrary OS commands on a certain management console.

CVE ID : CVE-2023-38576
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-39415

Première publication le : 18-08-2023 10:15:11
Dernière modification le : 18-08-2023 12:43:51

Description :
Improper authentication vulnerability in Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote unauthenticated attacker to log in to the product's Control Panel and perform an unintended operation.

CVE ID : CVE-2023-39415
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/jp/JVN19661362/ | source : vultures@jpcert.or.jp
https://www.proself.jp/information/149/ | source : vultures@jpcert.or.jp
https://www.proself.jp/information/150/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-39416

Première publication le : 18-08-2023 10:15:11
Dernière modification le : 18-08-2023 12:43:51

Description :
Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote authenticated attacker with an administrative privilege to execute arbitrary OS commands.

CVE ID : CVE-2023-39416
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/jp/JVN19661362/ | source : vultures@jpcert.or.jp
https://www.proself.jp/information/149/ | source : vultures@jpcert.or.jp
https://www.proself.jp/information/150/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-39445

Première publication le : 18-08-2023 10:15:12
Dernière modification le : 18-08-2023 12:43:51

Description :
Hidden functionality vulnerability in LAN-WH300N/RE all versions provided by LOGITEC CORPORATION allows an unauthenticated attacker to execute arbitrary code by sending a specially crafted file to the product's certain management console.

CVE ID : CVE-2023-39445
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-39454

Première publication le : 18-08-2023 10:15:12
Dernière modification le : 18-08-2023 12:43:51

Description :
Buffer overflow vulnerability in WRC-X1800GS-B v1.13 and earlier, WRC-X1800GSA-B v1.13 and earlier, and WRC-X1800GSH-B v1.13 and earlier allows an unauthenticated attacker to execute arbitrary code.

CVE ID : CVE-2023-39454
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230711-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-39455

Première publication le : 18-08-2023 10:15:12
Dernière modification le : 18-08-2023 12:43:51

Description :
OS command injection vulnerability in ELECOM wireless LAN routers allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WRC-600GHBK-A all versions, WRC-1467GHBK-A all versions, WRC-1900GHBK-A all versions, WRC-733FEBK2-A all versions, WRC-F1167ACF2 all versions, WRC-1467GHBK-S all versions, and WRC-1900GHBK-S all versions.

CVE ID : CVE-2023-39455
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-39944

Première publication le : 18-08-2023 10:15:12
Dernière modification le : 18-08-2023 12:43:51

Description :
OS command injection vulnerability in WRC-F1167ACF all versions, and WRC-1750GHBK all versions allows an attacker who can access the product to execute an arbitrary OS command by sending a specially crafted request.

CVE ID : CVE-2023-39944
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-40069

Première publication le : 18-08-2023 10:15:12
Dernière modification le : 18-08-2023 12:43:51

Description :
OS command injection vulnerability in ELECOM wireless LAN routers allows an attacker who can access the product to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WRC-F1167ACF all versions, WRC-1750GHBK all versions, WRC-1167GHBK2 all versions, WRC-1750GHBK2-I all versions, and WRC-1750GHBK-E all versions.

CVE ID : CVE-2023-40069
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-40072

Première publication le : 18-08-2023 10:15:12
Dernière modification le : 18-08-2023 12:43:51

Description :
OS command injection vulnerability in WAB-S600-PS all versions, and WAB-S300 all versions allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request.

CVE ID : CVE-2023-40072
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Ce site web utilise l'API de la NVD, mais n'est pas approuvé ou certifié par la NVD.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.