Latest vulnerabilities [Friday, February 02, 2024]

Latest vulnerabilities [Friday, February 02, 2024]
{{titre}}

Last update performed on 02/02/2024 at 11:57:05 PM

(7) CRITICAL VULNERABILITIES [9.0, 10.0]

Source : us.ibm.com

Vulnerability ID : CVE-2023-47143

First published on : 02-02-2024 13:15:08
Last modified on : 02-02-2024 13:36:23

Description :
IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.10 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 270270.

CVE ID : CVE-2023-47143
Source : psirt@us.ibm.com
CVSS Score : 10.0

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/270270 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7105139 | source : psirt@us.ibm.com

Vulnerability : CWE-644


Vulnerability ID : CVE-2023-50940

First published on : 02-02-2024 01:15:08
Last modified on : 02-02-2024 16:10:43

Description :
IBM PowerSC 1.3, 2.0, and 2.1 uses Cross-Origin Resource Sharing (CORS) which could allow an attacker to carry out privileged actions and retrieve sensitive information as the domain name is not being limited to only trusted domains. IBM X-Force ID: 275130.

CVE ID : CVE-2023-50940
Source : psirt@us.ibm.com
CVSS Score : 9.8

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/275130 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7113759 | source : psirt@us.ibm.com

Vulnerability : CWE-697

Vulnerability : CWE-942

Vulnerable product(s) : cpe:2.3:a:ibm:powersc:1.3:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.0:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.1:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-22320

First published on : 02-02-2024 03:15:10
Last modified on : 02-02-2024 04:58:55

Description :
IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code in the context of SYSTEM. IBM X-Force ID: 279146.

CVE ID : CVE-2024-22320
Source : psirt@us.ibm.com
CVSS Score : 9.8

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/279146 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7112382 | source : psirt@us.ibm.com

Vulnerability : CWE-502


Source : hq.dhs.gov

Vulnerability ID : CVE-2024-21764

First published on : 02-02-2024 00:15:54
Last modified on : 02-02-2024 01:57:57

Description :
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the product uses hard-coded credentials, which may allow an attacker to connect to a specific port.

CVE ID : CVE-2024-21764
Source : ics-cert@hq.dhs.gov
CVSS Score : 9.8

References :
https://rapidscada.org/contact/ | source : ics-cert@hq.dhs.gov
https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03 | source : ics-cert@hq.dhs.gov

Vulnerability : CWE-798


Source : usom.gov.tr

Vulnerability ID : CVE-2023-6675

First published on : 02-02-2024 13:15:09
Last modified on : 02-02-2024 13:36:23

Description :
Unrestricted Upload of File with Dangerous Type vulnerability in National Keep Cyber Security Services CyberMath allows Upload a Web Shell to a Web Server.This issue affects CyberMath: from v.1.4 before v.1.5.

CVE ID : CVE-2023-6675
Source : iletisim@usom.gov.tr
CVSS Score : 9.8

References :
https://www.usom.gov.tr/bildirim/tr-24-0080 | source : iletisim@usom.gov.tr

Vulnerability : CWE-434


Source : emc.com

Vulnerability ID : CVE-2022-34381

First published on : 02-02-2024 16:15:45
Last modified on : 02-02-2024 16:30:16

Description :
Dell BSAFE SSL-J version 7.0 and all versions prior to 6.5, and Dell BSAFE Crypto-J versions prior to 6.2.6.1 contain an unmaintained third-party component vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to the compromise of the impacted system. This is a Critical vulnerability and Dell recommends customers to upgrade at the earliest opportunity.

CVE ID : CVE-2022-34381
Source : security_alert@emc.com
CVSS Score : 9.1

References :
https://www.dell.com/support/kbdoc/en-us/000203278/dsa-2022-208-dell-bsafe-ssl-j-6-5-and-7-1-and-dell-bsafe-crypto-j-6-2-6-1-and-7-0-security-vulnerability | source : security_alert@emc.com

Vulnerability : CWE-1329


Source : qnapsecurity.com.tw

Vulnerability ID : CVE-2023-45025

First published on : 02-02-2024 16:15:49
Last modified on : 02-02-2024 16:30:16

Description :
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.4.2596 build 20231128 and later QuTS hero h4.5.4.2626 build 20231225 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-45025
Source : security@qnapsecurity.com.tw
CVSS Score : 9.0

References :
https://www.qnap.com/en/security-advisory/qsa-23-47 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-77
Vulnerability : CWE-78


(30) HIGH VULNERABILITIES [7.0, 8.9]

Source : us.ibm.com

Vulnerability ID : CVE-2023-50936

First published on : 02-02-2024 01:15:08
Last modified on : 02-02-2024 16:12:39

Description :
IBM PowerSC 1.3, 2.0, and 2.1 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 275116.

CVE ID : CVE-2023-50936
Source : psirt@us.ibm.com
CVSS Score : 8.8

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/275116 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7113759 | source : psirt@us.ibm.com

Vulnerability : CWE-613

Vulnerable product(s) : cpe:2.3:a:ibm:powersc:1.3:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.0:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.1:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-22319

First published on : 02-02-2024 03:15:10
Last modified on : 02-02-2024 04:58:55

Description :
IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 could allow a remote attacker to conduct an LDAP injection. By sending a request with a specially crafted request, an attacker could exploit this vulnerability to inject unsanitized content into the LDAP filter. IBM X-Force ID: 279145.

CVE ID : CVE-2024-22319
Source : psirt@us.ibm.com
CVSS Score : 8.1

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/279145 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7112382 | source : psirt@us.ibm.com

Vulnerability : CWE-90


Vulnerability ID : CVE-2023-38019

First published on : 02-02-2024 04:15:07
Last modified on : 02-02-2024 04:58:55

Description :
IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 260575.

CVE ID : CVE-2023-38019
Source : psirt@us.ibm.com
CVSS Score : 8.1

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/260575 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7111679 | source : psirt@us.ibm.com

Vulnerability : CWE-22


Vulnerability ID : CVE-2023-50939

First published on : 02-02-2024 00:15:54
Last modified on : 02-02-2024 16:14:59

Description :
IBM PowerSC 1.3, 2.0, and 2.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 275129.

CVE ID : CVE-2023-50939
Source : psirt@us.ibm.com
CVSS Score : 7.5

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/275129 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7113759 | source : psirt@us.ibm.com

Vulnerability : CWE-327

Vulnerable product(s) : cpe:2.3:a:ibm:powersc:1.3:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.0:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.1:*:*:*:*:*:*:*


Vulnerability ID : CVE-2023-50326

First published on : 02-02-2024 01:15:07
Last modified on : 02-02-2024 16:14:50

Description :
IBM PowerSC 1.3, 2.0, and 2.1 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 275107.

CVE ID : CVE-2023-50326
Source : psirt@us.ibm.com
CVSS Score : 7.5

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/275107 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7113759 | source : psirt@us.ibm.com

Vulnerability : CWE-307

Vulnerable product(s) : cpe:2.3:a:ibm:powersc:1.3:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.0:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.1:*:*:*:*:*:*:*


Vulnerability ID : CVE-2023-50937

First published on : 02-02-2024 01:15:08
Last modified on : 02-02-2024 16:11:02

Description :
IBM PowerSC 1.3, 2.0, and 2.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 275117.

CVE ID : CVE-2023-50937
Source : psirt@us.ibm.com
CVSS Score : 7.5

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/275117 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7113759 | source : psirt@us.ibm.com

Vulnerability : CWE-327

Vulnerable product(s) : cpe:2.3:a:ibm:powersc:1.3:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.0:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.1:*:*:*:*:*:*:*


Vulnerability ID : CVE-2023-47142

First published on : 02-02-2024 14:15:54
Last modified on : 02-02-2024 16:30:16

Description :
IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.10 could allow an attacker on the organization's local network to escalate their privileges due to unauthorized API access. IBM X-Force ID: 270267.

CVE ID : CVE-2023-47142
Source : psirt@us.ibm.com
CVSS Score : 7.5

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/270267 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7105139 | source : psirt@us.ibm.com

Vulnerability : CWE-264


Vulnerability ID : CVE-2023-38273

First published on : 02-02-2024 15:15:09
Last modified on : 02-02-2024 16:30:16

Description :
IBM Cloud Pak System 2.3.1.1, 2.3.2.0, and 2.3.3.7 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 260733.

CVE ID : CVE-2023-38273
Source : psirt@us.ibm.com
CVSS Score : 7.5

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/260733 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7105357 | source : psirt@us.ibm.com

Vulnerability : CWE-307


Source : mitre.org

Vulnerability ID : CVE-2024-22779

First published on : 02-02-2024 02:15:17
Last modified on : 02-02-2024 04:58:55

Description :
Directory Traversal vulnerability in Kihron ServerRPExposer v.1.0.2 and before allows a remote attacker to execute arbitrary code via the loadServerPack in ServerResourcePackProviderMixin.java.

CVE ID : CVE-2024-22779
Source : cve@mitre.org
CVSS Score : 8.8

References :
https://gist.github.com/apple502j/193358682885fe1a6708309ce934e4ed | source : cve@mitre.org
https://github.com/Kihron/ServerRPExposer/commit/8f7b829df633f59e828d677f736c53652d6f1b8f | source : cve@mitre.org
https://modrinth.com/mod/serverrpexposer | source : cve@mitre.org


Source : usom.gov.tr

Vulnerability ID : CVE-2023-6676

First published on : 02-02-2024 13:15:09
Last modified on : 02-02-2024 13:36:23

Description :
Cross-Site Request Forgery (CSRF) vulnerability in National Keep Cyber Security Services CyberMath allows Cross Site Request Forgery.This issue affects CyberMath: from v1.4 before v1.5.

CVE ID : CVE-2023-6676
Source : iletisim@usom.gov.tr
CVSS Score : 8.8

References :
https://www.usom.gov.tr/bildirim/tr-24-0080 | source : iletisim@usom.gov.tr

Vulnerability : CWE-352


Source : qnapsecurity.com.tw

Vulnerability ID : CVE-2023-39297

First published on : 02-02-2024 16:15:46
Last modified on : 02-02-2024 16:30:16

Description :
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.4.2596 build 20231128 and later QuTS hero h4.5.4.2626 build 20231225 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-39297
Source : security@qnapsecurity.com.tw
CVSS Score : 8.8

References :
https://www.qnap.com/en/security-advisory/qsa-23-30 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-78


Vulnerability ID : CVE-2023-47568

First published on : 02-02-2024 16:15:52
Last modified on : 02-02-2024 16:30:16

Description :
A SQL injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTS hero h4.5.4.2626 build 20231225 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-47568
Source : security@qnapsecurity.com.tw
CVSS Score : 8.8

References :
https://www.qnap.com/en/security-advisory/qsa-24-05 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-47564

First published on : 02-02-2024 16:15:52
Last modified on : 02-02-2024 16:30:16

Description :
An incorrect permission assignment for critical resource vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow authenticated users to read or modify the resource via a network. We have already fixed the vulnerability in the following versions: Qsync Central 4.4.0.15 ( 2024/01/04 ) and later Qsync Central 4.3.0.11 ( 2024/01/11 ) and later

CVE ID : CVE-2023-47564
Source : security@qnapsecurity.com.tw
CVSS Score : 8.0

References :
https://www.qnap.com/en/security-advisory/qsa-24-03 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-732


Vulnerability ID : CVE-2023-47562

First published on : 02-02-2024 16:15:52
Last modified on : 02-02-2024 16:30:16

Description :
An OS command injection vulnerability has been reported to affect Photo Station. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following version: Photo Station 6.4.2 ( 2023/12/15 ) and later

CVE ID : CVE-2023-47562
Source : security@qnapsecurity.com.tw
CVSS Score : 7.4

References :
https://www.qnap.com/en/security-advisory/qsa-24-08 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-77
Vulnerability : CWE-78


Source : github.com

Vulnerability ID : CVE-2024-24760

First published on : 02-02-2024 16:15:56
Last modified on : 02-02-2024 16:30:16

Description :
mailcow is a dockerized email package, with multiple containers linked in one bridged network. A security vulnerability has been identified in mailcow affecting versions < 2024-01c. This vulnerability potentially allows attackers on the same subnet to connect to exposed ports of a Docker container, even when the port is bound to 127.0.0.1. The vulnerability has been addressed by implementing additional iptables/nftables rules. These rules drop packets for Docker containers on ports 3306, 6379, 8983, and 12345, where the input interface is not `br-mailcow` and the output interface is `br-mailcow`.

CVE ID : CVE-2024-24760
Source : security-advisories@github.com
CVSS Score : 8.8

References :
https://github.com/mailcow/mailcow-dockerized/commit/087481ac12bfa5dd715f3630f0b1697be94f7e88 | source : security-advisories@github.com
https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-gmpj-5xcm-xxx6 | source : security-advisories@github.com

Vulnerability : CWE-610


Vulnerability ID : CVE-2024-24757

First published on : 02-02-2024 16:15:55
Last modified on : 02-02-2024 16:30:16

Description :
open-irs is an issue response robot that reponds to issues in the installed repository. The `.env` file was accidentally uploaded when working with git actions. This problem is fixed in 1.0.1. Discontinuing all sensitive keys and turning into secrets.

CVE ID : CVE-2024-24757
Source : security-advisories@github.com
CVSS Score : 7.6

References :
https://github.com/Degamisu/open-irs/security/advisories/GHSA-7r69-3vwh-wcfr | source : security-advisories@github.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2024-23831

First published on : 02-02-2024 16:15:55
Last modified on : 02-02-2024 16:30:16

Description :
LedgerSMB is a free web-based double-entry accounting system. When a LedgerSMB database administrator has an active session in /setup.pl, an attacker can trick the admin into clicking on a link which automatically submits a request to setup.pl without the admin's consent. This request can be used to create a new user account with full application (/login.pl) privileges, leading to privilege escalation. The vulnerability is patched in versions 1.10.30 and 1.11.9.

CVE ID : CVE-2024-23831
Source : security-advisories@github.com
CVSS Score : 7.5

References :
https://github.com/ledgersmb/LedgerSMB/commit/8c2ae5be68a782d62cb9c0e17c0127bf30ef4165 | source : security-advisories@github.com
https://github.com/ledgersmb/LedgerSMB/security/advisories/GHSA-98ff-f638-qxjm | source : security-advisories@github.com

Vulnerability : CWE-352


Source : microsoft.com

Vulnerability ID : CVE-2024-21399

First published on : 02-02-2024 01:15:08
Last modified on : 02-02-2024 01:57:57

Description :
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability

CVE ID : CVE-2024-21399
Source : secure@microsoft.com
CVSS Score : 8.3

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21399 | source : secure@microsoft.com


Source : ch.abb.com

Vulnerability ID : CVE-2021-22282

First published on : 02-02-2024 07:15:08
Last modified on : 02-02-2024 13:36:31

Description :
Improper Control of Generation of Code ('Code Injection') vulnerability in B&R Industrial Automation Automation Studio allows Local Execution of Code.This issue affects Automation Studio: from 4.0 through 4.12.

CVE ID : CVE-2021-22282
Source : cybersecurity@ch.abb.com
CVSS Score : 8.3

References :
https://www.br-automation.com/fileadmin/2021-12_RCE_Vulnerability_in_BnR_Automation_Studio-1b993aeb.pdf | source : cybersecurity@ch.abb.com

Vulnerability : CWE-94


Vulnerability ID : CVE-2020-24681

First published on : 02-02-2024 07:15:07
Last modified on : 02-02-2024 13:36:31

Description :
Incorrect Permission Assignment for Critical Resource vulnerability in B&R Industrial Automation Automation Studio allows Privilege Escalation.This issue affects Automation Studio: from 4.6.0 through 4.6.X, from 4.7.0 before 4.7.7 SP, from 4.8.0 before 4.8.6 SP, from 4.9.0 before 4.9.4 SP.

CVE ID : CVE-2020-24681
Source : cybersecurity@ch.abb.com
CVSS Score : 8.2

References :
https://www.br-automation.com/fileadmin/2021-14-BR-AS-NET-PVI-Service-Issues-c3710fbf.pdf | source : cybersecurity@ch.abb.com

Vulnerability : CWE-732


Vulnerability ID : CVE-2020-24682

First published on : 02-02-2024 08:15:45
Last modified on : 02-02-2024 13:36:31

Description :
Unquoted Search Path or Element vulnerability in B&R Industrial Automation Automation Studio, B&R Industrial Automation NET/PVI allows Target Programs with Elevated Privileges.This issue affects Automation Studio: from 4.0 through 4.6, from 4.7.0 before 4.7.7 SP, from 4.8.0 before 4.8.6 SP, from 4.9.0 before 4.9.4 SP; NET/PVI: from 4.0 through 4.6, from 4.7.0 before 4.7.7, from 4.8.0 before 4.8.6, from 4.9.0 before 4.9.4.

CVE ID : CVE-2020-24682
Source : cybersecurity@ch.abb.com
CVSS Score : 7.2

References :
https://www.br-automation.com/fileadmin/2021-14-BR-AS-NET-PVI-Service-Issues-c3710fbf.pdf | source : cybersecurity@ch.abb.com

Vulnerability : CWE-428


Source : 0fc0942c-577d-436f-ae8e-945763c79b02

Vulnerability ID : CVE-2024-0253

First published on : 02-02-2024 13:15:09
Last modified on : 02-02-2024 13:36:23

Description :
ManageEngine ADAudit Plus versions 7270 and below are vulnerable to the Authenticated SQL injection in home Graph-Data.

CVE ID : CVE-2024-0253
Source : 0fc0942c-577d-436f-ae8e-945763c79b02
CVSS Score : 8.3

References :
https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html | source : 0fc0942c-577d-436f-ae8e-945763c79b02


Vulnerability ID : CVE-2024-0269

First published on : 02-02-2024 13:15:09
Last modified on : 02-02-2024 13:36:23

Description :
ManageEngine ADAudit Plus versions 7270 and below are vulnerable to the Authenticated SQL injection in File-Summary DrillDown. This issue has been fixed and released in version 7271.

CVE ID : CVE-2024-0269
Source : 0fc0942c-577d-436f-ae8e-945763c79b02
CVSS Score : 8.3

References :
https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html | source : 0fc0942c-577d-436f-ae8e-945763c79b02


Source : openharmony.io

Vulnerability ID : CVE-2024-21860

First published on : 02-02-2024 07:15:11
Last modified on : 02-02-2024 13:36:31

Description :
in OpenHarmony v4.0.0 and prior versions allow an adjacent attacker arbitrary code execution in any apps through use after free.

CVE ID : CVE-2024-21860
Source : scy@openharmony.io
CVSS Score : 8.2

References :
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md | source : scy@openharmony.io

Vulnerability : CWE-416


Source : hq.dhs.gov

Vulnerability ID : CVE-2024-22016

First published on : 02-02-2024 00:15:55
Last modified on : 02-02-2024 01:57:57

Description :
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an authorized user can write directly to the Scada directory. This may allow privilege escalation.

CVE ID : CVE-2024-22016
Source : ics-cert@hq.dhs.gov
CVSS Score : 7.8

References :
https://rapidscada.org/contact/ | source : ics-cert@hq.dhs.gov
https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03 | source : ics-cert@hq.dhs.gov

Vulnerability : CWE-732


Source : incibe.es

Vulnerability ID : CVE-2024-1201

First published on : 02-02-2024 12:15:49
Last modified on : 02-02-2024 13:36:23

Description :
Search path or unquoted item vulnerability in HDD Health affecting versions 4.2.0.112 and earlier. This vulnerability could allow a local attacker to store a malicious executable file within the unquoted search path, resulting in privilege escalation.

CVE ID : CVE-2024-1201
Source : cve-coordination@incibe.es
CVSS Score : 7.8

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/panterasoft-hdd-health-search-path-or-unquoted-item-vulnerability | source : cve-coordination@incibe.es

Vulnerability : CWE-428


Vulnerability ID : CVE-2024-0338

First published on : 02-02-2024 10:15:08
Last modified on : 02-02-2024 13:36:23

Description :
A buffer overflow vulnerability has been found in XAMPP affecting version 8.2.4 and earlier. An attacker could execute arbitrary code through a long file debug argument that controls the Structured Exception Handler (SEH).

CVE ID : CVE-2024-0338
Source : cve-coordination@incibe.es
CVSS Score : 7.3

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/buffer-overflow-vulnerability-xampp | source : cve-coordination@incibe.es

Vulnerability : CWE-119


Vulnerability ID : CVE-2024-23895

First published on : 02-02-2024 10:15:08
Last modified on : 02-02-2024 13:36:23

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/locationcreate.php, in the locationid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23895
Source : cve-coordination@incibe.es
CVSS Score : 7.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79


Source : silabs.com

Vulnerability ID : CVE-2023-6387

First published on : 02-02-2024 16:15:53
Last modified on : 02-02-2024 16:30:16

Description :
A potential buffer overflow exists in the Bluetooth LE HCI CPC sample application in the Gecko SDK which may result in a denial of service or remote code execution

CVE ID : CVE-2023-6387
Source : product-security@silabs.com
CVSS Score : 7.5

References :
https://community.silabs.com/069Vm000000WNKuIAO | source : product-security@silabs.com
https://github.com/SiliconLabs/gecko_sdk/releases/tag/v4.4.0 | source : product-security@silabs.com

Vulnerability : CWE-131


Source : emc.com

Vulnerability ID : CVE-2020-29504

First published on : 02-02-2024 16:15:44
Last modified on : 02-02-2024 16:30:16

Description :
Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.5.2, contain a Missing Required Cryptographic Step Vulnerability.

CVE ID : CVE-2020-29504
Source : security_alert@emc.com
CVSS Score : 7.4

References :
https://www.dell.com/support/kbdoc/en-us/000181115/dsa-2020-286-dell-bsafe-crypto-c-micro-edition-4-1-5-and-dell-bsafe-micro-edition-suite-4-6-multiple-security-vulnerabilities | source : security_alert@emc.com

Vulnerability : CWE-295


(58) MEDIUM VULNERABILITIES [4.0, 6.9]

Source : qnapsecurity.com.tw

Vulnerability ID : CVE-2023-47566

First published on : 02-02-2024 16:15:52
Last modified on : 02-02-2024 16:30:16

Description :
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-47566
Source : security@qnapsecurity.com.tw
CVSS Score : 6.7

References :
https://www.qnap.com/en/security-advisory/qsa-24-04 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-78


Vulnerability ID : CVE-2023-39302

First published on : 02-02-2024 16:15:47
Last modified on : 02-02-2024 16:30:16

Description :
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QuTS hero h5.1.3.2578 build 20231110 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-39302
Source : security@qnapsecurity.com.tw
CVSS Score : 6.6

References :
https://www.qnap.com/en/security-advisory/qsa-23-33 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-78


Vulnerability ID : CVE-2023-41273

First published on : 02-02-2024 16:15:47
Last modified on : 02-02-2024 16:30:16

Description :
A heap-based buffer overflow vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.1.2.2534 build 20230927 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-41273
Source : security@qnapsecurity.com.tw
CVSS Score : 5.5

References :
https://www.qnap.com/en/security-advisory/qsa-23-38 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-120
Vulnerability : CWE-122


Vulnerability ID : CVE-2023-41274

First published on : 02-02-2024 16:15:47
Last modified on : 02-02-2024 16:30:16

Description :
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to launch a denial-of-service (DoS) attack via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.1.2.2534 build 20230927 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-41274
Source : security@qnapsecurity.com.tw
CVSS Score : 5.5

References :
https://www.qnap.com/en/security-advisory/qsa-23-38 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-476


Vulnerability ID : CVE-2023-41275

First published on : 02-02-2024 16:15:47
Last modified on : 02-02-2024 16:30:16

Description :
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.1.2.2534 build 20230927 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-41275
Source : security@qnapsecurity.com.tw
CVSS Score : 5.5

References :
https://www.qnap.com/en/security-advisory/qsa-23-38 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-120
Vulnerability : CWE-122


Vulnerability ID : CVE-2023-41276

First published on : 02-02-2024 16:15:48
Last modified on : 02-02-2024 16:30:16

Description :
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.1.2.2534 build 20230927 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-41276
Source : security@qnapsecurity.com.tw
CVSS Score : 5.5

References :
https://www.qnap.com/en/security-advisory/qsa-23-38 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-120
Vulnerability : CWE-122


Vulnerability ID : CVE-2023-41277

First published on : 02-02-2024 16:15:48
Last modified on : 02-02-2024 16:30:16

Description :
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.1.2.2534 build 20230927 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-41277
Source : security@qnapsecurity.com.tw
CVSS Score : 5.5

References :
https://www.qnap.com/en/security-advisory/qsa-23-38 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-120
Vulnerability : CWE-121


Vulnerability ID : CVE-2023-41278

First published on : 02-02-2024 16:15:48
Last modified on : 02-02-2024 16:30:16

Description :
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.1.2.2534 build 20230927 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-41278
Source : security@qnapsecurity.com.tw
CVSS Score : 5.5

References :
https://www.qnap.com/en/security-advisory/qsa-23-38 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-120
Vulnerability : CWE-121


Vulnerability ID : CVE-2023-41279

First published on : 02-02-2024 16:15:48
Last modified on : 02-02-2024 16:30:16

Description :
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.1.2.2534 build 20230927 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-41279
Source : security@qnapsecurity.com.tw
CVSS Score : 5.5

References :
https://www.qnap.com/en/security-advisory/qsa-23-38 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-120
Vulnerability : CWE-121


Vulnerability ID : CVE-2023-41280

First published on : 02-02-2024 16:15:48
Last modified on : 02-02-2024 16:30:16

Description :
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.1.2.2534 build 20230927 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-41280
Source : security@qnapsecurity.com.tw
CVSS Score : 5.5

References :
https://www.qnap.com/en/security-advisory/qsa-23-38 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-120
Vulnerability : CWE-121


Vulnerability ID : CVE-2023-41281

First published on : 02-02-2024 16:15:49
Last modified on : 02-02-2024 16:30:16

Description :
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-41281
Source : security@qnapsecurity.com.tw
CVSS Score : 5.5

References :
https://www.qnap.com/en/security-advisory/qsa-23-53 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-77
Vulnerability : CWE-78


Vulnerability ID : CVE-2023-41282

First published on : 02-02-2024 16:15:49
Last modified on : 02-02-2024 16:30:16

Description :
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-41282
Source : security@qnapsecurity.com.tw
CVSS Score : 5.5

References :
https://www.qnap.com/en/security-advisory/qsa-23-53 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-77
Vulnerability : CWE-78


Vulnerability ID : CVE-2023-41283

First published on : 02-02-2024 16:15:49
Last modified on : 02-02-2024 16:30:16

Description :
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-41283
Source : security@qnapsecurity.com.tw
CVSS Score : 5.5

References :
https://www.qnap.com/en/security-advisory/qsa-23-53 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-77
Vulnerability : CWE-78


Vulnerability ID : CVE-2023-45026

First published on : 02-02-2024 16:15:50
Last modified on : 02-02-2024 16:30:16

Description :
A path traversal vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to read the contents of unexpected files and expose sensitive data via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-45026
Source : security@qnapsecurity.com.tw
CVSS Score : 5.5

References :
https://www.qnap.com/en/security-advisory/qsa-24-02 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-22


Vulnerability ID : CVE-2023-45027

First published on : 02-02-2024 16:15:50
Last modified on : 02-02-2024 16:30:16

Description :
A path traversal vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to read the contents of unexpected files and expose sensitive data via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-45027
Source : security@qnapsecurity.com.tw
CVSS Score : 5.5

References :
https://www.qnap.com/en/security-advisory/qsa-24-02 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-22


Vulnerability ID : CVE-2023-45028

First published on : 02-02-2024 16:15:50
Last modified on : 02-02-2024 16:30:16

Description :
An uncontrolled resource consumption vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to launch a denial-of-service (DoS) attack via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-45028
Source : security@qnapsecurity.com.tw
CVSS Score : 5.5

References :
https://www.qnap.com/en/security-advisory/qsa-24-02 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-400
Vulnerability : CWE-770


Vulnerability ID : CVE-2023-47561

First published on : 02-02-2024 16:15:51
Last modified on : 02-02-2024 16:30:16

Description :
A cross-site scripting (XSS) vulnerability has been reported to affect Photo Station. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network. We have already fixed the vulnerability in the following version: Photo Station 6.4.2 ( 2023/12/15 ) and later

CVE ID : CVE-2023-47561
Source : security@qnapsecurity.com.tw
CVSS Score : 5.5

References :
https://www.qnap.com/en/security-advisory/qsa-24-08 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-39303

First published on : 02-02-2024 16:15:47
Last modified on : 02-02-2024 16:30:16

Description :
An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to compromise the security of the system via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QuTS hero h5.1.3.2578 build 20231110 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-39303
Source : security@qnapsecurity.com.tw
CVSS Score : 5.3

References :
https://www.qnap.com/en/security-advisory/qsa-23-33 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-287


Vulnerability ID : CVE-2023-32967

First published on : 02-02-2024 16:15:46
Last modified on : 02-02-2024 16:30:16

Description :
An incorrect authorization vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to bypass intended access restrictions via a network. QTS 5.x, QuTS hero are not affected. We have already fixed the vulnerability in the following versions: QuTScloud c5.1.5.2651 and later QTS 4.5.4.2627 build 20231225 and later

CVE ID : CVE-2023-32967
Source : security@qnapsecurity.com.tw
CVSS Score : 5.0

References :
https://www.qnap.com/en/security-advisory/qsa-24-01 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-285
Vulnerability : CWE-863


Vulnerability ID : CVE-2023-47567

First published on : 02-02-2024 16:15:52
Last modified on : 02-02-2024 16:30:16

Description :
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTS hero h4.5.4.2626 build 20231225 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-47567
Source : security@qnapsecurity.com.tw
CVSS Score : 4.7

References :
https://www.qnap.com/en/security-advisory/qsa-24-05 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-78


Source : hq.dhs.gov

Vulnerability ID : CVE-2024-22096

First published on : 02-02-2024 00:15:55
Last modified on : 02-02-2024 01:57:57

Description :
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can append path traversal characters to the filename when using a specific command, allowing them to read arbitrary files from the system.

CVE ID : CVE-2024-22096
Source : ics-cert@hq.dhs.gov
CVSS Score : 6.5

References :
https://rapidscada.org/contact/ | source : ics-cert@hq.dhs.gov
https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03 | source : ics-cert@hq.dhs.gov

Vulnerability : CWE-23


Vulnerability ID : CVE-2024-21869

First published on : 02-02-2024 00:15:55
Last modified on : 02-02-2024 01:57:57

Description :
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product stores plaintext credentials in various places. This may allow an attacker with local access to see them.

CVE ID : CVE-2024-21869
Source : ics-cert@hq.dhs.gov
CVSS Score : 6.2

References :
https://rapidscada.org/contact/ | source : ics-cert@hq.dhs.gov
https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03 | source : ics-cert@hq.dhs.gov

Vulnerability : CWE-256


Vulnerability ID : CVE-2024-21794

First published on : 02-02-2024 00:15:54
Last modified on : 02-02-2024 01:57:57

Description :
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can redirect users to malicious pages through the login page.

CVE ID : CVE-2024-21794
Source : ics-cert@hq.dhs.gov
CVSS Score : 5.4

References :
https://rapidscada.org/contact/ | source : ics-cert@hq.dhs.gov
https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03 | source : ics-cert@hq.dhs.gov

Vulnerability : CWE-601


Vulnerability ID : CVE-2024-21866

First published on : 02-02-2024 00:15:55
Last modified on : 02-02-2024 01:57:57

Description :
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product responds back with an error message containing sensitive data if it receives a specific malformed request.

CVE ID : CVE-2024-21866
Source : ics-cert@hq.dhs.gov
CVSS Score : 5.3

References :
https://rapidscada.org/contact/ | source : ics-cert@hq.dhs.gov
https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03 | source : ics-cert@hq.dhs.gov

Vulnerability : CWE-209


Source : us.ibm.com

Vulnerability ID : CVE-2023-32333

First published on : 02-02-2024 02:15:16
Last modified on : 02-02-2024 04:58:55

Description :
IBM Maximo Asset Management 7.6.1.3 could allow a remote attacker to log into the admin panel due to improper access controls. IBM X-Force ID: 255073.

CVE ID : CVE-2023-32333
Source : psirt@us.ibm.com
CVSS Score : 6.5

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/255073 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7112388 | source : psirt@us.ibm.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-50935

First published on : 02-02-2024 02:15:17
Last modified on : 02-02-2024 15:13:16

Description :
IBM PowerSC 1.3, 2.0, and 2.1 fails to properly restrict access to a URL or resource, which may allow a remote attacker to obtain unauthorized access to application functionality and/or resources. IBM X-Force ID: 275115.

CVE ID : CVE-2023-50935
Source : psirt@us.ibm.com
CVSS Score : 6.5

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/275115 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7113759 | source : psirt@us.ibm.com

Vulnerability : CWE-425

Vulnerable product(s) : cpe:2.3:a:ibm:powersc:1.3:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.0:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.1:*:*:*:*:*:*:*


Vulnerability ID : CVE-2023-38263

First published on : 02-02-2024 04:15:08
Last modified on : 02-02-2024 04:58:55

Description :
IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authenticated user to perform unauthorized actions due to improper access controls. IBM X-Force ID: 260577.

CVE ID : CVE-2023-38263
Source : psirt@us.ibm.com
CVSS Score : 6.5

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/260577 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7111679 | source : psirt@us.ibm.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-50933

First published on : 02-02-2024 01:15:08
Last modified on : 02-02-2024 16:12:52

Description :
IBM PowerSC 1.3, 2.0, and 2.1 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 275113.

CVE ID : CVE-2023-50933
Source : psirt@us.ibm.com
CVSS Score : 6.1

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/275113 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7113759 | source : psirt@us.ibm.com

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ibm:powersc:1.3:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.0:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.1:*:*:*:*:*:*:*


Vulnerability ID : CVE-2023-47144

First published on : 02-02-2024 13:15:08
Last modified on : 02-02-2024 13:36:23

Description :
IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.10 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 270271.

CVE ID : CVE-2023-47144
Source : psirt@us.ibm.com
CVSS Score : 6.1

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/270271 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7105139 | source : psirt@us.ibm.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-50962

First published on : 02-02-2024 02:15:17
Last modified on : 02-02-2024 04:58:55

Description :
IBM PowerSC 1.3, 2.0, and 2.1 MFA does not implement the "HTTP Strict Transport Security" (HSTS) web security policy mechanism. IBM X-Force ID: 276004.

CVE ID : CVE-2023-50962
Source : psirt@us.ibm.com
CVSS Score : 5.9

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/276004 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7113759 | source : psirt@us.ibm.com

Vulnerability : CWE-319


Vulnerability ID : CVE-2023-50941

First published on : 02-02-2024 02:15:17
Last modified on : 02-02-2024 15:11:50

Description :
IBM PowerSC 1.3, 2.0, and 2.1 does not provide logout functionality, which could allow an authenticated user to gain access to an unauthorized user using session fixation. IBM X-Force ID: 275131.

CVE ID : CVE-2023-50941
Source : psirt@us.ibm.com
CVSS Score : 5.4

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/275131 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7113759 | source : psirt@us.ibm.com

Vulnerability : CWE-384

Vulnerable product(s) : cpe:2.3:a:ibm:powersc:1.3:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.0:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.1:*:*:*:*:*:*:*


Vulnerability ID : CVE-2023-50327

First published on : 02-02-2024 01:15:07
Last modified on : 02-02-2024 16:13:22

Description :
IBM PowerSC 1.3, 2.0, and 2.1 uses insecure HTTP methods which could allow a remote attacker to perform unauthorized file request modification. IBM X-Force ID: 275109.

CVE ID : CVE-2023-50327
Source : psirt@us.ibm.com
CVSS Score : 5.3

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/275109 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7113759 | source : psirt@us.ibm.com

Vulnerability : CWE-436

Vulnerability : CWE-650

Vulnerable product(s) : cpe:2.3:a:ibm:powersc:1.3:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.0:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.1:*:*:*:*:*:*:*


Vulnerability ID : CVE-2023-50328

First published on : 02-02-2024 02:15:16
Last modified on : 02-02-2024 15:14:08

Description :
IBM PowerSC 1.3, 2.0, and 2.1 may allow a remote attacker to view session identifiers passed via URL query strings. IBM X-Force ID: 275110.

CVE ID : CVE-2023-50328
Source : psirt@us.ibm.com
CVSS Score : 5.3

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/275110 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7113759 | source : psirt@us.ibm.com

Vulnerability : CWE-668

Vulnerability : CWE-598

Vulnerable product(s) : cpe:2.3:a:ibm:powersc:1.3:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.0:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.1:*:*:*:*:*:*:*


Vulnerability ID : CVE-2023-50934

First published on : 02-02-2024 02:15:16
Last modified on : 02-02-2024 15:13:45

Description :
IBM PowerSC 1.3, 2.0, and 2.1 uses single-factor authentication which can lead to unnecessary risk of compromise when compared with the benefits of a dual-factor authentication scheme. IBM X-Force ID: 275114.

CVE ID : CVE-2023-50934
Source : psirt@us.ibm.com
CVSS Score : 5.3

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/275114 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7113759 | source : psirt@us.ibm.com

Vulnerability : CWE-287

Vulnerability : CWE-308

Vulnerable product(s) : cpe:2.3:a:ibm:powersc:1.3:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.0:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.1:*:*:*:*:*:*:*


Vulnerability ID : CVE-2023-47148

First published on : 02-02-2024 13:15:08
Last modified on : 02-02-2024 13:36:23

Description :
IBM Storage Protect Plus Server 10.1.0 through 10.1.15.2 Admin Console could allow a remote attacker to obtain sensitive information due to improper validation of unsecured endpoints which could be used in further attacks against the system. IBM X-Force ID: 270599.

CVE ID : CVE-2023-47148
Source : psirt@us.ibm.com
CVSS Score : 5.3

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/270599 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7096482 | source : psirt@us.ibm.com

Vulnerability : CWE-862


Vulnerability ID : CVE-2022-40744

First published on : 02-02-2024 04:15:07
Last modified on : 02-02-2024 04:58:55

Description :
IBM Aspera Faspex 5.0.6 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 236441.

CVE ID : CVE-2022-40744
Source : psirt@us.ibm.com
CVSS Score : 4.8

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/236441 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7111778 | source : psirt@us.ibm.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-50938

First published on : 02-02-2024 02:15:17
Last modified on : 02-02-2024 15:12:44

Description :
IBM PowerSC 1.3, 2.0, and 2.1 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 275128.

CVE ID : CVE-2023-50938
Source : psirt@us.ibm.com
CVSS Score : 4.3

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/275128 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7113759 | source : psirt@us.ibm.com

Vulnerability : CWE-451

Vulnerable product(s) : cpe:2.3:a:ibm:powersc:1.3:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.0:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ibm:powersc:2.1:*:*:*:*:*:*:*


Vulnerability ID : CVE-2023-38020

First published on : 02-02-2024 04:15:08
Last modified on : 02-02-2024 04:58:55

Description :
IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authenticated user to manipulate output written to log files. IBM X-Force ID: 260576.

CVE ID : CVE-2023-38020
Source : psirt@us.ibm.com
CVSS Score : 4.3

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/260576 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7111679 | source : psirt@us.ibm.com

Vulnerability : CWE-117


Source : snyk.io

Vulnerability ID : CVE-2024-21485

First published on : 02-02-2024 05:15:09
Last modified on : 02-02-2024 13:36:37

Description :
Versions of the package dash-core-components before 2.13.0; all versions of the package dash-core-components; versions of the package dash before 2.15.0; all versions of the package dash-html-components; versions of the package dash-html-components before 2.0.16 are vulnerable to Cross-site Scripting (XSS) when the href of the a tag is controlled by an adversary. An authenticated attacker who stores a view that exploits this vulnerability could steal the data that's visible to another user who opens that view - not just the data already included on the page, but they could also, in theory, make additional requests and access other data accessible to this user. In some cases, they could also steal the access tokens of that user, which would allow the attacker to act as that user, including viewing other apps and resources hosted on the same server. **Note:** This is only exploitable in Dash apps that include some mechanism to store user input to be reloaded by a different user.

CVE ID : CVE-2024-21485
Source : report@snyk.io
CVSS Score : 6.5

References :
https://github.com/plotly/dash/commit/9920073c9a8619ae8f90fcec1924f2f3a4332a8c | source : report@snyk.io
https://github.com/plotly/dash/issues/2729 | source : report@snyk.io
https://github.com/plotly/dash/pull/2732 | source : report@snyk.io
https://github.com/plotly/dash/releases/tag/v2.15.0 | source : report@snyk.io
https://security.snyk.io/vuln/SNYK-JS-DASHCORECOMPONENTS-6183084 | source : report@snyk.io
https://security.snyk.io/vuln/SNYK-JS-DASHHTMLCOMPONENTS-6226337 | source : report@snyk.io
https://security.snyk.io/vuln/SNYK-PYTHON-DASH-6226335 | source : report@snyk.io
https://security.snyk.io/vuln/SNYK-PYTHON-DASHCORECOMPONENTS-6226334 | source : report@snyk.io
https://security.snyk.io/vuln/SNYK-PYTHON-DASHHTMLCOMPONENTS-6226336 | source : report@snyk.io

Vulnerability : CWE-79


Source : wordfence.com

Vulnerability ID : CVE-2024-1073

First published on : 02-02-2024 05:15:09
Last modified on : 02-02-2024 13:36:37

Description :
The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'filter_array' parameter in all versions up to, and including, 5.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2024-1073
Source : security@wordfence.com
CVSS Score : 6.4

References :
https://plugins.trac.wordpress.org/browser/wp-slimstat/trunk/admin/index.php#L1004 | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3029858%40wp-slimstat&new=3029858%40wp-slimstat&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/33cba63c-4629-48fd-850f-f68dad626a67?source=cve | source : security@wordfence.com


Vulnerability ID : CVE-2024-0963

First published on : 02-02-2024 12:15:49
Last modified on : 02-02-2024 13:36:23

Description :
The Calculated Fields Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's CP_CALCULATED_FIELDS shortcode in all versions up to, and including, 1.2.52 due to insufficient input sanitization and output escaping on user supplied 'location' attribute. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2024-0963
Source : security@wordfence.com
CVSS Score : 6.4

References :
https://plugins.trac.wordpress.org/changeset/3029782/calculated-fields-form/trunk/inc/cpcff_main.inc.php | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3029782%40calculated-fields-form&new=3029782%40calculated-fields-form&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/d870ff8d-ea4b-4777-9892-0d9982182b9f?source=cve | source : security@wordfence.com


Vulnerability ID : CVE-2024-0685

First published on : 02-02-2024 05:15:08
Last modified on : 02-02-2024 13:36:37

Description :
The Ninja Forms Contact Form โ€“ The Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to Second Order SQL Injection via the email address value submitted through forms in all versions up to, and including, 3.7.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to inject SQL in their email address that will append additional into the already existing query when an administrator triggers a personal data export.

CVE ID : CVE-2024-0685
Source : security@wordfence.com
CVSS Score : 5.9

References :
https://plugins.trac.wordpress.org/changeset/3028929/ninja-forms/trunk/includes/Admin/UserDataRequests.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/3cb73d5d-ca4a-4103-866d-f7bb369a8ce4?source=cve | source : security@wordfence.com


Vulnerability ID : CVE-2024-1047

First published on : 02-02-2024 06:15:45
Last modified on : 02-02-2024 13:36:31

Description :
The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the register_reference() function in all versions up to, and including, 2.10.28. This makes it possible for unauthenticated attackers to update the connected API keys.

CVE ID : CVE-2024-1047
Source : security@wordfence.com
CVSS Score : 5.3

References :
https://plugins.trac.wordpress.org/browser/themeisle-companion/trunk/vendor/codeinwp/themeisle-sdk/src/Modules/Promotions.php#L175 | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/3029507/themeisle-companion/tags/2.10.29/vendor/codeinwp/themeisle-sdk/src/Modules/Promotions.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/6147582f-578a-47ad-b16c-65c37896783d?source=cve | source : security@wordfence.com


Vulnerability ID : CVE-2024-0844

First published on : 02-02-2024 12:15:49
Last modified on : 02-02-2024 13:36:23

Description :
The Popup More Popups, Lightboxes, and more popup modules plugin for WordPress is vulnerable to Local File Inclusion in version 2.1.6 via the ycfChangeElementData() function. This makes it possible for authenticated attackers, with administrator-level access and above, to include and execute arbitrary files ending with "Form.php" on the server , allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other โ€œsafeโ€ file types can be uploaded and included.

CVE ID : CVE-2024-0844
Source : security@wordfence.com
CVSS Score : 4.7

References :
https://plugins.trac.wordpress.org/browser/popup-more/trunk/classes/Ajax.php#L184 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/7894a19c-b873-4c5b-8c82-6656cc306ee2?source=cve | source : security@wordfence.com


Vulnerability ID : CVE-2024-1162

First published on : 02-02-2024 06:15:45
Last modified on : 02-02-2024 13:36:31

Description :
The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.10.29. This is due to missing or incorrect nonce validation on the register_reference() function. This makes it possible for unauthenticated attackers to update the connected API keys via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2024-1162
Source : security@wordfence.com
CVSS Score : 4.3

References :
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3030173%40themeisle-companion&new=3030173%40themeisle-companion&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/88f6a24f-f14a-4d0a-be5a-f8c84910b4fc?source=cve | source : security@wordfence.com


Source : ch.abb.com

Vulnerability ID : CVE-2021-22281

First published on : 02-02-2024 08:15:46
Last modified on : 02-02-2024 13:36:31

Description :
: Relative Path Traversal vulnerability in B&R Industrial Automation Automation Studio allows Relative Path Traversal.This issue affects Automation Studio: from 4.0 through 4.12.

CVE ID : CVE-2021-22281
Source : cybersecurity@ch.abb.com
CVSS Score : 6.3

References :
https://www.br-automation.com/fileadmin/2021-11_ZipSlip_Vulnerability_in_Automation_Studio_Project_Import-b90d2f42.pdf | source : cybersecurity@ch.abb.com

Vulnerability : CWE-23


Source : usom.gov.tr

Vulnerability ID : CVE-2023-6673

First published on : 02-02-2024 13:15:09
Last modified on : 02-02-2024 13:36:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in National Keep Cyber Security Services CyberMath allows Reflected XSS.This issue affects CyberMath: from v.1.4 before v.1.5.

CVE ID : CVE-2023-6673
Source : iletisim@usom.gov.tr
CVSS Score : 6.1

References :
https://www.usom.gov.tr/bildirim/tr-24-0080 | source : iletisim@usom.gov.tr

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-6672

First published on : 02-02-2024 13:15:08
Last modified on : 02-02-2024 13:36:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in National Keep Cyber Security Services CyberMath allows Stored XSS.This issue affects CyberMath: from v1.4 before v1.5.

CVE ID : CVE-2023-6672
Source : iletisim@usom.gov.tr
CVSS Score : 5.4

References :
https://www.usom.gov.tr/bildirim/tr-24-0080 | source : iletisim@usom.gov.tr

Vulnerability : CWE-79


Source : github.com

Vulnerability ID : CVE-2024-23635

First published on : 02-02-2024 17:15:11
Last modified on : 02-02-2024 21:13:53

Description :
AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to 1.7.5, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. Patched in AntiSamy 1.7.5 and later.

CVE ID : CVE-2024-23635
Source : security-advisories@github.com
CVSS Score : 6.1

References :
https://github.com/nahsra/antisamy/security/advisories/GHSA-2mrq-w8pv-5pvq | source : security-advisories@github.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2024-23824

First published on : 02-02-2024 16:15:55
Last modified on : 02-02-2024 16:30:16

Description :
mailcow is a dockerized email package, with multiple containers linked in one bridged network. The application is vulnerable to pixel flood attack, once the payload has been successfully uploaded in the logo the application goes slow and doesn't respond in the admin page. It is tested on the versions 2023-12a and prior and patched in version 2024-01.

CVE ID : CVE-2024-23824
Source : security-advisories@github.com
CVSS Score : 4.7

References :
https://github.com/0xbunniee/MailCow-Pixel-Flood-Attack | source : security-advisories@github.com
https://github.com/mailcow/mailcow-dockerized/commit/7f6f7e0e9ff608618e5b144bcf18d279610aa3ed | source : security-advisories@github.com
https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-45rv-3c5p-w4h7 | source : security-advisories@github.com

Vulnerability : CWE-400


Source : emc.com

Vulnerability ID : CVE-2021-21575

First published on : 02-02-2024 16:15:45
Last modified on : 02-02-2024 16:30:16

Description :
Dell BSAFE Micro Edition Suite, versions before 4.5.2, contain an Observable Timing Discrepancy Vulnerability.

CVE ID : CVE-2021-21575
Source : security_alert@emc.com
CVSS Score : 5.9

References :
https://www.dell.com/support/kbdoc/en-us/000189462/dsa-2021-131-dell-bsafetm-micro-edition-suite-multiple-vulnerabilities | source : security_alert@emc.com

Vulnerability : CWE-208


Source : vuldb.com

Vulnerability ID : CVE-2024-1195

First published on : 02-02-2024 22:15:25
Last modified on : 02-02-2024 22:15:25

Description :
A vulnerability classified as critical was found in iTop VPN up to 4.0.0.1. Affected by this vulnerability is an unknown functionality in the library ITopVpnCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The identifier VDB-252685 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1195
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://vuldb.com/?ctiid.252685 | source : cna@vuldb.com
https://vuldb.com/?id.252685 | source : cna@vuldb.com
https://www.youtube.com/watch?v=JdQMINPVJd8 | source : cna@vuldb.com

Vulnerability : CWE-404


Vulnerability ID : CVE-2024-1189

First published on : 02-02-2024 19:15:08
Last modified on : 02-02-2024 21:13:53

Description :
A vulnerability has been found in AMPPS 2.7 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Encryption Passphrase Handler. The manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.0 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-252679. NOTE: The vendor explains that AMPPS 4.0 is a complete overhaul and the code was re-written.

CVE ID : CVE-2024-1189
Source : cna@vuldb.com
CVSS Score : 5.3

References :
https://fitoxs.com/vuldb/15-exploit-perl.txt | source : cna@vuldb.com
https://vuldb.com/?ctiid.252679 | source : cna@vuldb.com
https://vuldb.com/?id.252679 | source : cna@vuldb.com

Vulnerability : CWE-404


Vulnerability ID : CVE-2024-1196

First published on : 02-02-2024 22:15:25
Last modified on : 02-02-2024 22:15:25

Description :
A vulnerability classified as problematic was found in SourceCodester Testimonial Page Manager 1.0. This vulnerability affects unknown code of the file add-testimonial.php of the component HTTP POST Request Handler. The manipulation of the argument name/description/testimony leads to cross site scripting. The attack can be initiated remotely. VDB-252694 is the identifier assigned to this vulnerability.

CVE ID : CVE-2024-1196
Source : cna@vuldb.com
CVSS Score : 4.3

References :
https://vuldb.com/?ctiid.252694 | source : cna@vuldb.com
https://vuldb.com/?id.252694 | source : cna@vuldb.com

Vulnerability : CWE-79


Source : hcl.com

Vulnerability ID : CVE-2023-37527

First published on : 02-02-2024 19:15:07
Last modified on : 02-02-2024 21:13:53

Description :
A reflected cross-site scripting (XSS) vulnerability in the Web Reports component of HCL BigFix Platform can possibly allow an attacker to execute malicious javascript code in the application session or in database, via remote injection, while rendering content in a web page.

CVE ID : CVE-2023-37527
Source : psirt@hcl.com
CVSS Score : 5.4

References :
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0110209 | source : psirt@hcl.com


Source : openharmony.io

Vulnerability ID : CVE-2024-0285

First published on : 02-02-2024 07:15:09
Last modified on : 02-02-2024 13:36:31

Description :
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input.

CVE ID : CVE-2024-0285
Source : scy@openharmony.io
CVSS Score : 4.7

References :
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md | source : scy@openharmony.io

Vulnerability : CWE-20


Vulnerability ID : CVE-2024-21863

First published on : 02-02-2024 07:15:12
Last modified on : 02-02-2024 13:36:31

Description :
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input.

CVE ID : CVE-2024-21863
Source : scy@openharmony.io
CVSS Score : 4.7

References :
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md | source : scy@openharmony.io

Vulnerability : CWE-20


Vulnerability ID : CVE-2023-45734

First published on : 02-02-2024 07:15:09
Last modified on : 02-02-2024 13:36:31

Description :
in OpenHarmony v3.2.4 and prior versions allow an adjacent attacker arbitrary code execution through out-of-bounds write.

CVE ID : CVE-2023-45734
Source : scy@openharmony.io
CVSS Score : 4.2

References :
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md | source : scy@openharmony.io

Vulnerability : CWE-787


(20) LOW VULNERABILITIES [0.1, 3.9]

Source : qnapsecurity.com.tw

Vulnerability ID : CVE-2023-41292

First published on : 02-02-2024 16:15:49
Last modified on : 02-02-2024 16:30:16

Description :
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-41292
Source : security@qnapsecurity.com.tw
CVSS Score : 3.8

References :
https://www.qnap.com/en/security-advisory/qsa-23-46 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-120


Vulnerability ID : CVE-2023-45035

First published on : 02-02-2024 16:15:50
Last modified on : 02-02-2024 16:30:16

Description :
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-45035
Source : security@qnapsecurity.com.tw
CVSS Score : 3.8

References :
https://www.qnap.com/en/security-advisory/qsa-23-46 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-120


Vulnerability ID : CVE-2023-45036

First published on : 02-02-2024 16:15:51
Last modified on : 02-02-2024 16:30:16

Description :
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QuTS hero h5.1.3.2578 build 20231110 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-45036
Source : security@qnapsecurity.com.tw
CVSS Score : 3.8

References :
https://www.qnap.com/en/security-advisory/qsa-23-46 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-120


Vulnerability ID : CVE-2023-45037

First published on : 02-02-2024 16:15:51
Last modified on : 02-02-2024 16:30:16

Description :
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QuTS hero h5.1.3.2578 build 20231110 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-45037
Source : security@qnapsecurity.com.tw
CVSS Score : 3.8

References :
https://www.qnap.com/en/security-advisory/qsa-23-46 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-120


Vulnerability ID : CVE-2023-50359

First published on : 02-02-2024 16:15:53
Last modified on : 02-02-2024 16:30:16

Description :
An unchecked return value vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow local authenticated administrators to place the system in a state that could lead to a crash or other unintended behaviors via unspecified vectors. We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QuTS hero h5.1.5.2647 build 20240118 and later

CVE ID : CVE-2023-50359
Source : security@qnapsecurity.com.tw
CVSS Score : 3.4

References :
https://www.qnap.com/en/security-advisory/qsa-24-07 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-252


Source : github.com

Vulnerability ID : CVE-2024-24560

First published on : 02-02-2024 17:15:11
Last modified on : 02-02-2024 21:13:53

Description :
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. When calls to external contracts are made, we write the input buffer starting at byte 28, and allocate the return buffer to start at byte 0 (overlapping with the input buffer). When checking RETURNDATASIZE for dynamic types, the size is compared only to the minimum allowed size for that type, and not to the returned value's length. As a result, malformed return data can cause the contract to mistake data from the input buffer for returndata. When the called contract returns invalid ABIv2 encoded data, the calling contract can read different invalid data (from the dirty buffer) than the called contract returned.

CVE ID : CVE-2024-24560
Source : security-advisories@github.com
CVSS Score : 3.7

References :
https://github.com/vyperlang/vyper/security/advisories/GHSA-gp3w-2v2m-p686 | source : security-advisories@github.com

Vulnerability : CWE-119


Source : vuldb.com

Vulnerability ID : CVE-2024-1184

First published on : 02-02-2024 13:15:10
Last modified on : 02-02-2024 13:36:23

Description :
A vulnerability was found in Nsasoft Network Sleuth 3.0.0.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Registration Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-252674 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1184
Source : cna@vuldb.com
CVSS Score : 3.3

References :
https://fitoxs.com/vuldb/10-exploit-perl.txt | source : cna@vuldb.com
https://vuldb.com/?ctiid.252674 | source : cna@vuldb.com
https://vuldb.com/?id.252674 | source : cna@vuldb.com

Vulnerability : CWE-404


Vulnerability ID : CVE-2024-1185

First published on : 02-02-2024 16:15:53
Last modified on : 02-02-2024 16:30:16

Description :
A vulnerability classified as problematic has been found in Nsasoft NBMonitor Network Bandwidth Monitor 1.6.5.0. This affects an unknown part of the component Registration Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252675. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1185
Source : cna@vuldb.com
CVSS Score : 3.3

References :
https://fitoxs.com/vuldb/11-exploit-perl.txt | source : cna@vuldb.com
https://vuldb.com/?ctiid.252675 | source : cna@vuldb.com
https://vuldb.com/?id.252675 | source : cna@vuldb.com

Vulnerability : CWE-404


Vulnerability ID : CVE-2024-1186

First published on : 02-02-2024 17:15:11
Last modified on : 02-02-2024 21:13:53

Description :
A vulnerability classified as problematic was found in Munsoft Easy Archive Recovery 2.0. This vulnerability affects unknown code of the component Registration Key Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252676. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1186
Source : cna@vuldb.com
CVSS Score : 3.3

References :
https://fitoxs.com/vuldb/12-exploit-perl.txt | source : cna@vuldb.com
https://vuldb.com/?ctiid.252676 | source : cna@vuldb.com
https://vuldb.com/?id.252676 | source : cna@vuldb.com
https://www.exploit-db.com/exploits/45884 | source : cna@vuldb.com

Vulnerability : CWE-404


Vulnerability ID : CVE-2024-1187

First published on : 02-02-2024 18:15:32
Last modified on : 02-02-2024 21:13:53

Description :
A vulnerability, which was classified as problematic, has been found in Munsoft Easy Outlook Express Recovery 2.0. This issue affects some unknown processing of the component Registration Key Handler. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-252677 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1187
Source : cna@vuldb.com
CVSS Score : 3.3

References :
https://fitoxs.com/vuldb/13-exploit-perl.txt | source : cna@vuldb.com
https://vuldb.com/?ctiid.252677 | source : cna@vuldb.com
https://vuldb.com/?id.252677 | source : cna@vuldb.com

Vulnerability : CWE-404


Vulnerability ID : CVE-2024-1188

First published on : 02-02-2024 18:15:32
Last modified on : 02-02-2024 21:13:53

Description :
A vulnerability, which was classified as problematic, was found in Rizone Soft Notepad3 1.0.2.350. Affected is an unknown function of the component Encryption Passphrase Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-252678 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1188
Source : cna@vuldb.com
CVSS Score : 3.3

References :
https://fitoxs.com/vuldb/14-exploit-perl.txt | source : cna@vuldb.com
https://vuldb.com/?ctiid.252678 | source : cna@vuldb.com
https://vuldb.com/?id.252678 | source : cna@vuldb.com

Vulnerability : CWE-404


Vulnerability ID : CVE-2024-1190

First published on : 02-02-2024 19:15:08
Last modified on : 02-02-2024 21:13:53

Description :
A vulnerability was found in Global Scape CuteFTP 9.3.0.3 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument Host/Username/Password leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252680. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1190
Source : cna@vuldb.com
CVSS Score : 3.3

References :
https://fitoxs.com/vuldb/16-exploit-perl.txt | source : cna@vuldb.com
https://vuldb.com/?ctiid.252680 | source : cna@vuldb.com
https://vuldb.com/?id.252680 | source : cna@vuldb.com

Vulnerability : CWE-404


Vulnerability ID : CVE-2024-1193

First published on : 02-02-2024 21:15:08
Last modified on : 02-02-2024 21:15:08

Description :
A vulnerability was found in Navicat 12.0.29. It has been rated as problematic. This issue affects some unknown processing of the component MySQL Conecction Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252683. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1193
Source : cna@vuldb.com
CVSS Score : 3.3

References :
https://fitoxs.com/vuldb/24-exploit-perl.txt | source : cna@vuldb.com
https://vuldb.com/?ctiid.252683 | source : cna@vuldb.com
https://vuldb.com/?id.252683 | source : cna@vuldb.com

Vulnerability : CWE-404


Vulnerability ID : CVE-2024-1194

First published on : 02-02-2024 21:15:08
Last modified on : 02-02-2024 21:15:08

Description :
A vulnerability classified as problematic has been found in Armcode AlienIP 2.41. Affected is an unknown function of the component Locate Host Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252684. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1194
Source : cna@vuldb.com
CVSS Score : 3.3

References :
https://fitoxs.com/vuldb/25-exploit-perl.txt | source : cna@vuldb.com
https://vuldb.com/?ctiid.252684 | source : cna@vuldb.com
https://vuldb.com/?id.252684 | source : cna@vuldb.com

Vulnerability : CWE-404


Source : hcl.com

Vulnerability ID : CVE-2024-23553

First published on : 02-02-2024 21:15:08
Last modified on : 02-02-2024 21:15:08

Description :
A cross-site scripting (XSS) vulnerability in the Web Reports component of HCL BigFix Platform exists due to missing a specific http header attribute.

CVE ID : CVE-2024-23553
Source : psirt@hcl.com
CVSS Score : 3.0

References :
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0110209 | source : psirt@hcl.com


Source : openharmony.io

Vulnerability ID : CVE-2023-43756

First published on : 02-02-2024 07:15:08
Last modified on : 02-02-2024 13:36:31

Description :
in OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.

CVE ID : CVE-2023-43756
Source : scy@openharmony.io
CVSS Score : 2.9

References :
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md | source : scy@openharmony.io

Vulnerability : CWE-125


Vulnerability ID : CVE-2023-49118

First published on : 02-02-2024 07:15:09
Last modified on : 02-02-2024 13:36:31

Description :
in OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.

CVE ID : CVE-2023-49118
Source : scy@openharmony.io
CVSS Score : 2.9

References :
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md | source : scy@openharmony.io

Vulnerability : CWE-125


Vulnerability ID : CVE-2024-21845

First published on : 02-02-2024 07:15:10
Last modified on : 02-02-2024 13:36:31

Description :
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow.

CVE ID : CVE-2024-21845
Source : scy@openharmony.io
CVSS Score : 2.9

References :
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md | source : scy@openharmony.io

Vulnerability : CWE-190


Vulnerability ID : CVE-2024-21851

First published on : 02-02-2024 07:15:11
Last modified on : 02-02-2024 13:36:31

Description :
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow.

CVE ID : CVE-2024-21851
Source : scy@openharmony.io
CVSS Score : 2.9

References :
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md | source : scy@openharmony.io

Vulnerability : CWE-190


Source : us.ibm.com

Vulnerability ID : CVE-2023-46159

First published on : 02-02-2024 03:15:09
Last modified on : 02-02-2024 04:58:55

Description :
IBM Storage Ceph 5.3z1, 5.3z5, and 6.1z1 could allow an authenticated user on the network to cause a denial of service from RGW. IBM X-Force ID: 268906.

CVE ID : CVE-2023-46159
Source : psirt@us.ibm.com
CVSS Score : 2.6

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/268906 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7112263 | source : psirt@us.ibm.com

Vulnerability : CWE-20


(31) NO SCORE VULNERABILITIES [0.0, 0.0]

Source : mitre.org

Vulnerability ID : CVE-2023-46344

First published on : 02-02-2024 02:15:16
Last modified on : 02-02-2024 04:58:55

Description :
A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks.

CVE ID : CVE-2023-46344
Source : cve@mitre.org
CVSS Score : /

References :
http://solar-log.com | source : cve@mitre.org
https://github.com/vinnie1717/CVE-2023-46344/blob/main/Solar-Log%20XSS | source : cve@mitre.org


Vulnerability ID : CVE-2023-48792

First published on : 02-02-2024 02:15:16
Last modified on : 02-02-2024 04:58:55

Description :
Zoho ManageEngine ADAudit Plus through 7250 is vulnerable to SQL Injection in the report export option.

CVE ID : CVE-2023-48792
Source : cve@mitre.org
CVSS Score : /

References :
https://manageengine.com | source : cve@mitre.org
https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html | source : cve@mitre.org


Vulnerability ID : CVE-2023-48793

First published on : 02-02-2024 02:15:16
Last modified on : 02-02-2024 04:58:55

Description :
Zoho ManageEngine ADAudit Plus through 7250 allows SQL Injection in the aggregate report feature.

CVE ID : CVE-2023-48793
Source : cve@mitre.org
CVSS Score : /

References :
https://manageengine.com | source : cve@mitre.org
https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html | source : cve@mitre.org


Vulnerability ID : CVE-2024-22899

First published on : 02-02-2024 02:15:18
Last modified on : 02-02-2024 04:58:55

Description :
Vinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the syncNtpTime function.

CVE ID : CVE-2024-22899
Source : cve@mitre.org
CVSS Score : /

References :
http://vinchin.com | source : cve@mitre.org
https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ | source : cve@mitre.org
https://seclists.org/fulldisclosure/2024/Jan/29 | source : cve@mitre.org


Vulnerability ID : CVE-2024-22900

First published on : 02-02-2024 02:15:18
Last modified on : 02-02-2024 04:58:55

Description :
Vinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the setNetworkCardInfo function.

CVE ID : CVE-2024-22900
Source : cve@mitre.org
CVSS Score : /

References :
http://vinchin.com | source : cve@mitre.org
https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ | source : cve@mitre.org
https://seclists.org/fulldisclosure/2024/Jan/29 | source : cve@mitre.org


Vulnerability ID : CVE-2024-22901

First published on : 02-02-2024 02:15:18
Last modified on : 02-02-2024 04:58:55

Description :
Vinchin Backup & Recovery v7.2 was discovered to use default MYSQL credentials.

CVE ID : CVE-2024-22901
Source : cve@mitre.org
CVSS Score : /

References :
http://vinchin.com | source : cve@mitre.org
https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ | source : cve@mitre.org
https://seclists.org/fulldisclosure/2024/Jan/30 | source : cve@mitre.org


Vulnerability ID : CVE-2024-22902

First published on : 02-02-2024 02:15:18
Last modified on : 02-02-2024 04:58:55

Description :
Vinchin Backup & Recovery v7.2 was discovered to be configured with default root credentials.

CVE ID : CVE-2024-22902
Source : cve@mitre.org
CVSS Score : /

References :
http://default.com | source : cve@mitre.org
http://vinchin.com | source : cve@mitre.org
https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ | source : cve@mitre.org
https://seclists.org/fulldisclosure/2024/Jan/31 | source : cve@mitre.org


Vulnerability ID : CVE-2024-22903

First published on : 02-02-2024 02:15:18
Last modified on : 02-02-2024 04:58:55

Description :
Vinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the deleteUpdateAPK function.

CVE ID : CVE-2024-22903
Source : cve@mitre.org
CVSS Score : /

References :
http://vinchin.com | source : cve@mitre.org
https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ | source : cve@mitre.org
https://seclists.org/fulldisclosure/2024/Jan/32 | source : cve@mitre.org


Vulnerability ID : CVE-2024-23746

First published on : 02-02-2024 02:15:18
Last modified on : 02-02-2024 04:58:55

Description :
Miro Desktop 0.8.18 on macOS allows Electron code injection.

CVE ID : CVE-2024-23746
Source : cve@mitre.org
CVSS Score : /

References :
https://book.hacktricks.xyz/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-electron-applications-injection | source : cve@mitre.org
https://github.com/louiselalanne/CVE-2024-23746 | source : cve@mitre.org
https://miro.com/about/ | source : cve@mitre.org


Vulnerability ID : CVE-2024-22533

First published on : 02-02-2024 03:15:11
Last modified on : 02-02-2024 04:58:55

Description :
Before Beetl v3.15.12, the rendering template has a server-side template injection (SSTI) vulnerability. When the incoming template is controllable, it will be filtered by the DefaultNativeSecurityManager blacklist. Because blacklist filtering is not strict, the blacklist can be bypassed, leading to arbitrary code execution.

CVE ID : CVE-2024-22533
Source : cve@mitre.org
CVSS Score : /

References :
https://gitee.com/xiandafu/beetl/issues/I8RU01 | source : cve@mitre.org


Vulnerability ID : CVE-2024-24482

First published on : 02-02-2024 05:15:10
Last modified on : 02-02-2024 13:36:37

Description :
Aprktool before 2.9.3 on Windows allows ../ and /.. directory traversal.

CVE ID : CVE-2024-24482
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/iBotPeaches/Apktool/security/advisories/GHSA-vgwr-4w3p-xmjv | source : cve@mitre.org


Vulnerability ID : CVE-2023-46045

First published on : 02-02-2024 06:15:45
Last modified on : 02-02-2024 13:36:37

Description :
Graphviz 2.36 before 10.0.0 has an out-of-bounds read via a crafted config6a file. NOTE: exploitability may be uncommon because this file is typically owned by root.

CVE ID : CVE-2023-46045
Source : cve@mitre.org
CVSS Score : /

References :
https://gitlab.com/graphviz/graphviz/-/issues/2441 | source : cve@mitre.org
https://seclists.org/fulldisclosure/2024/Jan/73 | source : cve@mitre.org
https://www.openwall.com/lists/oss-security/2024/02/01/2 | source : cve@mitre.org


Vulnerability ID : CVE-2024-24524

First published on : 02-02-2024 08:15:46
Last modified on : 02-02-2024 13:36:31

Description :
Cross Site Request Forgery (CSRF) vulnerability in flusity-CMS v.2.33, allows remote attackers to execute arbitrary code via the add_menu.php component.

CVE ID : CVE-2024-24524
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/harryrabbit5651/cms/blob/main/1.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-48645

First published on : 02-02-2024 09:15:37
Last modified on : 02-02-2024 13:36:31

Description :
An issue was discovered in the Archibus app 4.0.3 for iOS. It uses a local database that is synchronized with a Web central server instance every time the application is opened, or when the refresh button is used. There is a SQL injection in the search work request feature in the Maintenance module of the app. This allows performing queries on the local database.

CVE ID : CVE-2023-48645
Source : cve@mitre.org
CVSS Score : /

References :
https://excellium-services.com/cert-xlm-advisory/CVE-2023-48645 | source : cve@mitre.org


Vulnerability ID : CVE-2024-22851

First published on : 02-02-2024 09:15:37
Last modified on : 02-02-2024 13:36:31

Description :
Directory Traversal Vulnerability in LiveConfig before v.2.5.2 allows a remote attacker to obtain sensitive information via a crafted request to the /static/ endpoint.

CVE ID : CVE-2024-22851
Source : cve@mitre.org
CVSS Score : /

References :
https://www.drive-byte.de/en/blog/liveconfig-advisory-cve-2024-22851 | source : cve@mitre.org


Vulnerability ID : CVE-2023-39611

First published on : 02-02-2024 10:15:08
Last modified on : 02-02-2024 13:36:23

Description :
An issue in Software FX Chart FX 7 version 7.0.4962.20829 allows attackers to enumerate and read files from the local filesystem by sending crafted web requests.

CVE ID : CVE-2023-39611
Source : cve@mitre.org
CVSS Score : /

References :
https://medium.com/%40arielbreisacher/my-chart-fx-7-software-investigation-journey-leading-to-a-directory-traversal-vulnerability-067cdcd3f2e9 | source : cve@mitre.org


Vulnerability ID : CVE-2023-50488

First published on : 02-02-2024 10:15:08
Last modified on : 02-02-2024 13:36:23

Description :
An issue in Blurams Lumi Security Camera (A31C) v23.0406.435.4120 allows attackers to execute arbitrary code.

CVE ID : CVE-2023-50488
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/roman-mueller/PoC/tree/master/CVE-2023-50488 | source : cve@mitre.org
https://infosec.rm-it.de/2024/02/01/blurams-lumi-security-camera-analysis/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-51072

First published on : 02-02-2024 10:15:08
Last modified on : 02-02-2024 13:36:23

Description :
A stored cross-site scripting (XSS) vulnerability in the NOC component of Nagios XI version up to and including 2024R1 allows low-privileged users to execute malicious HTML or JavaScript code via the audio file upload functionality from the Operation Center section. This allows any authenticated user to execute arbitrary JavaScript code on behalf of other users, including the administrators.

CVE ID : CVE-2023-51072
Source : cve@mitre.org
CVSS Score : /

References :
https://www.nagios.com/products/security/#nagios-xi | source : cve@mitre.org


Vulnerability ID : CVE-2023-51820

First published on : 02-02-2024 10:15:08
Last modified on : 02-02-2024 13:36:23

Description :
An issue in Blurams Lumi Security Camera (A31C) v.2.3.38.12558 allows a physically proximate attackers to execute arbitrary code.

CVE ID : CVE-2023-51820
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/roman-mueller/PoC/tree/master/CVE-2023-51820 | source : cve@mitre.org
https://infosec.rm-it.de/2024/02/01/blurams-lumi-security-camera-analysis/ | source : cve@mitre.org


Vulnerability ID : CVE-2024-24388

First published on : 02-02-2024 10:15:08
Last modified on : 02-02-2024 13:36:23

Description :
Cross-site scripting (XSS) vulnerability in XunRuiCMS versions v4.6.2 and before, allows remote attackers to obtain sensitive information via crafted malicious requests to the background login.

CVE ID : CVE-2024-24388
Source : cve@mitre.org
CVSS Score : /

References :
https://www.cnblogs.com/rxtycc/p/17948379 | source : cve@mitre.org


Vulnerability ID : CVE-2023-51838

First published on : 02-02-2024 16:15:53
Last modified on : 02-02-2024 16:30:16

Description :
Ylianst MeshCentral 1.1.16 suffers from Use of a Broken or Risky Cryptographic Algorithm.

CVE ID : CVE-2023-51838
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/Ylianst/MeshCentral/tree/master | source : cve@mitre.org
https://github.com/tianjk99/Cryptographic-Misuses/blob/main/Bug_MeshCentral.md | source : cve@mitre.org
https://github.com/tianjk99/Cryptographic-Misuses/blob/main/CVE-2023-51838.md | source : cve@mitre.org


Vulnerability ID : CVE-2024-22107

First published on : 02-02-2024 16:15:55
Last modified on : 02-02-2024 16:30:16

Description :
An issue was discovered in GTB Central Console 15.17.1-30814.NG. The method systemSettingsDnsDataAction at /opt/webapp/src/AppBundle/Controller/React/SystemSettingsController.php is vulnerable to command injection via the /old/react/v1/api/system/dns/data endpoint. An authenticated attacker can abuse it to inject an arbitrary command and compromise the platform.

CVE ID : CVE-2024-22107
Source : cve@mitre.org
CVSS Score : /

References :
https://adepts.of0x.cc/gtbcc-pwned/ | source : cve@mitre.org
https://x-c3ll.github.io/cves.html | source : cve@mitre.org


Vulnerability ID : CVE-2024-22108

First published on : 02-02-2024 16:15:55
Last modified on : 02-02-2024 16:30:16

Description :
An issue was discovered in GTB Central Console 15.17.1-30814.NG. The method setTermsHashAction at /opt/webapp/lib/PureApi/CCApi.class.php is vulnerable to an unauthenticated SQL injection via /ccapi.php that an attacker can abuse in order to change the Administrator password to a known value.

CVE ID : CVE-2024-22108
Source : cve@mitre.org
CVSS Score : /

References :
https://adepts.of0x.cc/gtbcc-pwned/ | source : cve@mitre.org
https://x-c3ll.github.io/cves.html | source : cve@mitre.org


Vulnerability ID : CVE-2024-24029

First published on : 02-02-2024 16:15:55
Last modified on : 02-02-2024 16:30:16

Description :
JFinalCMS 5.0.0 is vulnerable to SQL injection via /admin/content/data.

CVE ID : CVE-2024-24029
Source : cve@mitre.org
CVSS Score : /

References :
https://gitee.com/heyewei/JFinalcms/issues/I8VE52 | source : cve@mitre.org


Vulnerability ID : CVE-2024-24160

First published on : 02-02-2024 16:15:55
Last modified on : 02-02-2024 16:30:16

Description :
MRCMS 3.0 contains a Cross-Site Scripting (XSS) vulnerability via /admin/system/saveinfo.do.

CVE ID : CVE-2024-24160
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/wy876/cve/issues/1 | source : cve@mitre.org


Vulnerability ID : CVE-2024-24161

First published on : 02-02-2024 16:15:55
Last modified on : 02-02-2024 16:30:16

Description :
MRCMS 3.0 contains an Arbitrary File Read vulnerability in /admin/file/edit.do as the incoming path parameter is not filtered.

CVE ID : CVE-2024-24161
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/wy876/cve/issues/2 | source : cve@mitre.org


Vulnerability ID : CVE-2024-24470

First published on : 02-02-2024 16:15:55
Last modified on : 02-02-2024 16:30:16

Description :
Cross Site Request Forgery vulnerability in flusity-CMS v.2.33 allows a remote attacker to execute arbitrary code via the update_post.php component.

CVE ID : CVE-2024-24470
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/tang-0717/cms/blob/main/1.md | source : cve@mitre.org


Source : linecorp.com

Vulnerability ID : CVE-2024-1143

First published on : 02-02-2024 06:15:45
Last modified on : 02-02-2024 13:36:31

Description :
Central Dogma versions prior to 0.64.0 is vulnerable to Cross-Site Scripting (XSS), which could allow for the leakage of user sessions and subsequent authentication bypass.

CVE ID : CVE-2024-1143
Source : dl_cve@linecorp.com
CVSS Score : /

References :
https://github.com/line/centraldogma/commit/8edcf913b88101aff70008156b0881850e005783 | source : dl_cve@linecorp.com


Source : jpcert.or.jp

Vulnerability ID : CVE-2024-21780

First published on : 02-02-2024 07:15:10
Last modified on : 02-02-2024 13:36:31

Description :
Stack-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. Processing a specially crafted command may result in a denial of service (DoS) condition. Note that the affected products are no longer supported.

CVE ID : CVE-2024-21780
Source : vultures@jpcert.or.jp
CVSS Score : /

References :
https://jvn.jp/en/vu/JVNVU93740658/ | source : vultures@jpcert.or.jp
https://www.au.com/support/service/mobile/guide/wlan/home_spot_cube_2/ | source : vultures@jpcert.or.jp


Vulnerability ID : CVE-2024-23978

First published on : 02-02-2024 07:15:12
Last modified on : 02-02-2024 13:36:31

Description :
Heap-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. By processing invalid values, arbitrary code may be executed. Note that the affected products are no longer supported.

CVE ID : CVE-2024-23978
Source : vultures@jpcert.or.jp
CVSS Score : /

References :
https://jvn.jp/en/vu/JVNVU93740658/ | source : vultures@jpcert.or.jp
https://www.au.com/support/service/mobile/guide/wlan/home_spot_cube_2/ | source : vultures@jpcert.or.jp


Vulnerability ID : CVE-2024-25001

First published on : 02-02-2024 09:15:37
Last modified on : 02-02-2024 09:15:37

Description :
Rejected reason: ** REJECT ** DO NOT USE THIS CVE ID. ConsultIDs: none. Reason: This CVE ID is unused by its CNA. Notes: none.

CVE ID : CVE-2024-25001
Source : vultures@jpcert.or.jp
CVSS Score : /

References :


This website uses the NVD API, but is not approved or certified by it.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! Youโ€™ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.