Latest vulnerabilities of Saturday, October 28, 2023

Latest vulnerabilities of Saturday, October 28, 2023
https://www.securitricks.com/content/images/size/w600/format/webp/2023/12/VULNERABILITIES-REPORTS-LOGO.png
{{titre}}

Last update performed on 10/28/2023 at 11:58:02 PM

(0) CRITICAL VULNERABILITIES [9.0, 10.0]

(2) HIGH VULNERABILITIES [7.0, 8.9]

Source : wordfence.com

Vulnerability ID : CVE-2023-5425

First published on : 28-10-2023 12:15:37
Last modified on : 28-10-2023 12:15:37

Description :
The Post Meta Data Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the pmdm_wp_change_user_meta and pmdm_wp_change_post_meta functions in versions up to, and including, 1.2.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to gain elevated (e.g., administrator) privileges.

CVE ID : CVE-2023-5425
Source : security@wordfence.com
CVSS Score : 8.8

References :
https://plugins.trac.wordpress.org/changeset/2981559/post-meta-data-manager | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/d7f4e710-99a2-49df-a513-725e1daaa18a?source=cve | source : security@wordfence.com

Vulnerability : CWE-862


Vulnerability ID : CVE-2023-5426

First published on : 28-10-2023 12:15:38
Last modified on : 28-10-2023 12:15:38

Description :
The Post Meta Data Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the pmdm_wp_delete_user_meta, pmdm_wp_delete_term_meta, and pmdm_wp_ajax_delete_meta functions in versions up to, and including, 1.2.0. This makes it possible for unauthenticated attackers to delete user, term, and post meta belonging to arbitrary users.

CVE ID : CVE-2023-5426
Source : security@wordfence.com
CVSS Score : 7.5

References :
https://plugins.trac.wordpress.org/changeset/2981559/post-meta-data-manager | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/d6a7f882-4582-4b08-9597-329d140ad782?source=cve | source : security@wordfence.com

Vulnerability : CWE-862


(0) MEDIUM VULNERABILITIES [4.0, 6.9]

(1) LOW VULNERABILITIES [0.1, 3.9]

Source : vuldb.com

Vulnerability ID : CVE-2023-5835

First published on : 28-10-2023 14:15:10
Last modified on : 28-10-2023 14:15:10

Description :
A vulnerability classified as problematic was found in hu60t hu60wap6. Affected by this vulnerability is the function markdown of the file src/class/ubbparser.php. The manipulation leads to cross site scripting. The attack can be launched remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named a1cd9f12d7687243bfcb7ce295665acb83b9174e. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-243775.

CVE ID : CVE-2023-5835
Source : cna@vuldb.com
CVSS Score : 3.5

References :
https://github.com/hu60t/hu60wap6/commit/a1cd9f12d7687243bfcb7ce295665acb83b9174e | source : cna@vuldb.com
https://vuldb.com/?ctiid.243775 | source : cna@vuldb.com
https://vuldb.com/?id.243775 | source : cna@vuldb.com

Vulnerability : CWE-79


(7) NO SCORE VULNERABILITIES [0.0, 0.0]

Source : mitre.org

Vulnerability ID : CVE-2023-43322

First published on : 28-10-2023 01:15:51
Last modified on : 28-10-2023 01:15:51

Description :
ZPE Systems, Inc Nodegrid OS v5.0.0 to v5.0.17, v5.2.0 to v5.2.19, v5.4.0 to v5.4.16, v5.6.0 to v5.6.13, v5.8.0 to v5.8.10, and v5.10.0 to v5.10.3 was discovered to contain a command injection vulnerability via the endpoint /v1/system/toolkit/files/.

CVE ID : CVE-2023-43322
Source : cve@mitre.org
CVSS Score : /

References :
https://psirt.zpesystems.com/portal/en/kb/articles/security-advisory-zpe-ng-2023-001-12-10-2023 | source : cve@mitre.org


Vulnerability ID : CVE-2023-46467

First published on : 28-10-2023 01:15:51
Last modified on : 28-10-2023 01:15:51

Description :
Cross Site Scripting vulnerability in juzawebCMS v.3.4 and before allows a remote attacker to execute arbitrary code via a crafted payload to the username parameter of the registration page.

CVE ID : CVE-2023-46467
Source : cve@mitre.org
CVSS Score : /

References :
https://www.sumor.top/index.php/archives/872/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-46468

First published on : 28-10-2023 01:15:51
Last modified on : 28-10-2023 01:15:51

Description :
An issue in juzawebCMS v.3.4 and before allows a remote attacker to execute arbitrary code via a crafted file to the custom plugin function.

CVE ID : CVE-2023-46468
Source : cve@mitre.org
CVSS Score : /

References :
https://www.sumor.top/index.php/archives/875/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-46569

First published on : 28-10-2023 02:15:07
Last modified on : 28-10-2023 02:15:07

Description :
An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32_fpu function of libr/arch/p/nds32/nds32-dis.h.

CVE ID : CVE-2023-46569
Source : cve@mitre.org
CVSS Score : /

References :
https://gist.github.com/gandalf4a/afeaf8cc958f95876f0ee245b8a002e8 | source : cve@mitre.org
https://github.com/radareorg/radare2/issues/22334 | source : cve@mitre.org


Vulnerability ID : CVE-2023-46570

First published on : 28-10-2023 02:15:07
Last modified on : 28-10-2023 02:15:07

Description :
An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32 function of libr/arch/p/nds32/nds32-dis.h.

CVE ID : CVE-2023-46570
Source : cve@mitre.org
CVSS Score : /

References :
https://gist.github.com/gandalf4a/d7fa58f1b3418ef08ad244acccc10ba6 | source : cve@mitre.org
https://github.com/radareorg/radare2/issues/22333 | source : cve@mitre.org


Vulnerability ID : CVE-2023-45897

First published on : 28-10-2023 21:15:07
Last modified on : 28-10-2023 21:15:07

Description :
exfatprogs before 1.2.2 allows out-of-bounds memory access, such as in read_file_dentry_set.

CVE ID : CVE-2023-45897
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/exfatprogs/exfatprogs/commit/22d0e43e8d24119cbfc6efafabb0dec6517a86c4 | source : cve@mitre.org
https://github.com/exfatprogs/exfatprogs/commit/4abc55e976573991e6a1117bb2b3711e59da07ae | source : cve@mitre.org
https://github.com/exfatprogs/exfatprogs/commit/ec78688e5fb5a70e13df82b4c0da1e6228d3ccdf | source : cve@mitre.org
https://github.com/exfatprogs/exfatprogs/releases/tag/1.2.2 | source : cve@mitre.org


Source : apache.org

Vulnerability ID : CVE-2023-46215

First published on : 28-10-2023 08:15:07
Last modified on : 28-10-2023 15:15:08

Description :
Insertion of Sensitive Information into Log File vulnerability in Apache Airflow Celery provider, Apache Airflow. Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend Note: the vulnerability is about the information exposed in the logs not about accessing the logs. This issue affects Apache Airflow Celery provider: from 3.3.0 through 3.4.0; Apache Airflow: from 1.10.0 through 2.6.3. Users are recommended to upgrade Airflow Celery provider to version 3.4.1 and Apache Airlfow to version 2.7.0 which fixes the issue.

CVE ID : CVE-2023-46215
Source : security@apache.org
CVSS Score : /

References :
http://www.openwall.com/lists/oss-security/2023/10/28/1 | source : security@apache.org
https://github.com/apache/airflow/pull/34954 | source : security@apache.org
https://lists.apache.org/thread/wm1jfmks7r6m7bj0mq4lmw3998svn46n | source : security@apache.org

Vulnerability : CWE-532


This website uses the NVD API, but is not approved or certified by it.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! Youโ€™ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.