Latest vulnerabilities of Tuesday, November 14, 2023

Latest vulnerabilities of Tuesday, November 14, 2023
https://www.securitricks.com/content/images/size/w600/format/webp/2023/12/VULNERABILITIES-REPORTS-LOGO.png
{{titre}}

Last update performed on 11/14/2023 at 11:57:02 PM

(15) CRITICAL VULNERABILITIES [9.0, 10.0]

Source : intel.com

Vulnerability ID : CVE-2023-31273

First published on : 14-11-2023 19:15:24
Last modified on : 14-11-2023 19:30:24

Description :
Protection mechanism failure in some Intel DCM software before version 5.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.

CVE ID : CVE-2023-31273
Source : secure@intel.com
CVSS Score : 10.0

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00902.html | source : secure@intel.com

Vulnerability : CWE-693


Source : fortinet.com

Vulnerability ID : CVE-2023-34991

First published on : 14-11-2023 18:15:30
Last modified on : 14-11-2023 18:51:45

Description :
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.0 through 8.4.2 and 8.3.0 through 8.3.2 and 8.2.2 allows attacker to execute unauthorized code or commands via a crafted http request.

CVE ID : CVE-2023-34991
Source : psirt@fortinet.com
CVSS Score : 9.8

References :
https://fortiguard.com/psirt/FG-IR-23-142 | source : psirt@fortinet.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-36553

First published on : 14-11-2023 18:15:48
Last modified on : 14-11-2023 18:51:33

Description :
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 and 5.0.0 through 5.0.1 and 4.10.0 and 4.9.0 and 4.7.2 allows attacker to execute unauthorized code or commands via crafted API requests.

CVE ID : CVE-2023-36553
Source : psirt@fortinet.com
CVSS Score : 9.8

References :
https://fortiguard.com/psirt/FG-IR-23-135 | source : psirt@fortinet.com

Vulnerability : CWE-78


Source : microsoft.com

Vulnerability ID : CVE-2023-36028

First published on : 14-11-2023 18:15:32
Last modified on : 14-11-2023 18:51:42

Description :
Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability

CVE ID : CVE-2023-36028
Source : secure@microsoft.com
CVSS Score : 9.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36028 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36397

First published on : 14-11-2023 18:15:39
Last modified on : 14-11-2023 18:51:38

Description :
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

CVE ID : CVE-2023-36397
Source : secure@microsoft.com
CVSS Score : 9.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36397 | source : secure@microsoft.com


Source : sap.com

Vulnerability ID : CVE-2023-31403

First published on : 14-11-2023 01:15:07
Last modified on : 14-11-2023 15:15:54

Description :
SAP Business One installation - version 10.0, does not perform proper authentication and authorization checks for SMB shared folder. As a result, any malicious user can read and write to the SMB shared folder. Additionally, the files in the folder can be executed or be used by the installation process leading to considerable impact on confidentiality, integrity and availability.

CVE ID : CVE-2023-31403
Source : cna@sap.com
CVSS Score : 9.6

References :
https://me.sap.com/notes/3355658 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-284


Source : siemens.com

Vulnerability ID : CVE-2023-43504

First published on : 14-11-2023 11:15:11
Last modified on : 14-11-2023 15:15:50

Description :
A vulnerability has been identified in COMOS (All versions < V10.4.4). Ptmcast executable used for testing cache validation service in affected application is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition.

CVE ID : CVE-2023-43504
Source : productcert@siemens.com
CVSS Score : 9.6

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf | source : productcert@siemens.com

Vulnerability : CWE-120


Vulnerability ID : CVE-2023-43505

First published on : 14-11-2023 11:15:11
Last modified on : 14-11-2023 15:15:50

Description :
A vulnerability has been identified in COMOS (All versions). The affected application lacks proper access controls in SMB shares. This could allow an attacker to access files that the user should not have access to.

CVE ID : CVE-2023-43505
Source : productcert@siemens.com
CVSS Score : 9.6

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf | source : productcert@siemens.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-46601

First published on : 14-11-2023 11:15:15
Last modified on : 14-11-2023 15:15:45

Description :
A vulnerability has been identified in COMOS (All versions). The affected application lacks proper access controls in making the SQLServer connection. This could allow an attacker to query the database directly to access information that the user should not have access to.

CVE ID : CVE-2023-46601
Source : productcert@siemens.com
CVSS Score : 9.6

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf | source : productcert@siemens.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-44373

First published on : 14-11-2023 11:15:13
Last modified on : 14-11-2023 15:15:45

Description :
A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323.

CVE ID : CVE-2023-44373
Source : productcert@siemens.com
CVSS Score : 9.1

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | source : productcert@siemens.com

Vulnerability : CWE-74


Source : cisco.com

Vulnerability ID : CVE-2023-25181

First published on : 14-11-2023 10:15:26
Last modified on : 14-11-2023 18:15:28

Description :
A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted set of network packets can lead to arbitrary code execution. An attacker can send a malicious packet to trigger this vulnerability.

CVE ID : CVE-2023-25181
Source : talos-cna@cisco.com
CVSS Score : 9.0

References :
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1726 | source : talos-cna@cisco.com

Vulnerability : CWE-122


Vulnerability ID : CVE-2023-27882

First published on : 14-11-2023 10:15:27
Last modified on : 14-11-2023 18:15:28

Description :
A heap-based buffer overflow vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.

CVE ID : CVE-2023-27882
Source : talos-cna@cisco.com
CVSS Score : 9.0

References :
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1733 | source : talos-cna@cisco.com

Vulnerability : CWE-122


Vulnerability ID : CVE-2023-28379

First published on : 14-11-2023 10:15:27
Last modified on : 14-11-2023 18:15:29

Description :
A memory corruption vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.

CVE ID : CVE-2023-28379
Source : talos-cna@cisco.com
CVSS Score : 9.0

References :
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1738 | source : talos-cna@cisco.com

Vulnerability : CWE-119


Vulnerability ID : CVE-2023-28391

First published on : 14-11-2023 10:15:27
Last modified on : 14-11-2023 18:15:30

Description :
A memory corruption vulnerability exists in the HTTP Server header parsing functionality of Weston Embedded uC-HTTP v3.01.01. Specially crafted network packets can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.

CVE ID : CVE-2023-28391
Source : talos-cna@cisco.com
CVSS Score : 9.0

References :
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1732 | source : talos-cna@cisco.com

Vulnerability : CWE-119


Vulnerability ID : CVE-2023-31247

First published on : 14-11-2023 10:15:28
Last modified on : 14-11-2023 15:15:50

Description :
A memory corruption vulnerability exists in the HTTP Server Host header parsing functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.

CVE ID : CVE-2023-31247
Source : talos-cna@cisco.com
CVSS Score : 9.0

References :
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1746 | source : talos-cna@cisco.com

Vulnerability : CWE-119


(96) HIGH VULNERABILITIES [7.0, 8.9]

Source : microsoft.com

Vulnerability ID : CVE-2023-36017

First published on : 14-11-2023 18:15:31
Last modified on : 14-11-2023 18:51:42

Description :
Windows Scripting Engine Memory Corruption Vulnerability

CVE ID : CVE-2023-36017
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36017 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36025

First published on : 14-11-2023 18:15:31
Last modified on : 14-11-2023 18:51:42

Description :
Windows SmartScreen Security Feature Bypass Vulnerability

CVE ID : CVE-2023-36025
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36025 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36400

First published on : 14-11-2023 18:15:40
Last modified on : 14-11-2023 18:51:38

Description :
Windows HMAC Key Derivation Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36400
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36400 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36402

First published on : 14-11-2023 18:15:41
Last modified on : 14-11-2023 18:51:38

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2023-36402
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36402 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36560

First published on : 14-11-2023 18:15:48
Last modified on : 14-11-2023 18:51:33

Description :
ASP.NET Security Feature Bypass Vulnerability

CVE ID : CVE-2023-36560
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36560 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-38151

First published on : 14-11-2023 18:15:51
Last modified on : 14-11-2023 18:51:33

Description :
Microsoft Host Integration Server 2020 Remote Code Execution Vulnerability

CVE ID : CVE-2023-38151
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38151 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36437

First published on : 14-11-2023 21:15:10
Last modified on : 14-11-2023 21:38:02

Description :
Azure DevOps Server Remote Code Execution Vulnerability

CVE ID : CVE-2023-36437
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36437 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36052

First published on : 14-11-2023 18:15:36
Last modified on : 14-11-2023 18:51:42

Description :
Azure CLI REST Command Information Disclosure Vulnerability

CVE ID : CVE-2023-36052
Source : secure@microsoft.com
CVSS Score : 8.6

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36052 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36719

First published on : 14-11-2023 18:15:50
Last modified on : 14-11-2023 18:51:33

Description :
Microsoft Speech Application Programming Interface (SAPI) Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36719
Source : secure@microsoft.com
CVSS Score : 8.4

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36719 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36038

First published on : 14-11-2023 22:15:28
Last modified on : 14-11-2023 22:15:28

Description :
ASP.NET Core Denial of Service Vulnerability

CVE ID : CVE-2023-36038
Source : secure@microsoft.com
CVSS Score : 8.2

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36038 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36021

First published on : 14-11-2023 18:15:31
Last modified on : 14-11-2023 18:51:42

Description :
Microsoft On-Prem Data Gateway Security Feature Bypass Vulnerability

CVE ID : CVE-2023-36021
Source : secure@microsoft.com
CVSS Score : 8.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36021 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36035

First published on : 14-11-2023 18:15:32
Last modified on : 14-11-2023 18:51:42

Description :
Microsoft Exchange Server Spoofing Vulnerability

CVE ID : CVE-2023-36035
Source : secure@microsoft.com
CVSS Score : 8.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36035 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36039

First published on : 14-11-2023 18:15:33
Last modified on : 14-11-2023 18:51:42

Description :
Microsoft Exchange Server Spoofing Vulnerability

CVE ID : CVE-2023-36039
Source : secure@microsoft.com
CVSS Score : 8.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36039 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36050

First published on : 14-11-2023 18:15:36
Last modified on : 14-11-2023 18:51:42

Description :
Microsoft Exchange Server Spoofing Vulnerability

CVE ID : CVE-2023-36050
Source : secure@microsoft.com
CVSS Score : 8.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36050 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36425

First published on : 14-11-2023 18:15:46
Last modified on : 14-11-2023 18:51:33

Description :
Windows Distributed File System (DFS) Remote Code Execution Vulnerability

CVE ID : CVE-2023-36425
Source : secure@microsoft.com
CVSS Score : 8.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36425 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36439

First published on : 14-11-2023 18:15:47
Last modified on : 14-11-2023 18:51:33

Description :
Microsoft Exchange Server Remote Code Execution Vulnerability

CVE ID : CVE-2023-36439
Source : secure@microsoft.com
CVSS Score : 8.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36439 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36018

First published on : 14-11-2023 18:15:31
Last modified on : 14-11-2023 18:51:42

Description :
Visual Studio Code Jupyter Extension Spoofing Vulnerability

CVE ID : CVE-2023-36018
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36018 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36033

First published on : 14-11-2023 18:15:32
Last modified on : 14-11-2023 18:51:42

Description :
Windows DWM Core Library Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36033
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36033 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36036

First published on : 14-11-2023 18:15:33
Last modified on : 14-11-2023 18:51:42

Description :
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36036
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36036 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36037

First published on : 14-11-2023 18:15:33
Last modified on : 14-11-2023 18:51:42

Description :
Microsoft Excel Security Feature Bypass Vulnerability

CVE ID : CVE-2023-36037
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36037 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36041

First published on : 14-11-2023 18:15:34
Last modified on : 14-11-2023 18:51:42

Description :
Microsoft Excel Remote Code Execution Vulnerability

CVE ID : CVE-2023-36041
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36041 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36045

First published on : 14-11-2023 18:15:35
Last modified on : 14-11-2023 18:51:42

Description :
Microsoft Office Graphics Remote Code Execution Vulnerability

CVE ID : CVE-2023-36045
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36045 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36047

First published on : 14-11-2023 18:15:36
Last modified on : 14-11-2023 18:51:42

Description :
Windows Authentication Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36047
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36047 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36393

First published on : 14-11-2023 18:15:37
Last modified on : 14-11-2023 18:51:38

Description :
Windows User Interface Application Core Remote Code Execution Vulnerability

CVE ID : CVE-2023-36393
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36393 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36396

First published on : 14-11-2023 18:15:39
Last modified on : 14-11-2023 18:51:38

Description :
Windows Compressed Folder Remote Code Execution Vulnerability

CVE ID : CVE-2023-36396
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36396 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36407

First published on : 14-11-2023 18:15:43
Last modified on : 14-11-2023 18:51:38

Description :
Windows Hyper-V Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36407
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36407 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36408

First published on : 14-11-2023 18:15:43
Last modified on : 14-11-2023 18:51:38

Description :
Windows Hyper-V Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36408
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36408 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36422

First published on : 14-11-2023 18:15:45
Last modified on : 14-11-2023 18:51:38

Description :
Microsoft Windows Defender Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36422
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36422 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36424

First published on : 14-11-2023 18:15:45
Last modified on : 14-11-2023 18:51:33

Description :
Windows Common Log File System Driver Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36424
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36424 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36705

First published on : 14-11-2023 18:15:50
Last modified on : 14-11-2023 18:51:33

Description :
Windows Installer Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36705
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36705 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36031

First published on : 14-11-2023 18:15:32
Last modified on : 14-11-2023 18:51:42

Description :
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

CVE ID : CVE-2023-36031
Source : secure@microsoft.com
CVSS Score : 7.6

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36031 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36410

First published on : 14-11-2023 18:15:44
Last modified on : 14-11-2023 18:51:38

Description :
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

CVE ID : CVE-2023-36410
Source : secure@microsoft.com
CVSS Score : 7.6

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36410 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36007

First published on : 14-11-2023 21:15:09
Last modified on : 14-11-2023 21:38:02

Description :
Microsoft Send Customer Voice survey from Dynamics 365 Spoofing Vulnerability

CVE ID : CVE-2023-36007
Source : secure@microsoft.com
CVSS Score : 7.6

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36007 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36049

First published on : 14-11-2023 21:15:10
Last modified on : 14-11-2023 21:38:02

Description :
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36049
Source : secure@microsoft.com
CVSS Score : 7.6

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36049 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36392

First published on : 14-11-2023 18:15:37
Last modified on : 14-11-2023 18:51:38

Description :
DHCP Server Service Denial of Service Vulnerability

CVE ID : CVE-2023-36392
Source : secure@microsoft.com
CVSS Score : 7.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36392 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36395

First published on : 14-11-2023 18:15:38
Last modified on : 14-11-2023 18:51:38

Description :
Windows Deployment Services Denial of Service Vulnerability

CVE ID : CVE-2023-36395
Source : secure@microsoft.com
CVSS Score : 7.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36395 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36401

First published on : 14-11-2023 18:15:41
Last modified on : 14-11-2023 18:51:38

Description :
Microsoft Remote Registry Service Remote Code Execution Vulnerability

CVE ID : CVE-2023-36401
Source : secure@microsoft.com
CVSS Score : 7.2

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36401 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36423

First published on : 14-11-2023 18:15:45
Last modified on : 14-11-2023 18:51:33

Description :
Microsoft Remote Registry Service Remote Code Execution Vulnerability

CVE ID : CVE-2023-36423
Source : secure@microsoft.com
CVSS Score : 7.2

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36423 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36046

First published on : 14-11-2023 18:15:35
Last modified on : 14-11-2023 18:51:42

Description :
Windows Authentication Denial of Service Vulnerability

CVE ID : CVE-2023-36046
Source : secure@microsoft.com
CVSS Score : 7.1

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36046 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36399

First published on : 14-11-2023 18:15:40
Last modified on : 14-11-2023 18:51:38

Description :
Windows Storage Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36399
Source : secure@microsoft.com
CVSS Score : 7.1

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36399 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36394

First published on : 14-11-2023 18:15:38
Last modified on : 14-11-2023 18:51:38

Description :
Windows Search Service Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36394
Source : secure@microsoft.com
CVSS Score : 7.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36394 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36403

First published on : 14-11-2023 18:15:41
Last modified on : 14-11-2023 18:51:38

Description :
Windows Kernel Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36403
Source : secure@microsoft.com
CVSS Score : 7.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36403 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36405

First published on : 14-11-2023 18:15:42
Last modified on : 14-11-2023 18:51:38

Description :
Windows Kernel Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36405
Source : secure@microsoft.com
CVSS Score : 7.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36405 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36427

First published on : 14-11-2023 18:15:46
Last modified on : 14-11-2023 18:51:33

Description :
Windows Hyper-V Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36427
Source : secure@microsoft.com
CVSS Score : 7.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36427 | source : secure@microsoft.com


Source : intel.com

Vulnerability ID : CVE-2023-23583

First published on : 14-11-2023 19:15:18
Last modified on : 14-11-2023 21:15:08

Description :
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.

CVE ID : CVE-2023-23583
Source : secure@intel.com
CVSS Score : 8.8

References :
http://www.openwall.com/lists/oss-security/2023/11/14/4 | source : secure@intel.com
http://www.openwall.com/lists/oss-security/2023/11/14/5 | source : secure@intel.com
http://www.openwall.com/lists/oss-security/2023/11/14/6 | source : secure@intel.com
http://www.openwall.com/lists/oss-security/2023/11/14/7 | source : secure@intel.com
http://www.openwall.com/lists/oss-security/2023/11/14/8 | source : secure@intel.com
http://www.openwall.com/lists/oss-security/2023/11/14/9 | source : secure@intel.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html | source : secure@intel.com

Vulnerability : CWE-1281


Vulnerability ID : CVE-2023-28737

First published on : 14-11-2023 19:15:23
Last modified on : 14-11-2023 19:30:27

Description :
Improper initialization in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-28737
Source : secure@intel.com
CVSS Score : 8.8

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-665


Vulnerability ID : CVE-2023-32204

First published on : 14-11-2023 19:15:25
Last modified on : 14-11-2023 19:30:24

Description :
Improper access control in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-32204
Source : secure@intel.com
CVSS Score : 8.8

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00900.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-29157

First published on : 14-11-2023 19:15:23
Last modified on : 14-11-2023 19:30:27

Description :
Improper access control in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-29157
Source : secure@intel.com
CVSS Score : 8.4

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00900.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2022-33945

First published on : 14-11-2023 19:15:11
Last modified on : 14-11-2023 19:30:41

Description :
Improper input validation in some Intel(R) Server board and Intel(R) Server System BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2022-33945
Source : secure@intel.com
CVSS Score : 8.2

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html | source : secure@intel.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2022-36396

First published on : 14-11-2023 19:15:12
Last modified on : 14-11-2023 19:30:41

Description :
Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools before version iDmiEdit-Linux-5.27.06.0017 may allow a privileged user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2022-36396
Source : secure@intel.com
CVSS Score : 8.2

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-34431

First published on : 14-11-2023 19:15:28
Last modified on : 14-11-2023 19:30:20

Description :
Improper input validation in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access

CVE ID : CVE-2023-34431
Source : secure@intel.com
CVSS Score : 8.2

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html | source : secure@intel.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2022-29262

First published on : 14-11-2023 19:15:11
Last modified on : 14-11-2023 19:30:41

Description :
Improper buffer restrictions in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2022-29262
Source : secure@intel.com
CVSS Score : 7.9

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html | source : secure@intel.com

Vulnerability : CWE-92


Vulnerability ID : CVE-2023-28741

First published on : 14-11-2023 19:15:23
Last modified on : 14-11-2023 19:30:27

Description :
Buffer overflow in some Intel(R) QAT drivers for Windows - HW Version 1.0 before version 1.10 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-28741
Source : secure@intel.com
CVSS Score : 7.9

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00861.html | source : secure@intel.com

Vulnerability : CWE-120


Vulnerability ID : CVE-2023-28397

First published on : 14-11-2023 19:15:22
Last modified on : 14-11-2023 19:30:27

Description :
Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated to potentially enable escalation of privileges via local access.

CVE ID : CVE-2023-28397
Source : secure@intel.com
CVSS Score : 7.8

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2022-24379

First published on : 14-11-2023 19:15:10
Last modified on : 14-11-2023 19:30:41

Description :
Improper input validation in some Intel(R) Server System M70KLP Family BIOS firmware before version 01.04.0029 may allow a privileged user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2022-24379
Source : secure@intel.com
CVSS Score : 7.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html | source : secure@intel.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2022-29510

First published on : 14-11-2023 19:15:11
Last modified on : 14-11-2023 19:30:41

Description :
Improper buffer restrictions in some Intel(R) Server Board M10JNP2SB BIOS firmware before version 7.219 may allow a privileged user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2022-29510
Source : secure@intel.com
CVSS Score : 7.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html | source : secure@intel.com

Vulnerability : CWE-92


Vulnerability ID : CVE-2022-36374

First published on : 14-11-2023 19:15:12
Last modified on : 14-11-2023 19:30:41

Description :
Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools before version iDmi Windows 5.27.03.0003 may allow a privileged user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2022-36374
Source : secure@intel.com
CVSS Score : 7.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-22285

First published on : 14-11-2023 19:15:16
Last modified on : 14-11-2023 19:30:36

Description :
Improper access control for some Intel Unison software may allow an unauthenticated user to potentially enable denial of service via network access.

CVE ID : CVE-2023-22285
Source : secure@intel.com
CVSS Score : 7.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-22337

First published on : 14-11-2023 19:15:17
Last modified on : 14-11-2023 19:30:32

Description :
Improper input validation for some Intel Unison software may allow an unauthenticated user to potentially enable denial of service via network access.

CVE ID : CVE-2023-22337
Source : secure@intel.com
CVSS Score : 7.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2023-32279

First published on : 14-11-2023 19:15:25
Last modified on : 14-11-2023 19:30:24

Description :
Improper access control in user mode driver for some Intel(R) Connectivity Performance Suite before version 2.1123.214.2 may allow unauthenticated user to potentially enable information disclosure via network access.

CVE ID : CVE-2023-32279
Source : secure@intel.com
CVSS Score : 7.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00944.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2022-41689

First published on : 14-11-2023 19:15:13
Last modified on : 14-11-2023 19:30:41

Description :
Improper access control in some Intel In-Band Manageability software before version 3.0.14 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2022-41689
Source : secure@intel.com
CVSS Score : 7.3

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00968.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-22292

First published on : 14-11-2023 19:15:16
Last modified on : 14-11-2023 19:30:36

Description :
Uncaught exception for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-22292
Source : secure@intel.com
CVSS Score : 7.3

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-248


Vulnerability ID : CVE-2023-24592

First published on : 14-11-2023 19:15:18
Last modified on : 14-11-2023 19:30:32

Description :
Path traversal in the some Intel(R) oneAPI Toolkits and Component software before version 2023.1 may allow authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-24592
Source : secure@intel.com
CVSS Score : 7.3

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html | source : secure@intel.com

Vulnerability : CWE-22


Vulnerability ID : CVE-2023-32641

First published on : 14-11-2023 19:15:26
Last modified on : 14-11-2023 19:30:24

Description :
Improper input validation in firmware for Intel(R) QAT before version QAT20.L.1.0.40-00004 may allow escalation of privilege and denial of service via adjacent access.

CVE ID : CVE-2023-32641
Source : secure@intel.com
CVSS Score : 7.3

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00945.html | source : secure@intel.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2023-36860

First published on : 14-11-2023 19:15:28
Last modified on : 14-11-2023 19:30:20

Description :
Improper input validation for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via network access.

CVE ID : CVE-2023-36860
Source : secure@intel.com
CVSS Score : 7.1

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-20


Source : github.com

Vulnerability ID : CVE-2023-48217

First published on : 14-11-2023 22:15:31
Last modified on : 14-11-2023 22:15:31

Description :
Statamic is a flat-first, Laravel + Git powered CMS designed for building websites. In affected versions certain additional PHP files crafted to look like images may be uploaded regardless of mime type validation rules. This affects front-end forms using the "Forms" feature, and asset upload fields in the control panel. Malicious users could leverage this vulnerability to upload and execute code. This issue has been patched in versions 3.4.14 and 4.34.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-48217
Source : security-advisories@github.com
CVSS Score : 8.8

References :
https://github.com/statamic/cms/commit/4c6fe041e2203a8033e5949ce4a5d9d6c0ad2411 | source : security-advisories@github.com
https://github.com/statamic/cms/security/advisories/GHSA-2r53-9295-3m86 | source : security-advisories@github.com

Vulnerability : CWE-94


Vulnerability ID : CVE-2023-47130

First published on : 14-11-2023 21:15:11
Last modified on : 14-11-2023 21:38:02

Description :
Yii is an open source PHP web framework. yiisoft/yii before version 1.1.29 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. An attacker may leverage this vulnerability to compromise the host system. A fix has been developed for the 1.1.29 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-47130
Source : security-advisories@github.com
CVSS Score : 8.1

References :
https://github.com/yiisoft/yii/commit/37142be4dc5831114a375392e86d6450d4951c06 | source : security-advisories@github.com
https://github.com/yiisoft/yii/security/advisories/GHSA-mw2w-2hj2-fg8q | source : security-advisories@github.com
https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection | source : security-advisories@github.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2023-47631

First published on : 14-11-2023 21:15:13
Last modified on : 14-11-2023 21:38:02

Description :
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federated Learning (FL) and Multi-Party Computation (MPC). In affected versions a node does not check if an image is allowed to run if a `parent_id` is set. A malicious party that breaches the server may modify it to set a fake `parent_id` and send a task of a non-whitelisted algorithm. The node will then execute it because the `parent_id` that is set prevents checks from being run. This impacts all servers that are breached by an expert user. This vulnerability has been patched in version 4.1.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-47631
Source : security-advisories@github.com
CVSS Score : 7.2

References :
https://github.com/vantage6/vantage6/blob/version/4.1.1/vantage6-node/vantage6/node/docker/docker_manager.py#L265-L268 | source : security-advisories@github.com
https://github.com/vantage6/vantage6/commit/bf83521eb12fa80aa5fc92ef1692010a9a7f8243 | source : security-advisories@github.com
https://github.com/vantage6/vantage6/security/advisories/GHSA-vc3v-ppc7-v486 | source : security-advisories@github.com

Vulnerability : CWE-345


Vulnerability ID : CVE-2023-47629

First published on : 14-11-2023 01:15:08
Last modified on : 14-11-2023 15:15:54

Description :
DataHub is an open-source metadata platform. In affected versions sign-up through an invite link does not properly restrict users from signing up as privileged accounts. If a user is given an email sign-up link they can potentially create an admin account given certain preconditions. If the default datahub user has been removed, then the user can sign up for an account that leverages the default policies giving admin privileges to the datahub user. All DataHub instances prior to the patch that have removed the datahub user, but not the default policies applying to that user are affected. Users are advised to update to version 0.12.1 which addresses the issue. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-47629
Source : security-advisories@github.com
CVSS Score : 7.1

References :
https://github.com/datahub-project/datahub/security/advisories/GHSA-vj59-23ww-p6c8 | source : security-advisories@github.com

Vulnerability : CWE-269


Vulnerability ID : CVE-2023-46132

First published on : 14-11-2023 21:15:11
Last modified on : 14-11-2023 21:38:02

Description :
Hyperledger Fabric is an open source permissioned distributed ledger framework. Combining two molecules to one another, called "cross-linking" results in a molecule with a chemical formula that is composed of all atoms of the original two molecules. In Fabric, one can take a block of transactions and cross-link the transactions in a way that alters the way the peers parse the transactions. If a first peer receives a block B and a second peer receives a block identical to B but with the transactions being cross-linked, the second peer will parse transactions in a different way and thus its world state will deviate from the first peer. Orderers or peers cannot detect that a block has its transactions cross-linked, because there is a vulnerability in the way Fabric hashes the transactions of blocks. It simply and naively concatenates them, which is insecure and lets an adversary craft a "cross-linked block" (block with cross-linked transactions) which alters the way peers process transactions. For example, it is possible to select a transaction and manipulate a peer to completely avoid processing it, without changing the computed hash of the block. Additional validations have been added in v2.2.14 and v2.5.5 to detect potential cross-linking issues before processing blocks. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-46132
Source : security-advisories@github.com
CVSS Score : 7.1

References :
https://github.com/hyperledger/fabric/security/advisories/GHSA-v9w2-543f-h69m | source : security-advisories@github.com

Vulnerability : CWE-362


Vulnerability ID : CVE-2023-47630

First published on : 14-11-2023 21:15:13
Last modified on : 14-11-2023 21:38:02

Description :
Kyverno is a policy engine designed for Kubernetes. An issue was found in Kyverno that allowed an attacker to control the digest of images used by Kyverno users. The issue would require the attacker to compromise the registry that the Kyverno users fetch their images from. The attacker could then return an vulnerable image to the the user and leverage that to further escalate their position. As such, the attacker would need to know which images the Kyverno user consumes and know of one of multiple exploitable vulnerabilities in previous digests of the images. Alternatively, if the attacker has compromised the registry, they could craft a malicious image with a different digest with intentionally placed vulnerabilities and deliver the image to the user. Users pulling their images by digests and from trusted registries are not impacted by this vulnerability. There is no evidence of this being exploited in the wild. The issue has been patched in 1.10.5. All users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-47630
Source : security-advisories@github.com
CVSS Score : 7.1

References :
https://github.com/kyverno/kyverno/security/advisories/GHSA-3hfq-cx9j-923w | source : security-advisories@github.com

Vulnerability : CWE-345


Source : tibco.com

Vulnerability ID : CVE-2023-26222

First published on : 14-11-2023 20:15:07
Last modified on : 14-11-2023 21:38:09

Description :
The Web Application component of TIBCO Software Inc.'s TIBCO EBX and TIBCO Product and Service Catalog powered by TIBCO EBX contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a stored XSS on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO EBX: versions 5.9.22 and below, versions 6.0.13 and below and TIBCO Product and Service Catalog powered by TIBCO EBX: versions 5.0.0 and below.

CVE ID : CVE-2023-26222
Source : security@tibco.com
CVSS Score : 8.7

References :
https://www.tibco.com/services/support/advisories | source : security@tibco.com


Source : fortinet.com

Vulnerability ID : CVE-2023-26205

First published on : 14-11-2023 18:15:28
Last modified on : 14-11-2023 18:51:45

Description :
An improper access control vulnerability [CWE-284] in FortiADC automation feature 7.1.0 through 7.1.2, 7.0 all versions, 6.2 all versions, 6.1 all versions may allow an authenticated low-privileged attacker to escalate their privileges to super_admin via a specific crafted configuration of fabric automation CLI script.

CVE ID : CVE-2023-26205
Source : psirt@fortinet.com
CVSS Score : 8.1

References :
https://fortiguard.com/psirt/FG-IR-22-292 | source : psirt@fortinet.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-41840

First published on : 14-11-2023 18:15:53
Last modified on : 14-11-2023 18:51:33

Description :
A untrusted search path vulnerability in Fortinet FortiClientWindows 7.0.9 allows an attacker to perform a DLL Hijack attack via a malicious OpenSSL engine library in the search path.

CVE ID : CVE-2023-41840
Source : psirt@fortinet.com
CVSS Score : 7.8

References :
https://fortiguard.com/psirt/FG-IR-23-274 | source : psirt@fortinet.com

Vulnerability : CWE-426


Vulnerability ID : CVE-2023-42783

First published on : 14-11-2023 18:15:53
Last modified on : 14-11-2023 18:51:33

Description :
A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.2 through 8.4.0 and 8.3.2 through 8.3.0 and 8.2.2 allows attacker to read arbitrary files via crafted http requests.

CVE ID : CVE-2023-42783
Source : psirt@fortinet.com
CVSS Score : 7.5

References :
https://fortiguard.com/psirt/FG-IR-23-143 | source : psirt@fortinet.com

Vulnerability : CWE-23


Vulnerability ID : CVE-2022-40681

First published on : 14-11-2023 19:15:12
Last modified on : 14-11-2023 19:30:41

Description :
A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to cause denial of service via sending a crafted request to a specific named pipe.

CVE ID : CVE-2022-40681
Source : psirt@fortinet.com
CVSS Score : 7.1

References :
https://fortiguard.com/psirt/FG-IR-22-299 | source : psirt@fortinet.com

Vulnerability : CWE-863


Source : siemens.com

Vulnerability ID : CVE-2023-46098

First published on : 14-11-2023 11:15:14
Last modified on : 14-11-2023 15:15:45

Description :
A vulnerability has been identified in SIMATIC PCS neo (All versions < V4.1). When accessing the Information Server from affected products, the products use an overly permissive CORS policy. This could allow an attacker to trick a legitimate user to trigger unwanted behavior.

CVE ID : CVE-2023-46098
Source : productcert@siemens.com
CVSS Score : 8.0

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-456933.pdf | source : productcert@siemens.com

Vulnerability : CWE-942


Vulnerability ID : CVE-2023-46590

First published on : 14-11-2023 11:15:15
Last modified on : 14-11-2023 15:15:45

Description :
A vulnerability has been identified in Siemens OPC UA Modelling Editor (SiOME) (All versions < V2.8). Affected products suffer from a XML external entity (XXE) injection vulnerability. This vulnerability could allow an attacker to interfere with an application's processing of XML data and read arbitrary files in the system.

CVE ID : CVE-2023-46590
Source : productcert@siemens.com
CVSS Score : 7.5

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-197270.pdf | source : productcert@siemens.com

Vulnerability : CWE-611


Vulnerability ID : CVE-2023-44317

First published on : 14-11-2023 11:15:12
Last modified on : 14-11-2023 15:15:45

Description :
A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected products do not properly validate the content of uploaded X509 certificates which could allow an attacker with administrative privileges to execute arbitrary code on the device.

CVE ID : CVE-2023-44317
Source : productcert@siemens.com
CVSS Score : 7.2

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | source : productcert@siemens.com

Vulnerability : CWE-349


Source : google.com

Vulnerability ID : CVE-2023-6111

First published on : 14-11-2023 14:15:29
Last modified on : 14-11-2023 15:15:45

Description :
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_trans_gc_catchall did not remove the catchall set element from the catchall_list when the argument sync is true, making it possible to free a catchall set element many times. We recommend upgrading past commit 93995bf4af2c5a99e2a87f0cd5ce547d31eb7630.

CVE ID : CVE-2023-6111
Source : cve-coordination@google.com
CVSS Score : 7.8

References :
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93995bf4af2c5a99e2a87f0cd5ce547d31eb7630 | source : cve-coordination@google.com
https://kernel.dance/93995bf4af2c5a99e2a87f0cd5ce547d31eb7630 | source : cve-coordination@google.com

Vulnerability : CWE-416


Source : cisco.com

Vulnerability ID : CVE-2023-24585

First published on : 14-11-2023 10:15:26
Last modified on : 14-11-2023 18:15:27

Description :
An out-of-bounds write vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.

CVE ID : CVE-2023-24585
Source : talos-cna@cisco.com
CVSS Score : 7.7

References :
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1725 | source : talos-cna@cisco.com

Vulnerability : CWE-119


Source : huntr.dev

Vulnerability ID : CVE-2023-6130

First published on : 14-11-2023 17:15:08
Last modified on : 14-11-2023 18:04:30

Description :
Path Traversal: '\..\filename' in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.

CVE ID : CVE-2023-6130
Source : security@huntr.dev
CVSS Score : 7.5

References :
https://github.com/salesagility/suitecrm/commit/54bc56c3bd9f1db75408db1c1d7d652c3f5f71e9 | source : security@huntr.dev
https://huntr.com/bounties/22a27be9-f016-4daf-9887-c77eb3e1dc74 | source : security@huntr.dev

Vulnerability : CWE-29


Vulnerability ID : CVE-2023-6131

First published on : 14-11-2023 17:15:08
Last modified on : 14-11-2023 18:04:30

Description :
Code Injection in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.

CVE ID : CVE-2023-6131
Source : security@huntr.dev
CVSS Score : 7.2

References :
https://github.com/salesagility/suitecrm/commit/54bc56c3bd9f1db75408db1c1d7d652c3f5f71e9 | source : security@huntr.dev
https://huntr.com/bounties/5fa50b25-f6b1-408c-99df-4442c86c563f | source : security@huntr.dev

Vulnerability : CWE-94


Source : ami.com

Vulnerability ID : CVE-2023-39535

First published on : 14-11-2023 22:15:29
Last modified on : 14-11-2023 22:15:29

Description :
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.

CVE ID : CVE-2023-39535
Source : biossecurity@ami.com
CVSS Score : 7.5

References :
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023008.pdf | source : biossecurity@ami.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2023-39536

First published on : 14-11-2023 22:15:29
Last modified on : 14-11-2023 22:15:29

Description :
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.

CVE ID : CVE-2023-39536
Source : biossecurity@ami.com
CVSS Score : 7.5

References :
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023008.pdf | source : biossecurity@ami.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2023-39537

First published on : 14-11-2023 22:15:29
Last modified on : 14-11-2023 22:15:29

Description :
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.

CVE ID : CVE-2023-39537
Source : biossecurity@ami.com
CVSS Score : 7.5

References :
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023008.pdf | source : biossecurity@ami.com

Vulnerability : CWE-20


Source : liggitt.net

Vulnerability ID : CVE-2023-5528

First published on : 14-11-2023 21:15:14
Last modified on : 14-11-2023 21:38:02

Description :
A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.

CVE ID : CVE-2023-5528
Source : jordan@liggitt.net
CVSS Score : 7.2

References :
https://github.com/kubernetes/kubernetes/issues/121879 | source : jordan@liggitt.net
https://groups.google.com/g/kubernetes-security-announce/c/SL_d4NR8pzA | source : jordan@liggitt.net

Vulnerability : CWE-20


Source : patchstack.com

Vulnerability ID : CVE-2023-47665

First published on : 14-11-2023 00:15:07
Last modified on : 14-11-2023 15:15:54

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in edward_plainview Plainview Protect Passwords plugin <= 1.4 versions.

CVE ID : CVE-2023-47665
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/plainview-protect-passwords/wordpress-plainview-protect-passwords-plugin-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47673

First published on : 14-11-2023 00:15:08
Last modified on : 14-11-2023 15:15:54

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Stefano Ottolenghi Post Pay Counter plugin <= 2.789 versions.

CVE ID : CVE-2023-47673
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/post-pay-counter/wordpress-post-pay-counter-plugin-2-789-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47684

First published on : 14-11-2023 00:15:08
Last modified on : 14-11-2023 15:15:54

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ThemePunch OHG Essential Grid plugin <= 3.1.0 versions.

CVE ID : CVE-2023-47684
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/essential-grid/wordpress-essential-grid-plugin-3-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47550

First published on : 14-11-2023 20:15:08
Last modified on : 14-11-2023 21:38:09

Description :
Cross-Site Request Forgery (CSRF) vulnerability in RedNao Donations Made Easy โ€“ Smart Donations allows Stored XSS.This issue affects Donations Made Easy โ€“ Smart Donations: from n/a through 4.0.12.

CVE ID : CVE-2023-47550
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/smart-donations/wordpress-donations-made-easy-smart-donations-plugin-4-0-12-cross-site-scripting-xss-vulnerability-2?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-47544

First published on : 14-11-2023 21:15:11
Last modified on : 14-11-2023 21:38:02

Description :
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Atarim Visual Website Collaboration, Feedback & Project Management โ€“ Atarim plugin <= 3.12 versions.

CVE ID : CVE-2023-47544
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/atarim-visual-collaboration/wordpress-atarim-plugin-3-11-unauthenticated-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47547

First published on : 14-11-2023 21:15:12
Last modified on : 14-11-2023 21:38:02

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPFactory Products, Order & Customers Export for WooCommerce plugin <= 2.0.7 versions.

CVE ID : CVE-2023-47547
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/export-woocommerce/wordpress-products-order-customers-export-for-woocommerce-plugin-2-0-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47520

First published on : 14-11-2023 22:15:30
Last modified on : 14-11-2023 22:15:30

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Michael Uno (miunosoft) Responsive Column Widgets plugin <= 1.2.7 versions.

CVE ID : CVE-2023-47520
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/responsive-column-widgets/wordpress-responsive-column-widgets-plugin-1-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47522

First published on : 14-11-2023 22:15:30
Last modified on : 14-11-2023 22:15:30

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Photo Feed plugin <= 2.2.1 versions.

CVE ID : CVE-2023-47522
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/photo-feed/wordpress-photo-feed-plugin-2-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Source : blackberry.com

Vulnerability ID : CVE-2023-32701

First published on : 14-11-2023 19:15:27
Last modified on : 14-11-2023 19:30:24

Description :
Improper Input Validation in the Networking Stack of QNX SDP version(s) 6.6, 7.0, and 7.1 could allow an attacker to potentially cause Information Disclosure or a Denial-of-Service condition.

CVE ID : CVE-2023-32701
Source : secure@blackberry.com
CVSS Score : 7.1

References :
https://support.blackberry.com/kb/articleDetail?articleNumber=000112401 | source : secure@blackberry.com

Vulnerability : CWE-20


(121) MEDIUM VULNERABILITIES [4.0, 6.9]

Source : intel.com

Vulnerability ID : CVE-2023-24587

First published on : 14-11-2023 19:15:18
Last modified on : 14-11-2023 19:30:32

Description :
Insufficient control flow management in firmware for some Intel(R) Optane(TM) SSD products may allow a privileged user to potentially enable denial of service via local access.

CVE ID : CVE-2023-24587
Source : secure@intel.com
CVSS Score : 6.9

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00758.html | source : secure@intel.com

Vulnerability : CWE-691


Vulnerability ID : CVE-2023-27519

First published on : 14-11-2023 19:15:21
Last modified on : 14-11-2023 19:30:27

Description :
Improper input validation in firmware for some Intel(R) Optane(TM) SSD products may allow a privileged user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-27519
Source : secure@intel.com
CVSS Score : 6.9

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00758.html | source : secure@intel.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2023-27383

First published on : 14-11-2023 19:15:20
Last modified on : 14-11-2023 19:30:27

Description :
Protection mechanism failure in some Intel(R) oneAPI HPC Toolkit 2023.1 and Intel(R)MPI Library software before version 2021.9 may allow a privileged user to potentially enable escalation of privilege via adjacent access.

CVE ID : CVE-2023-27383
Source : secure@intel.com
CVSS Score : 6.8

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html | source : secure@intel.com

Vulnerability : CWE-693


Vulnerability ID : CVE-2023-27879

First published on : 14-11-2023 19:15:21
Last modified on : 14-11-2023 19:30:27

Description :
Improper access control in firmware for some Intel(R) Optane(TM) SSD products may allow an unauthenticated user to potentially enable information disclosure via physical access.

CVE ID : CVE-2023-27879
Source : secure@intel.com
CVSS Score : 6.8

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00758.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2022-27229

First published on : 14-11-2023 19:15:10
Last modified on : 14-11-2023 19:30:41

Description :
Path transversal in some Intel(R) NUC Kits NUC7i3DN, NUC7i5DN, NUC7i7DN HDMI firmware update tool software before version 1.79.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2022-27229
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-249


Vulnerability ID : CVE-2022-33898

First published on : 14-11-2023 19:15:11
Last modified on : 14-11-2023 19:30:41

Description :
Insecure inherited permissions in some Intel(R) NUC Watchdog Timer installation software before version 2.0.21.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2022-33898
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-277


Vulnerability ID : CVE-2022-38786

First published on : 14-11-2023 19:15:12
Last modified on : 14-11-2023 19:30:41

Description :
Improper access control in some Intel Battery Life Diagnostic Tool software before version 2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2022-38786
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00843.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2022-41700

First published on : 14-11-2023 19:15:13
Last modified on : 14-11-2023 19:30:41

Description :
Insecure inherited permissions in some Intel(R) NUC Pro Software Suite installation software before version 2.0.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2022-41700
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-277


Vulnerability ID : CVE-2023-25075

First published on : 14-11-2023 19:15:19
Last modified on : 14-11-2023 19:30:32

Description :
Unquoted search path in the installer for some Intel Server Configuration Utility software before version 16.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-25075
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00925.html | source : secure@intel.com

Vulnerability : CWE-428


Vulnerability ID : CVE-2023-27305

First published on : 14-11-2023 19:15:20
Last modified on : 14-11-2023 19:30:32

Description :
Incorrect default permissions in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-27305
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00864.html | source : secure@intel.com

Vulnerability : CWE-276


Vulnerability ID : CVE-2023-27513

First published on : 14-11-2023 19:15:21
Last modified on : 14-11-2023 19:30:27

Description :
Uncontrolled search path element in some Intel(R) Server Information Retrieval Utility software before version 16.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-27513
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00894.html | source : secure@intel.com

Vulnerability : CWE-427


Vulnerability ID : CVE-2023-28377

First published on : 14-11-2023 19:15:21
Last modified on : 14-11-2023 19:30:27

Description :
Improper authentication in some Intel(R) NUC Kit NUC11PH USB firmware installation software before version 1.1 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-28377
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-287


Vulnerability ID : CVE-2023-28378

First published on : 14-11-2023 19:15:22
Last modified on : 14-11-2023 19:30:27

Description :
Improper authorization in some Intel(R) QAT drivers for Windows - HW Version 2.0 before version 2.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-28378
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00861.html | source : secure@intel.com

Vulnerability : CWE-285


Vulnerability ID : CVE-2023-28388

First published on : 14-11-2023 19:15:22
Last modified on : 14-11-2023 19:30:27

Description :
Uncontrolled search path element in some Intel(R) Chipset Device Software before version 10.1.19444.8378 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-28388
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00870.html | source : secure@intel.com

Vulnerability : CWE-427


Vulnerability ID : CVE-2023-28740

First published on : 14-11-2023 19:15:23
Last modified on : 14-11-2023 19:30:27

Description :
Uncontrolled search path element in some Intel(R) QAT drivers for Windows - HW Version 2.0 before version 2.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-28740
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00861.html | source : secure@intel.com

Vulnerability : CWE-427


Vulnerability ID : CVE-2023-29161

First published on : 14-11-2023 19:15:23
Last modified on : 14-11-2023 19:30:27

Description :
Uncontrolled search path in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-29161
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00900.html | source : secure@intel.com

Vulnerability : CWE-427


Vulnerability ID : CVE-2023-29165

First published on : 14-11-2023 19:15:24
Last modified on : 14-11-2023 19:30:27

Description :
Unquoted search path or element in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-29165
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00864.html | source : secure@intel.com

Vulnerability : CWE-428


Vulnerability ID : CVE-2023-29504

First published on : 14-11-2023 19:15:24
Last modified on : 14-11-2023 19:30:24

Description :
Uncontrolled search path element in some Intel(R) RealSense(TM) Dynamic Calibration software before version 2.13.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-29504
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00871.html | source : secure@intel.com

Vulnerability : CWE-427


Vulnerability ID : CVE-2023-32278

First published on : 14-11-2023 19:15:25
Last modified on : 14-11-2023 19:30:24

Description :
Path transversal in some Intel(R) NUC Uniwill Service Driver for Intel(R) NUC M15 Laptop Kits - LAPRC510 & LAPRC710 Uniwill Service Driver installation software before version 1.0.1.7 for Intel(R) NUC Software Studio may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-32278
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-249


Vulnerability ID : CVE-2023-32638

First published on : 14-11-2023 19:15:25
Last modified on : 14-11-2023 19:30:24

Description :
Incorrect default permissions in some Intel Arc RGB Controller software before version 1.06 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-32638
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00952.html | source : secure@intel.com

Vulnerability : CWE-276


Vulnerability ID : CVE-2023-32655

First published on : 14-11-2023 19:15:26
Last modified on : 14-11-2023 19:30:24

Description :
Path transversal in some Intel(R) NUC Kits & Mini PCs - NUC8i7HVK & NUC8HNK USB Type C power delivery controller installatio software before version 1.0.10.3 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-32655
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-249


Vulnerability ID : CVE-2023-32658

First published on : 14-11-2023 19:15:26
Last modified on : 14-11-2023 19:30:24

Description :
Unquoted search path in some Intel(R) NUC Kits NUC7i3DN, NUC7i5DN, NUC7i7DN HDMI firmware update tool software before version 1.79.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-32658
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-428


Vulnerability ID : CVE-2023-32660

First published on : 14-11-2023 19:15:26
Last modified on : 14-11-2023 19:30:24

Description :
Uncontrolled search path in some Intel(R) NUC Kit NUC6i7KYK Thunderbolt(TM) 3 Firmware Update Tool installation software before version 46 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-32660
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-427


Vulnerability ID : CVE-2023-32661

First published on : 14-11-2023 19:15:26
Last modified on : 14-11-2023 19:30:24

Description :
Improper authentication in some Intel(R) NUC Kits NUC7PJYH and NUC7CJYH Realtek* SD Card Reader Driver installation software before version 10.0.19041.29098 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-32661
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-287


Vulnerability ID : CVE-2023-32662

First published on : 14-11-2023 19:15:26
Last modified on : 14-11-2023 19:30:24

Description :
Improper authorization in some Intel Battery Life Diagnostic Tool installation software before version 2.2.1 may allow a privilaged user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-32662
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00843.html | source : secure@intel.com

Vulnerability : CWE-285


Vulnerability ID : CVE-2023-33874

First published on : 14-11-2023 19:15:27
Last modified on : 14-11-2023 19:30:24

Description :
Uncontrolled search path in some Intel(R) NUC 12 Pro Kits & Mini PCs - NUC12WS Intel(R) HID Event Filter Driver installation software before version 2.2.2.1 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-33874
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-427


Vulnerability ID : CVE-2023-33878

First published on : 14-11-2023 19:15:27
Last modified on : 14-11-2023 19:30:24

Description :
Path transversal in some Intel(R) NUC P14E Laptop Element Audio Install Package software before version 156 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-33878
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-249


Vulnerability ID : CVE-2023-34314

First published on : 14-11-2023 19:15:27
Last modified on : 14-11-2023 19:30:24

Description :
Insecure inherited permissions in some Intel(R) Simics Simulator software before version 1.7.2 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-34314
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00943.html | source : secure@intel.com

Vulnerability : CWE-277


Vulnerability ID : CVE-2023-34350

First published on : 14-11-2023 19:15:28
Last modified on : 14-11-2023 19:30:20

Description :
Uncontrolled search path element in some Intel(R) XTU software before version 7.12.0.15 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-34350
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00941.html | source : secure@intel.com

Vulnerability : CWE-427


Vulnerability ID : CVE-2023-34430

First published on : 14-11-2023 19:15:28
Last modified on : 14-11-2023 19:30:20

Description :
Uncontrolled search path in some Intel Battery Life Diagnostic Tool software before version 2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-34430
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00843.html | source : secure@intel.com

Vulnerability : CWE-427


Vulnerability ID : CVE-2023-34997

First published on : 14-11-2023 19:15:28
Last modified on : 14-11-2023 19:30:20

Description :
Insecure inherited permissions in the installer for some Intel Server Configuration Utility software before version 16.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-34997
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00925.html | source : secure@intel.com

Vulnerability : CWE-277


Vulnerability ID : CVE-2023-39230

First published on : 14-11-2023 19:15:29
Last modified on : 14-11-2023 19:30:20

Description :
Insecure inherited permissions in some Intel Rapid Storage Technology software before version 16.8.5.1014.9 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-39230
Source : secure@intel.com
CVSS Score : 6.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00961.html | source : secure@intel.com

Vulnerability : CWE-277


Vulnerability ID : CVE-2023-22290

First published on : 14-11-2023 19:15:16
Last modified on : 14-11-2023 19:30:36

Description :
Uncaught exception for some Intel Unison software may allow an authenticated user to potentially enable denial of service via network access.

CVE ID : CVE-2023-22290
Source : secure@intel.com
CVSS Score : 6.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-248


Vulnerability ID : CVE-2023-22305

First published on : 14-11-2023 19:15:16
Last modified on : 14-11-2023 19:30:36

Description :
Integer overflow in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable denial of service via local access.

CVE ID : CVE-2023-22305
Source : secure@intel.com
CVSS Score : 6.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-680


Vulnerability ID : CVE-2023-22310

First published on : 14-11-2023 19:15:16
Last modified on : 14-11-2023 19:30:36

Description :
Race condition in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable denial of service via local access.

CVE ID : CVE-2023-22310
Source : secure@intel.com
CVSS Score : 6.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-421


Vulnerability ID : CVE-2023-26589

First published on : 14-11-2023 19:15:20
Last modified on : 14-11-2023 19:30:32

Description :
Use after free in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allowed an authenticated user to potentially enable denial of service via local access.

CVE ID : CVE-2023-26589
Source : secure@intel.com
CVSS Score : 6.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-416


Vulnerability ID : CVE-2023-27306

First published on : 14-11-2023 19:15:20
Last modified on : 14-11-2023 19:30:27

Description :
Improper Initialization in firmware for some Intel(R) Optane(TM) SSD products may allow an authenticated user to potentially enable denial of service via local access.

CVE ID : CVE-2023-27306
Source : secure@intel.com
CVSS Score : 6.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00758.html | source : secure@intel.com

Vulnerability : CWE-665


Vulnerability ID : CVE-2023-28376

First published on : 14-11-2023 19:15:21
Last modified on : 14-11-2023 19:30:27

Description :
Out-of-bounds read in the firmware for some Intel(R) E810 Ethernet Controllers and Adapters before version 1.7.1 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

CVE ID : CVE-2023-28376
Source : secure@intel.com
CVSS Score : 6.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00869.html | source : secure@intel.com

Vulnerability : CWE-125


Vulnerability ID : CVE-2023-38131

First published on : 14-11-2023 19:15:28
Last modified on : 14-11-2023 19:30:20

Description :
Improper input validationation for some Intel Unison software may allow an authenticated user to potentially enable denial of service via network access.

CVE ID : CVE-2023-38131
Source : secure@intel.com
CVSS Score : 6.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2022-42879

First published on : 14-11-2023 19:15:13
Last modified on : 14-11-2023 19:30:41

Description :
NULL pointer dereference in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow an authenticated user to potentially enable denial of service via local access.

CVE ID : CVE-2022-42879
Source : secure@intel.com
CVSS Score : 6.1

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00864.html | source : secure@intel.com

Vulnerability : CWE-395


Vulnerability ID : CVE-2023-25952

First published on : 14-11-2023 19:15:20
Last modified on : 14-11-2023 19:30:32

Description :
Out-of-bounds write in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow an authenticated user to potentially enable denial of service via local access.

CVE ID : CVE-2023-25952
Source : secure@intel.com
CVSS Score : 6.1

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00864.html | source : secure@intel.com

Vulnerability : CWE-787


Vulnerability ID : CVE-2023-22327

First published on : 14-11-2023 19:15:17
Last modified on : 14-11-2023 19:30:32

Description :
Out-of-bounds write in firmware for some Intel(R) FPGA products before version 2.8.1 may allow a privileged user to potentially enable information disclosure via local access.

CVE ID : CVE-2023-22327
Source : secure@intel.com
CVSS Score : 6.0

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00957.html | source : secure@intel.com

Vulnerability : CWE-787


Vulnerability ID : CVE-2023-22448

First published on : 14-11-2023 19:15:17
Last modified on : 14-11-2023 19:30:32

Description :
Improper access control for some Intel Unison software may allow a privileged user to potentially enable escalation of privilege via network access.

CVE ID : CVE-2023-22448
Source : secure@intel.com
CVSS Score : 5.9

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-22663

First published on : 14-11-2023 19:15:17
Last modified on : 14-11-2023 19:30:32

Description :
Improper authentication for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via network access.

CVE ID : CVE-2023-22663
Source : secure@intel.com
CVSS Score : 5.9

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-287


Vulnerability ID : CVE-2023-24588

First published on : 14-11-2023 19:15:18
Last modified on : 14-11-2023 19:30:32

Description :
Exposure of sensitive information to an unauthorized actor in firmware for some Intel(R) Optane(TM) SSD products may allow an unauthenticated user to potentially enable information disclosure via physical access.

CVE ID : CVE-2023-24588
Source : secure@intel.com
CVSS Score : 5.9

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00758.html | source : secure@intel.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-28401

First published on : 14-11-2023 19:15:22
Last modified on : 14-11-2023 19:30:27

Description :
Out-of-bounds write in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-28401
Source : secure@intel.com
CVSS Score : 5.7

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00864.html | source : secure@intel.com

Vulnerability : CWE-787


Vulnerability ID : CVE-2023-25071

First published on : 14-11-2023 19:15:18
Last modified on : 14-11-2023 19:30:32

Description :
NULL pointer dereference in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows Drviers before version 31.0.101.4255 may allow authenticated user to potentially enable denial of service via local access.

CVE ID : CVE-2023-25071
Source : secure@intel.com
CVSS Score : 5.6

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00864.html | source : secure@intel.com

Vulnerability : CWE-395


Vulnerability ID : CVE-2023-25949

First published on : 14-11-2023 19:15:19
Last modified on : 14-11-2023 19:30:32

Description :
Uncontrolled resource consumption in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable denial of service via local access.

CVE ID : CVE-2023-25949
Source : secure@intel.com
CVSS Score : 5.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-400


Vulnerability ID : CVE-2023-32283

First published on : 14-11-2023 19:15:25
Last modified on : 14-11-2023 19:30:24

Description :
Insertion of sensitive information into log file in some Intel(R) On Demand software before versions 1.16.2, 2.1.1, 3.1.0 may allow an authenticated user to potentially enable information disclosure via local access.

CVE ID : CVE-2023-32283
Source : secure@intel.com
CVSS Score : 5.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00914.html | source : secure@intel.com

Vulnerability : CWE-532


Vulnerability ID : CVE-2023-33872

First published on : 14-11-2023 19:15:27
Last modified on : 14-11-2023 19:30:24

Description :
Improper access control in the Intel Support android application all verions may allow an authenticated user to potentially enable information disclosure via local access.

CVE ID : CVE-2023-33872
Source : secure@intel.com
CVSS Score : 5.5

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00976.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-39221

First published on : 14-11-2023 19:15:29
Last modified on : 14-11-2023 19:30:20

Description :
Improper access control for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via network access.

CVE ID : CVE-2023-39221
Source : secure@intel.com
CVSS Score : 5.4

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-39412

First published on : 14-11-2023 19:15:30
Last modified on : 14-11-2023 19:30:20

Description :
Cross-site request forgery in some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via network access.

CVE ID : CVE-2023-39412
Source : secure@intel.com
CVSS Score : 5.4

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-25080

First published on : 14-11-2023 19:15:19
Last modified on : 14-11-2023 19:30:32

Description :
Protection mechanism failure in some Intel(R) Distribution of OpenVINO toolkit software before version 2023.0.0 may allow an authenticated user to potentially enable information disclosure via local access.

CVE ID : CVE-2023-25080
Source : secure@intel.com
CVSS Score : 5.3

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00901.html | source : secure@intel.com

Vulnerability : CWE-693


Vulnerability ID : CVE-2023-38570

First published on : 14-11-2023 19:15:29
Last modified on : 14-11-2023 19:30:20

Description :
Access of memory location after end of buffer for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-38570
Source : secure@intel.com
CVSS Score : 5.3

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-788


Vulnerability ID : CVE-2023-39228

First published on : 14-11-2023 19:15:29
Last modified on : 14-11-2023 19:30:20

Description :
Improper access control for some Intel Unison software may allow an unauthenticated user to potentially enable denial of service via network access.

CVE ID : CVE-2023-39228
Source : secure@intel.com
CVSS Score : 5.3

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-40220

First published on : 14-11-2023 19:15:30
Last modified on : 14-11-2023 19:30:20

Description :
Improper buffer restrictions in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable information disclosure via local access.

CVE ID : CVE-2023-40220
Source : secure@intel.com
CVSS Score : 5.3

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html | source : secure@intel.com

Vulnerability : CWE-92


Vulnerability ID : CVE-2023-39411

First published on : 14-11-2023 19:15:30
Last modified on : 14-11-2023 19:30:20

Description :
Improper input validationation for some Intel Unison software may allow a privileged user to potentially enable denial of service via local access.

CVE ID : CVE-2023-39411
Source : secure@intel.com
CVSS Score : 5.0

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2023-25756

First published on : 14-11-2023 19:15:19
Last modified on : 14-11-2023 19:30:32

Description :
Out-of-bounds read in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via adjacent access.

CVE ID : CVE-2023-25756
Source : secure@intel.com
CVSS Score : 4.6

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00924.html | source : secure@intel.com

Vulnerability : CWE-125


Vulnerability ID : CVE-2023-31203

First published on : 14-11-2023 19:15:24
Last modified on : 14-11-2023 19:30:24

Description :
Improper input validation in some OpenVINO Model Server software before version 2022.3 for Intel Distribution of OpenVINO toolkit may allow an unauthenticated user to potentially enable denial of service via network access.

CVE ID : CVE-2023-31203
Source : secure@intel.com
CVSS Score : 4.3

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00901.html | source : secure@intel.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2023-40540

First published on : 14-11-2023 19:15:30
Last modified on : 14-11-2023 19:30:20

Description :
Non-Transparent Sharing of Microarchitectural Resources in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable information disclosure via local access.

CVE ID : CVE-2023-40540
Source : secure@intel.com
CVSS Score : 4.1

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html | source : secure@intel.com

Vulnerability : CWE-1303


Source : siemens.com

Vulnerability ID : CVE-2023-45794

First published on : 14-11-2023 11:15:13
Last modified on : 14-11-2023 15:15:45

Description :
A vulnerability has been identified in Mendix Applications using Mendix 10 (All versions < V10.4.0), Mendix Applications using Mendix 7 (All versions < V7.23.37), Mendix Applications using Mendix 8 (All versions < V8.18.27), Mendix Applications using Mendix 9 (All versions < V9.24.10). A capture-replay flaw in the platform could have an impact to apps built with the platform, if certain preconditions are met that depend on the app's model and access control design. This could allow authenticated attackers to access or modify objects without proper authorization, or escalate privileges in the context of the vulnerable app.

CVE ID : CVE-2023-45794
Source : productcert@siemens.com
CVSS Score : 6.8

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-084182.pdf | source : productcert@siemens.com

Vulnerability : CWE-294


Vulnerability ID : CVE-2023-44374

First published on : 14-11-2023 11:15:13
Last modified on : 14-11-2023 15:15:45

Description :
A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected devices allow to change the password, but insufficiently check which password is to be changed. With this an authenticated attacker could, under certain conditions, be able to change the password of another, potential admin user allowing her to escalate her privileges.

CVE ID : CVE-2023-44374
Source : productcert@siemens.com
CVSS Score : 6.5

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | source : productcert@siemens.com

Vulnerability : CWE-567


Vulnerability ID : CVE-2023-46096

First published on : 14-11-2023 11:15:14
Last modified on : 14-11-2023 15:15:45

Description :
A vulnerability has been identified in SIMATIC PCS neo (All versions < V4.1). The PUD Manager of affected products does not properly authenticate users in the PUD Manager web service. This could allow an unauthenticated adjacent attacker to generate a privileged token and upload additional documents.

CVE ID : CVE-2023-46096
Source : productcert@siemens.com
CVSS Score : 6.5

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-456933.pdf | source : productcert@siemens.com

Vulnerability : CWE-306


Vulnerability ID : CVE-2023-46097

First published on : 14-11-2023 11:15:14
Last modified on : 14-11-2023 15:15:45

Description :
A vulnerability has been identified in SIMATIC PCS neo (All versions < V4.1). The PUD Manager of affected products does not properly neutralize user provided inputs. This could allow an authenticated adjacent attacker to execute SQL statements in the underlying database.

CVE ID : CVE-2023-46097
Source : productcert@siemens.com
CVSS Score : 6.3

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-456933.pdf | source : productcert@siemens.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-46099

First published on : 14-11-2023 11:15:14
Last modified on : 14-11-2023 15:15:45

Description :
A vulnerability has been identified in SIMATIC PCS neo (All versions < V4.1). There is a stored cross-site scripting vulnerability in the Administration Console of the affected product, that could allow an attacker with high privileges to inject Javascript code into the application that is later executed by another legitimate user.

CVE ID : CVE-2023-46099
Source : productcert@siemens.com
CVSS Score : 5.4

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-456933.pdf | source : productcert@siemens.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-44318

First published on : 14-11-2023 11:15:12
Last modified on : 14-11-2023 15:15:45

Description :
A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected devices use a hardcoded key to obfuscate the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that obtains a configuration backup to extract configuration information from the exported file.

CVE ID : CVE-2023-44318
Source : productcert@siemens.com
CVSS Score : 4.9

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | source : productcert@siemens.com

Vulnerability : CWE-321


Vulnerability ID : CVE-2023-44319

First published on : 14-11-2023 11:15:12
Last modified on : 14-11-2023 15:15:45

Description :
A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected devices use a weak checksum algorithm to protect the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that tricks a legitimate administrator to upload a modified configuration file to change the configuration of an affected device.

CVE ID : CVE-2023-44319
Source : productcert@siemens.com
CVSS Score : 4.9

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | source : productcert@siemens.com

Vulnerability : CWE-328


Vulnerability ID : CVE-2023-44320

First published on : 14-11-2023 11:15:12
Last modified on : 14-11-2023 15:15:45

Description :
A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected devices do not properly validate the authentication when performing certain modifications in the web interface allowing an authenticated attacker to influence the user interface configured by an administrator.

CVE ID : CVE-2023-44320
Source : productcert@siemens.com
CVSS Score : 4.3

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | source : productcert@siemens.com

Vulnerability : CWE-425


Source : huntr.dev

Vulnerability ID : CVE-2023-6128

First published on : 14-11-2023 16:15:28
Last modified on : 14-11-2023 18:04:30

Description :
Cross-site Scripting (XSS) - Reflected in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.

CVE ID : CVE-2023-6128
Source : security@huntr.dev
CVSS Score : 6.8

References :
https://github.com/salesagility/suitecrm/commit/54bc56c3bd9f1db75408db1c1d7d652c3f5f71e9 | source : security@huntr.dev
https://huntr.com/bounties/51406547-1961-45f2-a416-7f14fd775d2d | source : security@huntr.dev

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-6125

First published on : 14-11-2023 16:15:27
Last modified on : 14-11-2023 18:04:30

Description :
Code Injection in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.

CVE ID : CVE-2023-6125
Source : security@huntr.dev
CVSS Score : 5.4

References :
https://github.com/salesagility/suitecrm/commit/54bc56c3bd9f1db75408db1c1d7d652c3f5f71e9 | source : security@huntr.dev
https://huntr.com/bounties/a9462f1e-9746-4380-8228-533ff2f64691 | source : security@huntr.dev

Vulnerability : CWE-94


Vulnerability ID : CVE-2023-6127

First published on : 14-11-2023 16:15:28
Last modified on : 14-11-2023 18:04:30

Description :
Unrestricted Upload of File with Dangerous Type in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.

CVE ID : CVE-2023-6127
Source : security@huntr.dev
CVSS Score : 5.4

References :
https://github.com/salesagility/suitecrm/commit/54bc56c3bd9f1db75408db1c1d7d652c3f5f71e9 | source : security@huntr.dev
https://huntr.com/bounties/bf10c72b-5d2e-4c9a-9bd6-d77bdf31027d | source : security@huntr.dev

Vulnerability : CWE-434


Vulnerability ID : CVE-2023-6124

First published on : 14-11-2023 15:15:08
Last modified on : 14-11-2023 15:15:45

Description :
Server-Side Request Forgery (SSRF) in GitHub repository salesagility/suitecrm prior to 7.14.2, 8.4.2, 7.12.14.

CVE ID : CVE-2023-6124
Source : security@huntr.dev
CVSS Score : 5.0

References :
https://github.com/salesagility/suitecrm/commit/54bc56c3bd9f1db75408db1c1d7d652c3f5f71e9 | source : security@huntr.dev
https://huntr.com/bounties/aed4d8f3-ab9a-42fd-afea-b3ec288a148e | source : security@huntr.dev

Vulnerability : CWE-918


Vulnerability ID : CVE-2023-6126

First published on : 14-11-2023 16:15:27
Last modified on : 14-11-2023 18:04:30

Description :
Code Injection in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.

CVE ID : CVE-2023-6126
Source : security@huntr.dev
CVSS Score : 4.3

References :
https://github.com/salesagility/suitecrm/commit/54bc56c3bd9f1db75408db1c1d7d652c3f5f71e9 | source : security@huntr.dev
https://huntr.com/bounties/e22a9be3-3273-42cb-bfcc-c67a1025684e | source : security@huntr.dev

Vulnerability : CWE-94


Source : patchstack.com

Vulnerability ID : CVE-2023-47549

First published on : 14-11-2023 21:15:12
Last modified on : 14-11-2023 21:38:02

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability on 302 response page in spider-themes EazyDocs plugin <= 2.3.3 versions.

CVE ID : CVE-2023-47549
Source : audit@patchstack.com
CVSS Score : 6.8

References :
https://patchstack.com/database/vulnerability/eazydocs/wordpress-eazydocs-plugin-2-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47680

First published on : 14-11-2023 00:15:08
Last modified on : 14-11-2023 15:15:54

Description :
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Qode Interactive Qi Addons For Elementor plugin <= 1.6.3 versions.

CVE ID : CVE-2023-47680
Source : audit@patchstack.com
CVSS Score : 6.5

References :
https://patchstack.com/database/vulnerability/qi-addons-for-elementor/wordpress-qi-addons-for-elementor-plugin-1-6-3-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47659

First published on : 14-11-2023 17:15:07
Last modified on : 14-11-2023 18:04:30

Description :
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Lavacode Lava Directory Manager plugin <= 1.1.34 versions.

CVE ID : CVE-2023-47659
Source : audit@patchstack.com
CVSS Score : 6.5

References :
https://patchstack.com/database/vulnerability/lava-directory-manager/wordpress-lava-directory-manager-plugin-1-1-34-contributor-stored-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47654

First published on : 14-11-2023 19:15:31
Last modified on : 14-11-2023 19:30:20

Description :
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in livescore.Bz BZScore โ€“ Live Score plugin <= 1.03 versions.

CVE ID : CVE-2023-47654
Source : audit@patchstack.com
CVSS Score : 6.5

References :
https://patchstack.com/database/vulnerability/bzscore-live-score/wordpress-bzscore-live-score-plugin-1-03-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47657

First published on : 14-11-2023 00:15:07
Last modified on : 14-11-2023 15:15:54

Description :
Auth. (ShopManager+) Stored Cross-Site Scripting (XSS) vulnerability in GrandPlugins Direct Checkout โ€“ Quick View โ€“ Buy Now For WooCommerce plugin <= 1.5.8 versions.

CVE ID : CVE-2023-47657
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/quick-view-and-buy-now-for-woocommerce/wordpress-direct-checkout-quick-view-buy-now-for-woocommerce-plugin-1-5-8-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47662

First published on : 14-11-2023 00:15:07
Last modified on : 14-11-2023 15:15:54

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in GoldBroker.Com Live Gold Price & Silver Price Charts Widgets plugin <= 2.4 versions.

CVE ID : CVE-2023-47662
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/gold-price-chart-widget/wordpress-live-gold-price-silver-price-charts-widgets-plugin-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47660

First published on : 14-11-2023 17:15:07
Last modified on : 14-11-2023 18:04:30

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WP Wham Product Visibility by Country for WooCommerce plugin <= 1.4.9 versions.

CVE ID : CVE-2023-47660
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/product-visibility-by-country-for-woocommerce/wordpress-product-visibility-by-country-for-woocommerce-plugin-1-4-9-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47653

First published on : 14-11-2023 19:15:31
Last modified on : 14-11-2023 19:30:20

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Abu Bakar TWB Woocommerce Reviews plugin <= 1.7.5 versions.

CVE ID : CVE-2023-47653
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/twb-woocommerce-reviews/wordpress-twb-woocommerce-reviews-plugin-1-7-5-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47656

First published on : 14-11-2023 19:15:31
Last modified on : 14-11-2023 19:30:20

Description :
Auth. (editor+) Stored Cross-Site Scripting (XSS) vulnerability in Marco Milesi ANAC XML Bandi di Gara plugin <= 7.5 versions.

CVE ID : CVE-2023-47656
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/avcp/wordpress-anac-xml-bandi-di-gara-plugin-7-5-cross-site-scripting-xss-vulnerability-2?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47658

First published on : 14-11-2023 19:15:32
Last modified on : 14-11-2023 19:30:20

Description :
Auth. (ShopManager+) Stored Cross-Site Scripting (XSS) vulnerability in actpro Extra Product Options for WooCommerce plugin <= 3.0.3 versions.

CVE ID : CVE-2023-47658
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/extra-product-options-for-woocommerce/wordpress-extra-product-options-for-woocommerce-plugin-3-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47554

First published on : 14-11-2023 20:15:08
Last modified on : 14-11-2023 21:38:02

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in DenK BV Actueel Financieel Nieuws โ€“ Denk Internet Solutions plugin <= 5.1.0 versions.

CVE ID : CVE-2023-47554
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/denk-internet-solutions/wordpress-actueel-financieel-nieuws-denk-internet-solutions-plugin-5-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47646

First published on : 14-11-2023 20:15:08
Last modified on : 14-11-2023 21:38:02

Description :
Auth. (Shop Manager+) Stored Cross-Site Scripting (XSS) vulnerability in CedCommerce Recently viewed and most viewed products plugin <= 1.1.1 versions.

CVE ID : CVE-2023-47646
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/recently-viewed-and-most-viewed-products/wordpress-recently-viewed-and-most-viewed-products-plugin-1-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47533

First published on : 14-11-2023 21:15:11
Last modified on : 14-11-2023 21:38:02

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in wpdevart Countdown and CountUp, WooCommerce Sales Timer plugin <= 1.8.2 versions.

CVE ID : CVE-2023-47533
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/countdown-wpdevart-extended/wordpress-countdown-and-countup-woocommerce-sales-timer-plugin-1-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47545

First published on : 14-11-2023 21:15:12
Last modified on : 14-11-2023 21:38:02

Description :
Auth. (editor+) Stored Cross-Site Scripting (XSS) vulnerability in Fatcat Apps Forms for Mailchimp by Optin Cat โ€“ Grow Your MailChimp List plugin <= 2.5.4 versions.

CVE ID : CVE-2023-47545
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/mailchimp-wp/wordpress-forms-for-mailchimp-by-optin-cat-plugin-2-5-4-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47546

First published on : 14-11-2023 21:15:12
Last modified on : 14-11-2023 21:38:02

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Walter Pinem OneClick Chat to Order plugin <= 1.0.4.2 versions.

CVE ID : CVE-2023-47546
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/oneclick-whatsapp-order/wordpress-oneclick-chat-to-order-plugin-1-0-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47528

First published on : 14-11-2023 22:15:31
Last modified on : 14-11-2023 22:15:31

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Sajjad Hossain Sagor WP Edit Username plugin <= 1.0.5 versions.

CVE ID : CVE-2023-47528
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/wp-edit-username/wordpress-wp-edit-username-plugin-1-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47524

First published on : 14-11-2023 22:15:30
Last modified on : 14-11-2023 22:15:30

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability (requires PHP 8.x) in CodeBard CodeBard's Patron Button and Widgets for Patreon plugin <= 2.1.9 versions.

CVE ID : CVE-2023-47524
Source : audit@patchstack.com
CVSS Score : 5.8

References :
https://patchstack.com/database/vulnerability/patron-button-and-widgets-by-codebard/wordpress-codebard-s-patron-button-and-widgets-for-patreon-plugin-2-1-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47532

First published on : 14-11-2023 22:15:31
Last modified on : 14-11-2023 22:15:31

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Themeum WP Crowdfunding plugin <= 2.1.6 versions.

CVE ID : CVE-2023-47532
Source : audit@patchstack.com
CVSS Score : 5.8

References :
https://patchstack.com/database/vulnerability/wp-crowdfunding/wordpress-wp-crowdfunding-plugin-2-1-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Source : fortinet.com

Vulnerability ID : CVE-2023-29177

First published on : 14-11-2023 19:15:24
Last modified on : 14-11-2023 19:30:27

Description :
Multiple buffer copy without checking size of input ('classic buffer overflow') vulnerabilities [CWE-120] in FortiADC version 7.2.0 and before 7.1.2 & FortiDDoS-F version 6.5.0 and before 6.4.1 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI requests.

CVE ID : CVE-2023-29177
Source : psirt@fortinet.com
CVSS Score : 6.7

References :
https://fortiguard.com/psirt/FG-IR-23-064 | source : psirt@fortinet.com

Vulnerability : CWE-120


Vulnerability ID : CVE-2023-36641

First published on : 14-11-2023 18:15:49
Last modified on : 14-11-2023 18:51:33

Description :
A numeric truncation error in Fortinet FortiProxy version 7.2.0 through 7.2.4, FortiProxy version 7.0.0 through 7.0.10, FortiProxy 2.0 all versions, FortiProxy 1.2 all versions, FortiProxy 1.1, all versions, FortiProxy 1.0 all versions, FortiOS version 7.4.0, FortiOS version 7.2.0 through 7.2.5, FortiOS version 7.0.0 through 7.0.12, FortiOS 6.4 all versions, FortiOS 6.2 all versions, FortiOS 6.0 all versions allows attacker to denial of service via specifically crafted HTTP requests.

CVE ID : CVE-2023-36641
Source : psirt@fortinet.com
CVSS Score : 6.5

References :
https://fortiguard.com/psirt/FG-IR-23-151 | source : psirt@fortinet.com

Vulnerability : CWE-197


Vulnerability ID : CVE-2023-28002

First published on : 14-11-2023 18:15:29
Last modified on : 14-11-2023 18:51:45

Description :
An improper validation of integrity check value vulnerability [CWE-354] in FortiOS 7.2.0 through 7.2.3, 7.0.0 through 7.0.12, 6.4 all versions, 6.2 all versions, 6.0 all versions and FortiProxy 7.2 all versions, 7.0 all versions, 2.0 all versions VMs may allow a local attacker with admin privileges to boot a malicious image on the device and bypass the filesystem integrity check in place.

CVE ID : CVE-2023-28002
Source : psirt@fortinet.com
CVSS Score : 6.4

References :
https://fortiguard.com/psirt/FG-IR-22-396 | source : psirt@fortinet.com

Vulnerability : CWE-354


Vulnerability ID : CVE-2023-45582

First published on : 14-11-2023 18:15:55
Last modified on : 14-11-2023 18:51:33

Description :
An improper restriction of excessive authentication attempts vulnerability [CWE-307] in FortiMail webmail version 7.2.0 through 7.2.4, 7.0.0 through 7.0.6 and before 6.4.8 may allow an unauthenticated attacker to perform a brute force attack on the affected endpoints via repeated login attempts.

CVE ID : CVE-2023-45582
Source : psirt@fortinet.com
CVSS Score : 5.6

References :
https://fortiguard.com/psirt/FG-IR-23-287 | source : psirt@fortinet.com

Vulnerability : CWE-307


Vulnerability ID : CVE-2023-36633

First published on : 14-11-2023 18:15:49
Last modified on : 14-11-2023 18:51:33

Description :
An improper authorization vulnerability [CWE-285] in FortiMail webmail version 7.2.0 through 7.2.2 and before 7.0.5 allows an authenticated attacker to see and modify the title of address book folders of other users via crafted HTTP or HTTPs requests.

CVE ID : CVE-2023-36633
Source : psirt@fortinet.com
CVSS Score : 5.4

References :
https://fortiguard.com/psirt/FG-IR-23-203 | source : psirt@fortinet.com

Vulnerability : CWE-285


Vulnerability ID : CVE-2023-25603

First published on : 14-11-2023 19:15:19
Last modified on : 14-11-2023 19:30:32

Description :
A permissive cross-domain policy with untrusted domains vulnerability in Fortinet FortiADC 7.1.0 - 7.1.1, FortiDDoS-F 6.3.0 - 6.3.4 and 6.4.0 - 6.4.1 allow an unauthorized attacker to carry out privileged actions and retrieve sensitive information via crafted web requests.

CVE ID : CVE-2023-25603
Source : psirt@fortinet.com
CVSS Score : 5.4

References :
https://fortiguard.com/psirt/FG-IR-22-518 | source : psirt@fortinet.com

Vulnerability : CWE-942


Vulnerability ID : CVE-2023-33304

First published on : 14-11-2023 18:15:30
Last modified on : 14-11-2023 18:51:45

Description :
A use of hard-coded credentials vulnerability in Fortinet FortiClient Windows 7.0.0 - 7.0.9 and 7.2.0 - 7.2.1 allows an attacker to bypass system protections via the use of static credentials.

CVE ID : CVE-2023-33304
Source : psirt@fortinet.com
CVSS Score : 4.4

References :
https://fortiguard.com/psirt/FG-IR-23-108 | source : psirt@fortinet.com

Vulnerability : CWE-798


Vulnerability ID : CVE-2023-44248

First published on : 14-11-2023 18:15:54
Last modified on : 14-11-2023 18:51:33

Description :
An improper access control vulnerability [CWE-284] in FortiEDRCollectorWindows version 5.2.0.4549 and below, 5.0.3.1007 and below, 4.0 all may allow a local attacker to prevent the collector service to start in the next system reboot by tampering with some registry keys of the service.

CVE ID : CVE-2023-44248
Source : psirt@fortinet.com
CVSS Score : 4.4

References :
https://fortiguard.com/psirt/FG-IR-23-306 | source : psirt@fortinet.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-41676

First published on : 14-11-2023 18:15:52
Last modified on : 14-11-2023 18:51:33

Description :
An exposure of sensitive information to an unauthorized actor [CWE-200] in FortiSIEM version 7.0.0 and before 6.7.5 may allow an attacker with access to windows agent logs to obtain the windows agent password via searching through the logs.

CVE ID : CVE-2023-41676
Source : psirt@fortinet.com
CVSS Score : 4.3

References :
https://fortiguard.com/psirt/FG-IR-23-290 | source : psirt@fortinet.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-40719

First published on : 14-11-2023 19:15:30
Last modified on : 14-11-2023 19:30:20

Description :
A use of hard-coded credentials vulnerability in Fortinet FortiAnalyzer and FortiManager 7.0.0 - 7.0.8, 7.2.0 - 7.2.3 and 7.4.0 allows an attacker to access Fortinet private testing data via the use of static credentials.

CVE ID : CVE-2023-40719
Source : psirt@fortinet.com
CVSS Score : 4.1

References :
https://fortiguard.com/psirt/FG-IR-23-177 | source : psirt@fortinet.com

Vulnerability : CWE-798


Source : microsoft.com

Vulnerability ID : CVE-2023-36043

First published on : 14-11-2023 18:15:34
Last modified on : 14-11-2023 18:51:42

Description :
Open Management Infrastructure Information Disclosure Vulnerability

CVE ID : CVE-2023-36043
Source : secure@microsoft.com
CVSS Score : 6.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36043 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36398

First published on : 14-11-2023 18:15:39
Last modified on : 14-11-2023 18:51:38

Description :
Windows NTFS Information Disclosure Vulnerability

CVE ID : CVE-2023-36398
Source : secure@microsoft.com
CVSS Score : 6.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36398 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36413

First published on : 14-11-2023 18:15:44
Last modified on : 14-11-2023 18:51:38

Description :
Microsoft Office Security Feature Bypass Vulnerability

CVE ID : CVE-2023-36413
Source : secure@microsoft.com
CVSS Score : 6.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36413 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36016

First published on : 14-11-2023 18:15:30
Last modified on : 14-11-2023 18:51:45

Description :
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

CVE ID : CVE-2023-36016
Source : secure@microsoft.com
CVSS Score : 6.2

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36016 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36042

First published on : 14-11-2023 18:15:34
Last modified on : 14-11-2023 18:51:42

Description :
Visual Studio Denial of Service Vulnerability

CVE ID : CVE-2023-36042
Source : secure@microsoft.com
CVSS Score : 6.2

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36042 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36558

First published on : 14-11-2023 22:15:29
Last modified on : 14-11-2023 22:15:29

Description :
ASP.NET Core - Security Feature Bypass Vulnerability

CVE ID : CVE-2023-36558
Source : secure@microsoft.com
CVSS Score : 6.2

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36558 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36030

First published on : 14-11-2023 18:15:32
Last modified on : 14-11-2023 18:51:42

Description :
Microsoft Dynamics 365 Sales Spoofing Vulnerability

CVE ID : CVE-2023-36030
Source : secure@microsoft.com
CVSS Score : 6.1

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36030 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-38177

First published on : 14-11-2023 18:15:51
Last modified on : 14-11-2023 18:51:33

Description :
Microsoft SharePoint Server Remote Code Execution Vulnerability

CVE ID : CVE-2023-38177
Source : secure@microsoft.com
CVSS Score : 6.1

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38177 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36404

First published on : 14-11-2023 18:15:42
Last modified on : 14-11-2023 18:51:38

Description :
Windows Kernel Information Disclosure Vulnerability

CVE ID : CVE-2023-36404
Source : secure@microsoft.com
CVSS Score : 5.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36404 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36406

First published on : 14-11-2023 18:15:42
Last modified on : 14-11-2023 18:51:38

Description :
Windows Hyper-V Information Disclosure Vulnerability

CVE ID : CVE-2023-36406
Source : secure@microsoft.com
CVSS Score : 5.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36406 | source : secure@microsoft.com


Vulnerability ID : CVE-2023-36428

First published on : 14-11-2023 18:15:47
Last modified on : 14-11-2023 18:51:33

Description :
Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability

CVE ID : CVE-2023-36428
Source : secure@microsoft.com
CVSS Score : 5.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36428 | source : secure@microsoft.com


Source : eb41dac7-0af8-4f84-9f6d-0272772514f4

Vulnerability ID : CVE-2023-6006

First published on : 14-11-2023 04:15:07
Last modified on : 14-11-2023 15:15:50

Description :
This vulnerability allows local attackers to escalate privileges on affected installations of PaperCut NG. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the pc-pdl-to-image process. The process loads an executable from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.

CVE ID : CVE-2023-6006
Source : eb41dac7-0af8-4f84-9f6d-0272772514f4
CVSS Score : 6.4

References :
https://www.papercut.com/kb/Main/CommonSecurityQuestions/ | source : eb41dac7-0af8-4f84-9f6d-0272772514f4
https://www.papercut.com/kb/Main/Security-Bulletin-November-2023/ | source : eb41dac7-0af8-4f84-9f6d-0272772514f4

Vulnerability : CWE-269


Source : github.com

Vulnerability ID : CVE-2023-47640

First published on : 14-11-2023 21:15:13
Last modified on : 14-11-2023 21:38:02

Description :
DataHub is an open-source metadata platform. The HMAC signature for DataHub Frontend sessions was being signed using a SHA-1 HMAC with the frontend secret key. SHA1 with a 10 byte key can be brute forced using sufficient resources (i.e. state level actors with large computational capabilities). DataHub Frontend was utilizing the Play LegacyCookiesModule with default settings which utilizes a SHA1 HMAC for signing. This is compounded by using a shorter key length than recommended by default for the signing key for the randomized secret value. An authenticated attacker (or attacker who has otherwise obtained a session token) could crack the signing key for DataHub and obtain escalated privileges by generating a privileged session cookie. Due to key length being a part of the risk, deployments should update to the latest helm chart and rotate their session signing secret. All deployments using the default helm chart configurations for generating the Play secret key used for signing are affected by this vulnerability. Version 0.11.1 resolves this vulnerability. All users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-47640
Source : security-advisories@github.com
CVSS Score : 6.4

References :
https://github.com/datahub-project/datahub/security/advisories/GHSA-fg9x-wvqw-6gmw | source : security-advisories@github.com

Vulnerability : CWE-327


Vulnerability ID : CVE-2023-47627

First published on : 14-11-2023 21:15:12
Last modified on : 14-11-2023 21:38:02

Description :
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP parser in AIOHTTP has numerous problems with header parsing, which could lead to request smuggling. This parser is only used when AIOHTTP_NO_EXTENSIONS is enabled (or not using a prebuilt wheel). These bugs have been addressed in commit `d5c12ba89` which has been included in release version 3.8.6. Users are advised to upgrade. There are no known workarounds for these issues.

CVE ID : CVE-2023-47627
Source : security-advisories@github.com
CVSS Score : 5.3

References :
https://github.com/aio-libs/aiohttp/commit/d5c12ba890557a575c313bb3017910d7616fce3d | source : security-advisories@github.com
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-gfw2-4jvh-wgfg | source : security-advisories@github.com

Vulnerability : CWE-444


Vulnerability ID : CVE-2023-47125

First published on : 14-11-2023 20:15:07
Last modified on : 14-11-2023 21:38:09

Description :
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions DOM processing instructions are not handled correctly. This allows bypassing the cross-site scripting mechanism of typo3/html-sanitizer. This vulnerability has been addressed in versions 1.5.3 and 2.1.4. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-47125
Source : security-advisories@github.com
CVSS Score : 4.7

References :
https://github.com/TYPO3/html-sanitizer/commit/b8f90717251d968c49dc77f8c1e5912e2fbe0dff | source : security-advisories@github.com
https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-mm79-jhqm-9j54 | source : security-advisories@github.com
https://typo3.org/security/advisory/typo3-core-sa-2023-007 | source : security-advisories@github.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-47628

First published on : 14-11-2023 01:15:08
Last modified on : 14-11-2023 15:15:54

Description :
DataHub is an open-source metadata platform. DataHub Frontend's sessions are configured using Play Framework's default settings for stateless session which do not set an expiration time for a cookie. Due to this, if a session cookie were ever leaked, it would be valid forever. DataHub uses a stateless session cookie that is not invalidated on logout, it is just removed from the browser forcing the user to login again. However, if an attacker extracted a cookie from an authenticated user it would continue to be valid as there is no validation on a time window the session token is valid for due to a combination of the usage of LegacyCookiesModule from Play Framework and using default settings which do not set an expiration time. All DataHub instances prior to the patch that have removed the datahub user, but not the default policies applying to that user are affected. Users are advised to update to version 0.12.1 which addresses the issue. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-47628
Source : security-advisories@github.com
CVSS Score : 4.2

References :
https://github.com/datahub-project/datahub/security/advisories/GHSA-75p8-rgh2-r9mx | source : security-advisories@github.com

Vulnerability : CWE-613


Vulnerability ID : CVE-2023-47127

First published on : 14-11-2023 20:15:08
Last modified on : 14-11-2023 21:38:09

Description :
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In typo3 installations there are always at least two different sites. Eg. first.example.org and second.example.com. In affected versions a session cookie generated for the first site can be reused on the second site without requiring additional authentication. This vulnerability has been addressed in versions 8.7.55, 9.5.44, 10.4.41, 11.5.33, and 12.4.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-47127
Source : security-advisories@github.com
CVSS Score : 4.2

References :
https://github.com/TYPO3/typo3/commit/535dfbdc54fd5362e0bc08d911db44eac7f64019 | source : security-advisories@github.com
https://github.com/TYPO3/typo3/security/advisories/GHSA-3vmm-7h4j-69rm | source : security-advisories@github.com
https://typo3.org/security/advisory/typo3-core-sa-2023-006 | source : security-advisories@github.com

Vulnerability : CWE-294


Source : sap.com

Vulnerability ID : CVE-2023-41366

First published on : 14-11-2023 01:15:07
Last modified on : 14-11-2023 15:15:54

Description :
Under certain condition SAP NetWeaver Application Server ABAP - versions KERNEL 722, KERNEL 7.53, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.91, KERNEL 7.92, KERNEL 7.93, KERNEL 7.94, KERNEL64UC 7.22, KERNEL64UC 7.22EXT, KERNEL64UC 7.53, KERNEL64NUC 7.22, KERNEL64NUC 7.22EXT, allows an unauthenticated attacker to access the unintended data due to the lack of restrictions applied which may lead to low impact in confidentiality and no impact on the integrity and availability of the application.

CVE ID : CVE-2023-41366
Source : cna@sap.com
CVSS Score : 5.3

References :
https://me.sap.com/notes/3362849 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-497


Vulnerability ID : CVE-2023-42480

First published on : 14-11-2023 01:15:07
Last modified on : 14-11-2023 15:15:54

Description :
The unauthenticated attacker in NetWeaver AS Java Logon application - version 7.50, can brute force the login functionality to identify the legitimate user ids. This will have an impact on confidentiality but there is no other impact on integrity or availability.

CVE ID : CVE-2023-42480
Source : cna@sap.com
CVSS Score : 5.3

References :
https://me.sap.com/notes/3366410 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-307


Source : wordfence.com

Vulnerability ID : CVE-2023-6109

First published on : 14-11-2023 07:15:07
Last modified on : 14-11-2023 15:15:50

Description :
The YOP Poll plugin for WordPress is vulnerable to a race condition in all versions up to, and including, 6.5.26. This is due to improper restrictions on the add() function. This makes it possible for unauthenticated attackers to place multiple votes on a single poll even when the poll is set to one vote per person.

CVE ID : CVE-2023-6109
Source : security@wordfence.com
CVSS Score : 5.3

References :
https://plugins.trac.wordpress.org/changeset/2959124/yop-poll/trunk/admin/models/votes.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/360b1927-a863-46be-ad11-3f6251c75a3c?source=cve | source : security@wordfence.com


(21) LOW VULNERABILITIES [0.1, 3.9]

Source : intel.com

Vulnerability ID : CVE-2023-38411

First published on : 14-11-2023 19:15:29
Last modified on : 14-11-2023 19:30:20

Description :
Improper access control in the Intel Smart Campus android application before version 9.4 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-38411
Source : secure@intel.com
CVSS Score : 3.9

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00863.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-28404

First published on : 14-11-2023 19:15:22
Last modified on : 14-11-2023 19:30:27

Description :
Out-of-bounds read in the Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow an authenticated user to potentially enable information disclosure via local access.

CVE ID : CVE-2023-28404
Source : secure@intel.com
CVSS Score : 3.8

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00864.html | source : secure@intel.com

Vulnerability : CWE-125


Vulnerability ID : CVE-2022-43477

First published on : 14-11-2023 19:15:13
Last modified on : 14-11-2023 19:30:41

Description :
Incomplete cleanup for some Intel Unison software may allow an authenticated user to potentially enable information disclosure via local access.

CVE ID : CVE-2022-43477
Source : secure@intel.com
CVSS Score : 3.3

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-459


Vulnerability ID : CVE-2022-43666

First published on : 14-11-2023 19:15:14
Last modified on : 14-11-2023 19:30:41

Description :
Exposure of sensitive system information due to uncleared debug information for some Intel Unison software may allow an authenticated user to potentially enable information disclosure via local access.

CVE ID : CVE-2022-43666
Source : secure@intel.com
CVSS Score : 3.3

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-1258


Vulnerability ID : CVE-2022-45109

First published on : 14-11-2023 19:15:14
Last modified on : 14-11-2023 19:30:41

Description :
Improper initialization for some Intel Unison software may allow an authenticated user to potentially enable information disclosure via local access.

CVE ID : CVE-2022-45109
Source : secure@intel.com
CVSS Score : 3.3

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-665


Vulnerability ID : CVE-2022-46299

First published on : 14-11-2023 19:15:14
Last modified on : 14-11-2023 19:30:41

Description :
Insufficient control flow management for some Intel Unison software may allow an authenticated user to potentially enable information disclosure via local access.

CVE ID : CVE-2022-46299
Source : secure@intel.com
CVSS Score : 3.3

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-691


Vulnerability ID : CVE-2023-28723

First published on : 14-11-2023 19:15:23
Last modified on : 14-11-2023 19:30:27

Description :
Exposure of sensitive information to an unauthorized actor in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable information disclosure via local access.

CVE ID : CVE-2023-28723
Source : secure@intel.com
CVSS Score : 3.3

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | source : secure@intel.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-22329

First published on : 14-11-2023 19:15:17
Last modified on : 14-11-2023 19:30:32

Description :
Improper input validation in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via adjacent access.

CVE ID : CVE-2023-22329
Source : secure@intel.com
CVSS Score : 2.6

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00924.html | source : secure@intel.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2023-22313

First published on : 14-11-2023 19:15:17
Last modified on : 14-11-2023 19:30:32

Description :
Improper buffer restrictions in some Intel(R) QAT Library software before version 22.07.1 may allow a privileged user to potentially enable information disclosure via local access.

CVE ID : CVE-2023-22313
Source : secure@intel.com
CVSS Score : 2.3

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00861.html | source : secure@intel.com

Vulnerability : CWE-92


Vulnerability ID : CVE-2022-45469

First published on : 14-11-2023 19:15:14
Last modified on : 14-11-2023 19:30:41

Description :
Improper input validation for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE ID : CVE-2022-45469
Source : secure@intel.com
CVSS Score : 2.2

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2022-46646

First published on : 14-11-2023 19:15:15
Last modified on : 14-11-2023 19:30:36

Description :
Exposure of sensitive information to an unauthorized actor for some Intel Unison software may allow an authenticated user to potentially enable information disclosure via local access.

CVE ID : CVE-2022-46646
Source : secure@intel.com
CVSS Score : 2.2

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2022-46647

First published on : 14-11-2023 19:15:15
Last modified on : 14-11-2023 19:30:36

Description :
Insertion of sensitive information into log file for some Intel Unison software may allow an authenticated user to potentially enable information disclosure via local access.

CVE ID : CVE-2022-46647
Source : secure@intel.com
CVSS Score : 2.2

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-532


Vulnerability ID : CVE-2022-41659

First published on : 14-11-2023 19:15:12
Last modified on : 14-11-2023 19:30:41

Description :
Improper access control for some Intel Unison software may allow a privileged user to potentially enable denial of service via local access.

CVE ID : CVE-2022-41659
Source : secure@intel.com
CVSS Score : 1.9

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2022-46298

First published on : 14-11-2023 19:15:14
Last modified on : 14-11-2023 19:30:41

Description :
Incomplete cleanup for some Intel Unison software may allow a privileged user to potentially enable denial of service via local access.

CVE ID : CVE-2022-46298
Source : secure@intel.com
CVSS Score : 1.9

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-459


Vulnerability ID : CVE-2022-46301

First published on : 14-11-2023 19:15:14
Last modified on : 14-11-2023 19:30:36

Description :
Improper Initialization for some Intel Unison software may allow a privileged user to potentially enable denial of service via local access.

CVE ID : CVE-2022-46301
Source : secure@intel.com
CVSS Score : 1.9

References :
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html | source : secure@intel.com

Vulnerability : CWE-665


Source : siemens.com

Vulnerability ID : CVE-2023-44322

First published on : 14-11-2023 11:15:13
Last modified on : 14-11-2023 15:15:45

Description :
A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur.

CVE ID : CVE-2023-44322
Source : productcert@siemens.com
CVSS Score : 3.7

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | source : productcert@siemens.com

Vulnerability : CWE-252


Vulnerability ID : CVE-2023-43503

First published on : 14-11-2023 11:15:11
Last modified on : 14-11-2023 15:15:50

Description :
A vulnerability has been identified in COMOS (All versions < V10.4.4). Caching system in the affected application leaks sensitive information such as user and project information in cleartext via UDP.

CVE ID : CVE-2023-43503
Source : productcert@siemens.com
CVSS Score : 3.5

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf | source : productcert@siemens.com

Vulnerability : CWE-319


Vulnerability ID : CVE-2023-44321

First published on : 14-11-2023 11:15:12
Last modified on : 14-11-2023 15:15:45

Description :
A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected devices do not properly validate the length of inputs when performing certain configuration changes in the web interface allowing an authenticated attacker to cause a denial of service condition. The device needs to be restarted for the web interface to become available again.

CVE ID : CVE-2023-44321
Source : productcert@siemens.com
CVSS Score : 2.7

References :
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | source : productcert@siemens.com

Vulnerability : CWE-400


Source : github.com

Vulnerability ID : CVE-2023-47126

First published on : 14-11-2023 20:15:08
Last modified on : 14-11-2023 21:38:09

Description :
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions the login screen of the standalone install tool discloses the full path of the transient data directory (e.g. /var/www/html/var/transient/). This applies to composer-based scenarios only - โ€œclassicโ€ non-composer installations are not affected. This issue has been addressed in version 12.4.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-47126
Source : security-advisories@github.com
CVSS Score : 3.7

References :
https://github.com/TYPO3/typo3/commit/1a735dac01ec7b337ed0d80c738caa8967dea423 | source : security-advisories@github.com
https://github.com/TYPO3/typo3/security/advisories/GHSA-p2jh-95jg-2w55 | source : security-advisories@github.com
https://typo3.org/security/advisory/typo3-core-sa-2023-005 | source : security-advisories@github.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-47641

First published on : 14-11-2023 21:15:13
Last modified on : 14-11-2023 21:38:02

Description :
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Affected versions of aiohttp have a security vulnerability regarding the inconsistent interpretation of the http protocol. HTTP/1.1 is a persistent protocol, if both Content-Length(CL) and Transfer-Encoding(TE) header values are present it can lead to incorrect interpretation of two entities that parse the HTTP and we can poison other sockets with this incorrect interpretation. A possible Proof-of-Concept (POC) would be a configuration with a reverse proxy(frontend) that accepts both CL and TE headers and aiohttp as backend. As aiohttp parses anything with chunked, we can pass a chunked123 as TE, the frontend entity will ignore this header and will parse Content-Length. The impact of this vulnerability is that it is possible to bypass any proxy rule, poisoning sockets to other users like passing Authentication Headers, also if it is present an Open Redirect an attacker could combine it to redirect random users to another website and log the request. This vulnerability has been addressed in release 3.8.0 of aiohttp. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-47641
Source : security-advisories@github.com
CVSS Score : 3.4

References :
https://github.com/aio-libs/aiohttp/commit/f016f0680e4ace6742b03a70cb0382ce86abe371 | source : security-advisories@github.com
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-xx9p-xxvh-7g8j | source : security-advisories@github.com

Vulnerability : CWE-444


Source : fortinet.com

Vulnerability ID : CVE-2023-45585

First published on : 14-11-2023 18:15:55
Last modified on : 14-11-2023 18:51:33

Description :
An insertion of sensitive information into log file vulnerability [CWE-532] in FortiSIEM version 7.0.0, version 6.7.6 and below, version 6.6.3 and below, version 6.5.1 and below, version 6.4.2 and below, version 6.3.3 and below, version 6.2.1 and below, version 6.1.2 and below, version 5.4.0, version 5.3.3 and below may allow an authenticated user to view an encrypted ElasticSearch password via debug log files generated when FortiSIEM is configured with ElasticSearch Event Storage.

CVE ID : CVE-2023-45585
Source : psirt@fortinet.com
CVSS Score : 2.3

References :
https://fortiguard.com/psirt/FG-IR-23-392 | source : psirt@fortinet.com

Vulnerability : CWE-532


(66) NO SCORE VULNERABILITIES [0.0, 0.0]

Source : wordfence.com

Vulnerability ID : CVE-2023-5977

First published on : 14-11-2023 00:15:08
Last modified on : 14-11-2023 00:15:08

Description :
Rejected reason: Accidental Request.

CVE ID : CVE-2023-5977
Source : security@wordfence.com
CVSS Score : /

References :


Vulnerability ID : CVE-2023-6010

First published on : 14-11-2023 00:15:08
Last modified on : 14-11-2023 00:15:08

Description :
Rejected reason: Accidental Request.

CVE ID : CVE-2023-6010
Source : security@wordfence.com
CVSS Score : /

References :


Vulnerability ID : CVE-2023-6034

First published on : 14-11-2023 00:15:08
Last modified on : 14-11-2023 00:15:08

Description :
Rejected reason: Accidental request.

CVE ID : CVE-2023-6034
Source : security@wordfence.com
CVSS Score : /

References :


Vulnerability ID : CVE-2023-6083

First published on : 14-11-2023 00:15:08
Last modified on : 14-11-2023 00:15:08

Description :
Rejected reason: Accidental Request.

CVE ID : CVE-2023-6083
Source : security@wordfence.com
CVSS Score : /

References :


Vulnerability ID : CVE-2023-6085

First published on : 14-11-2023 00:15:08
Last modified on : 14-11-2023 00:15:08

Description :
Rejected reason: Accidental request.

CVE ID : CVE-2023-6085
Source : security@wordfence.com
CVSS Score : /

References :


Vulnerability ID : CVE-2023-6086

First published on : 14-11-2023 00:15:08
Last modified on : 14-11-2023 00:15:08

Description :
Rejected reason: Accidental request.

CVE ID : CVE-2023-6086
Source : security@wordfence.com
CVSS Score : /

References :


Vulnerability ID : CVE-2023-6087

First published on : 14-11-2023 00:15:08
Last modified on : 14-11-2023 00:15:08

Description :
Rejected reason: Accidental Request.

CVE ID : CVE-2023-6087
Source : security@wordfence.com
CVSS Score : /

References :


Vulnerability ID : CVE-2023-6088

First published on : 14-11-2023 00:15:09
Last modified on : 14-11-2023 00:15:09

Description :
Rejected reason: Accidental Request.

CVE ID : CVE-2023-6088
Source : security@wordfence.com
CVSS Score : /

References :


Vulnerability ID : CVE-2023-6089

First published on : 14-11-2023 00:15:09
Last modified on : 14-11-2023 00:15:09

Description :
Rejected reason: Accidental Request.

CVE ID : CVE-2023-6089
Source : security@wordfence.com
CVSS Score : /

References :


Vulnerability ID : CVE-2023-6092

First published on : 14-11-2023 00:15:09
Last modified on : 14-11-2023 00:15:09

Description :
Rejected reason: DUPLICATE, accidental request.

CVE ID : CVE-2023-6092
Source : security@wordfence.com
CVSS Score : /

References :


Vulnerability ID : CVE-2023-6106

First published on : 14-11-2023 00:15:09
Last modified on : 14-11-2023 00:15:09

Description :
Rejected reason: Accidental request.

CVE ID : CVE-2023-6106
Source : security@wordfence.com
CVSS Score : /

References :


Vulnerability ID : CVE-2023-6107

First published on : 14-11-2023 00:15:09
Last modified on : 14-11-2023 00:15:09

Description :
Rejected reason: Accidental Request.

CVE ID : CVE-2023-6107
Source : security@wordfence.com
CVSS Score : /

References :


Vulnerability ID : CVE-2023-6115

First published on : 14-11-2023 00:15:09
Last modified on : 14-11-2023 00:15:09

Description :
Rejected reason: DUPLICATE CVE

CVE ID : CVE-2023-6115
Source : security@wordfence.com
CVSS Score : /

References :


Source : mitre.org

Vulnerability ID : CVE-2023-45558

First published on : 14-11-2023 03:15:09
Last modified on : 14-11-2023 15:15:54

Description :
An issue in Golden v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.

CVE ID : CVE-2023-45558
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/CVE-2023-45558.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-45560

First published on : 14-11-2023 03:15:09
Last modified on : 14-11-2023 15:15:54

Description :
An issue in Yasukawa memberscard v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.

CVE ID : CVE-2023-45560
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/CVE-2023-45560.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-46445

First published on : 14-11-2023 03:15:09
Last modified on : 14-11-2023 15:15:54

Description :
An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the extension info message (RFC 8308) via a man-in-the-middle attack.

CVE ID : CVE-2023-46445
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/ronf/asyncssh/security/advisories/GHSA-cfc2-wr2v-gxm5 | source : cve@mitre.org


Vulnerability ID : CVE-2023-46446

First published on : 14-11-2023 03:15:09
Last modified on : 14-11-2023 15:15:54

Description :
An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation.

CVE ID : CVE-2023-46446
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/ronf/asyncssh/security/advisories/GHSA-c35q-ffpf-5qpm | source : cve@mitre.org


Vulnerability ID : CVE-2023-31754

First published on : 14-11-2023 04:15:07
Last modified on : 14-11-2023 15:15:54

Description :
Optimizely CMS UI before v12.16.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Admin panel.

CVE ID : CVE-2023-31754
Source : cve@mitre.org
CVSS Score : /

References :
https://labs.withsecure.com/advisories/optimizely-admin-panel-dom-xss | source : cve@mitre.org


Vulnerability ID : CVE-2023-42325

First published on : 14-11-2023 04:15:07
Last modified on : 14-11-2023 15:15:54

Description :
Cross Site Scripting (XSS) vulnerability in Netgate pfSense v.2.7.0 allows a remote attacker to gain privileges via a crafted url to the status_logs_filter_dynamic.php page.

CVE ID : CVE-2023-42325
Source : cve@mitre.org
CVSS Score : /

References :
https://docs.netgate.com/downloads/pfSense-SA-23_09.webgui.asc | source : cve@mitre.org


Vulnerability ID : CVE-2023-42327

First published on : 14-11-2023 04:15:07
Last modified on : 14-11-2023 15:15:54

Description :
Cross Site Scripting (XSS) vulnerability in Netgate pfSense v.2.7.0 allows a remote attacker to gain privileges via a crafted URL to the getserviceproviders.php page.

CVE ID : CVE-2023-42327
Source : cve@mitre.org
CVSS Score : /

References :
https://docs.netgate.com/downloads/pfSense-SA-23_08.webgui.asc | source : cve@mitre.org


Vulnerability ID : CVE-2023-42326

First published on : 14-11-2023 05:15:08
Last modified on : 14-11-2023 15:15:50

Description :
An issue in Netgate pfSense v.2.7.0 allows a remote attacker to execute arbitrary code via a crafted request to the interfaces_gif_edit.php and interfaces_gre_edit.php components.

CVE ID : CVE-2023-42326
Source : cve@mitre.org
CVSS Score : /

References :
https://docs.netgate.com/downloads/pfSense-SA-23_10.webgui.asc | source : cve@mitre.org


Vulnerability ID : CVE-2023-43900

First published on : 14-11-2023 05:15:08
Last modified on : 14-11-2023 15:15:50

Description :
Insecure Direct Object References (IDOR) in EMSigner v2.8.7 allow attackers to gain unauthorized access to application content and view sensitive data of other users via manipulation of the documentID and EncryptedDocumentId parameters.

CVE ID : CVE-2023-43900
Source : cve@mitre.org
CVSS Score : /

References :
https://secpro.llc/emsigner-cve-3/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-43901

First published on : 14-11-2023 05:15:08
Last modified on : 14-11-2023 15:15:50

Description :
Incorrect access control in the AdHoc User creation form of EMSigner v2.8.7 allows unauthenticated attackers to arbitrarily modify usernames and privileges by using the email address of a registered user.

CVE ID : CVE-2023-43901
Source : cve@mitre.org
CVSS Score : /

References :
https://secpro.llc/EMSigner-CVE-1/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-43902

First published on : 14-11-2023 05:15:08
Last modified on : 14-11-2023 15:15:50

Description :
Incorrect access control in the Forgot Your Password function of EMSigner v2.8.7 allows unauthenticated attackers to access accounts of all registered users, including those with administrator privileges via a crafted password reset token.

CVE ID : CVE-2023-43902
Source : cve@mitre.org
CVSS Score : /

References :
https://secpro.llc/emsigner-cve-2/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-45878

First published on : 14-11-2023 06:15:29
Last modified on : 14-11-2023 15:15:50

Description :
GibbonEdu Gibbon version 25.0.1 and before allows Arbitrary File Write because rubrics_visualise_saveAjax.phps does not require authentication. The endpoint accepts the img, path, and gibbonPersonID parameters. The img parameter is expected to be a base64 encoded image. If the path parameter is set, the defined path is used as the destination folder, concatenated with the absolute path of the installation directory. The content of the img parameter is base64 decoded and written to the defined file path. This allows creation of PHP files that permit Remote Code Execution (unauthenticated).

CVE ID : CVE-2023-45878
Source : cve@mitre.org
CVSS Score : /

References :
https://herolab.usd.de/security-advisories/usd-2023-0025/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-45879

First published on : 14-11-2023 06:15:29
Last modified on : 14-11-2023 15:15:50

Description :
GibbonEdu Gibbon version 25.0.0 allows HTML Injection via an IFRAME element to the Messager component.

CVE ID : CVE-2023-45879
Source : cve@mitre.org
CVSS Score : /

References :
https://herolab.usd.de/security-advisories/usd-2023-0019/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-45880

First published on : 14-11-2023 06:15:29
Last modified on : 14-11-2023 15:15:50

Description :
GibbonEdu Gibbon through version 25.0.0 allows Directory Traversal via the report template builder. An attacker can create a new Asset Component. The templateFileDestination parameter can be set to an arbitrary pathname (and extension). This allows creation of PHP files outside of the uploads directory, directly in the webroot.

CVE ID : CVE-2023-45880
Source : cve@mitre.org
CVSS Score : /

References :
https://herolab.usd.de/security-advisories/usd-2023-0022/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-45881

First published on : 14-11-2023 06:15:29
Last modified on : 14-11-2023 15:15:50

Description :
GibbonEdu Gibbon through version 25.0.0 allows /modules/Planner/resources_addQuick_ajaxProcess.php file upload with resultant XSS. The imageAsLinks parameter must be set to Y to return HTML code. The filename attribute of the bodyfile1 parameter is reflected in the response.

CVE ID : CVE-2023-45881
Source : cve@mitre.org
CVSS Score : /

References :
https://herolab.usd.de/security-advisories/usd-2023-0024/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-45684

First published on : 14-11-2023 15:15:07
Last modified on : 14-11-2023 15:15:45

Description :
Northern.tech CFEngine Enterprise before 3.21.3 allows SQL Injection. The fixed versions are 3.18.6 and 3.21.3. The earliest affected version is 3.6.0. The issue is in the Mission Portal login page in the CFEngine hub.

CVE ID : CVE-2023-45684
Source : cve@mitre.org
CVSS Score : /

References :
https://cfengine.com/blog/2023/cve-2023-45684/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-48020

First published on : 14-11-2023 15:15:07
Last modified on : 14-11-2023 15:15:45

Description :
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/task/changeStatus.

CVE ID : CVE-2023-48020
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/moonsabc123/dreamer_cms/blob/main/Enable%20CSRF%20for%20Task%20Management%20Office.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-48021

First published on : 14-11-2023 15:15:07
Last modified on : 14-11-2023 15:15:45

Description :
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/task/update.

CVE ID : CVE-2023-48021
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20CSRF%20in%20the%20task%20management%20editing%20task%20area.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-47262

First published on : 14-11-2023 16:15:27
Last modified on : 14-11-2023 18:04:30

Description :
In Abbott ID NOW before 7.1, settings can be modified via physical access to an internal serial port.

CVE ID : CVE-2023-47262
Source : cve@mitre.org
CVSS Score : /

References :
https://www.cybersecurity.abbott/home/product-advisories.html | source : cve@mitre.org
https://www.cybersecurity.abbott/home/product-advisories/id-now.html | source : cve@mitre.org


Vulnerability ID : CVE-2023-48094

First published on : 14-11-2023 17:15:08
Last modified on : 14-11-2023 18:04:30

Description :
A cross-site scripting (XSS) vulnerability in CesiumJS v1.111 allows attackers to execute arbitrary code in the context of the victim's browser via sending a crafted payload to /container_files/public_html/doc/index.html.

CVE ID : CVE-2023-48094
Source : cve@mitre.org
CVSS Score : /

References :
https://gist.github.com/cd80/33ab71cc49c42feb55de3e574753320f | source : cve@mitre.org


Vulnerability ID : CVE-2023-47384

First published on : 14-11-2023 20:15:08
Last modified on : 14-11-2023 21:38:09

Description :
MP4Box GPAC v2.3-DEV-rev617-g671976fcc-master was discovered to contain a memory leak in the function gf_isom_add_chapter at /isomedia/isom_write.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file.

CVE ID : CVE-2023-47384
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/gpac/gpac/issues/2672 | source : cve@mitre.org


Vulnerability ID : CVE-2022-45781

First published on : 14-11-2023 22:15:28
Last modified on : 14-11-2023 22:15:28

Description :
Buffer Overflow vulnerability in Tenda AX1803 v1.0.0.1_2994 and earlier allows attackers to run arbitrary code via /goform/SetOnlineDevName.

CVE ID : CVE-2022-45781
Source : cve@mitre.org
CVSS Score : /

References :
https://www.cnblogs.com/FALL3N/p/16813932.html | source : cve@mitre.org


Vulnerability ID : CVE-2023-46022

First published on : 14-11-2023 22:15:30
Last modified on : 14-11-2023 22:15:30

Description :
SQL Injection vulnerability in delete.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary SQL commands via the 'bid' parameter.

CVE ID : CVE-2023-46022
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/ersinerenler/CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability | source : cve@mitre.org


Vulnerability ID : CVE-2023-46023

First published on : 14-11-2023 22:15:30
Last modified on : 14-11-2023 22:15:30

Description :
SQL injection vulnerability in addTask.php in Code-Projects Simple Task List 1.0 allows attackers to obtain sensitive information via the 'status' parameter.

CVE ID : CVE-2023-46023
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/ersinerenler/Code-Projects-Simple-Task-List-1.0/blob/main/CVE-2023-46023-Code-Projects-Simple-Task-List-1.0-SQL-Injection-Vulnerability.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-46024

First published on : 14-11-2023 22:15:30
Last modified on : 14-11-2023 22:15:30

Description :
SQL Injection vulnerability in index.php in phpgurukul Teacher Subject Allocation Management System 1.0 allows attackers to run arbitrary SQL commands and obtain sensitive information via the 'searchdata' parameter.

CVE ID : CVE-2023-46024
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46024-phpgurukul-Teacher-Subject-Allocation-Management-System-1.0-SQL-Injection-Vulnerability.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-46025

First published on : 14-11-2023 22:15:30
Last modified on : 14-11-2023 22:15:30

Description :
SQL Injection vulnerability in teacher-info.php in phpgurukul Teacher Subject Allocation Management System 1.0 allows attackers to obtain sensitive information via the 'editid' parameter.

CVE ID : CVE-2023-46025
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46025-phpgurukul-Teacher-Subject-Allocation-Management-System-1.0-SQL-Injection-Vulnerability.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-46026

First published on : 14-11-2023 22:15:30
Last modified on : 14-11-2023 22:15:30

Description :
Cross Site Scripting (XSS) vulnerability in profile.php in phpgurukul Teacher Subject Allocation Management System 1.0 allows attackers to run arbitrary code via the 'adminname' and 'email' parameters.

CVE ID : CVE-2023-46026
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46026-PHPGurukul-Teacher-Subject-Allocation-Management-System-1.0-Stored-Cross-Site-Scripting-Vulnerability.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-46580

First published on : 14-11-2023 22:15:30
Last modified on : 14-11-2023 22:15:30

Description :
Cross-Site Scripting (XSS) vulnerability in Inventory Management V1.0 allows attackers to execute arbitrary code via the pname parameter of the editProduct.php component.

CVE ID : CVE-2023-46580
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46580-Code-Projects-Inventory-Management-1.0-Stored-Cross-Site-Scripting-Vulnerability.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-46581

First published on : 14-11-2023 22:15:30
Last modified on : 14-11-2023 22:15:30

Description :
SQL injection vulnerability in Inventory Management v.1.0 allows a local attacker to execute arbitrary code via the name, uname and email parameters in the registration.php component.

CVE ID : CVE-2023-46581
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46581-Code-Projects-Inventory-Management-1.0-SQL-Injection-Vulnerability.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-46582

First published on : 14-11-2023 22:15:30
Last modified on : 14-11-2023 22:15:30

Description :
SQL injection vulnerability in Inventory Management v.1.0 allows a local attacker to execute arbitrary SQL commands via the id paramter in the deleteProduct.php component.

CVE ID : CVE-2023-46582
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46582-Code-Projects-Inventory-Management-1.0-SQL-Injection-Vulnerability.md | source : cve@mitre.org


Source : jpcert.or.jp

Vulnerability ID : CVE-2023-47609

First published on : 14-11-2023 06:15:29
Last modified on : 14-11-2023 15:15:50

Description :
SQL injection vulnerability in OSS Calendar versions prior to v.2.0.3 allows a remote authenticated attacker to execute arbitrary code or obtain and/or alter the information stored in the database by sending a specially crafted request.

CVE ID : CVE-2023-47609
Source : vultures@jpcert.or.jp
CVSS Score : /

References :
https://jvn.jp/en/jp/JVN67822421/ | source : vultures@jpcert.or.jp
https://oss-calendar.com/news/20231113/ | source : vultures@jpcert.or.jp


Source : amd.com

Vulnerability ID : CVE-2021-26345

First published on : 14-11-2023 19:15:10
Last modified on : 14-11-2023 19:30:45

Description :
Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.

CVE ID : CVE-2021-26345
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | source : psirt@amd.com


Vulnerability ID : CVE-2021-46748

First published on : 14-11-2023 19:15:10
Last modified on : 14-11-2023 19:30:45

Description :
Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.

CVE ID : CVE-2021-46748
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | source : psirt@amd.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | source : psirt@amd.com


Vulnerability ID : CVE-2021-46758

First published on : 14-11-2023 19:15:10
Last modified on : 14-11-2023 19:30:45

Description :
Insufficient validation of SPI flash addresses in the ASP (AMD Secure Processor) bootloader may allow an attacker to read data in memory mapped beyond SPI flash resulting in a potential loss of availability and integrity.

CVE ID : CVE-2021-46758
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | source : psirt@amd.com


Vulnerability ID : CVE-2021-46766

First published on : 14-11-2023 19:15:10
Last modified on : 14-11-2023 19:30:45

Description :
Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.

CVE ID : CVE-2021-46766
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | source : psirt@amd.com
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | source : psirt@amd.com


Vulnerability ID : CVE-2021-46774

First published on : 14-11-2023 19:15:10
Last modified on : 14-11-2023 19:30:45

Description :
Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

CVE ID : CVE-2021-46774
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | source : psirt@amd.com
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | source : psirt@amd.com


Vulnerability ID : CVE-2022-23820

First published on : 14-11-2023 19:15:10
Last modified on : 14-11-2023 19:30:45

Description :
Failure to validate the AMD SMM communication buffer may allow an attacker to corrupt the SMRAM potentially leading to arbitrary code execution.

CVE ID : CVE-2022-23820
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | source : psirt@amd.com
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | source : psirt@amd.com


Vulnerability ID : CVE-2022-23821

First published on : 14-11-2023 19:15:10
Last modified on : 14-11-2023 19:30:45

Description :
Improper access control in System Management Mode (SMM) may allow an attacker to write to SPI ROM potentially leading to arbitrary code execution.

CVE ID : CVE-2022-23821
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | source : psirt@amd.com


Vulnerability ID : CVE-2022-23830

First published on : 14-11-2023 19:15:10
Last modified on : 14-11-2023 19:30:45

Description :
SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.

CVE ID : CVE-2022-23830
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | source : psirt@amd.com


Vulnerability ID : CVE-2023-20519

First published on : 14-11-2023 19:15:15
Last modified on : 14-11-2023 19:30:36

Description :
A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.

CVE ID : CVE-2023-20519
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | source : psirt@amd.com


Vulnerability ID : CVE-2023-20521

First published on : 14-11-2023 19:15:15
Last modified on : 14-11-2023 19:30:36

Description :
TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.

CVE ID : CVE-2023-20521
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | source : psirt@amd.com
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | source : psirt@amd.com


Vulnerability ID : CVE-2023-20526

First published on : 14-11-2023 19:15:15
Last modified on : 14-11-2023 19:30:36

Description :
Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.

CVE ID : CVE-2023-20526
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | source : psirt@amd.com
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | source : psirt@amd.com


Vulnerability ID : CVE-2023-20533

First published on : 14-11-2023 19:15:15
Last modified on : 14-11-2023 19:30:36

Description :
Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

CVE ID : CVE-2023-20533
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | source : psirt@amd.com
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | source : psirt@amd.com


Vulnerability ID : CVE-2023-20563

First published on : 14-11-2023 19:15:15
Last modified on : 14-11-2023 19:30:36

Description :
Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-20563
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | source : psirt@amd.com


Vulnerability ID : CVE-2023-20565

First published on : 14-11-2023 19:15:15
Last modified on : 14-11-2023 19:30:36

Description :
Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.

CVE ID : CVE-2023-20565
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | source : psirt@amd.com


Vulnerability ID : CVE-2023-20566

First published on : 14-11-2023 19:15:15
Last modified on : 14-11-2023 19:30:36

Description :
Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.

CVE ID : CVE-2023-20566
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | source : psirt@amd.com


Vulnerability ID : CVE-2023-20567

First published on : 14-11-2023 19:15:15
Last modified on : 14-11-2023 19:30:36

Description :
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.

CVE ID : CVE-2023-20567
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | source : psirt@amd.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | source : psirt@amd.com


Vulnerability ID : CVE-2023-20568

First published on : 14-11-2023 19:15:15
Last modified on : 14-11-2023 19:30:36

Description :
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.

CVE ID : CVE-2023-20568
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | source : psirt@amd.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | source : psirt@amd.com


Vulnerability ID : CVE-2023-20571

First published on : 14-11-2023 19:15:15
Last modified on : 14-11-2023 19:30:36

Description :
A race condition in System Management Mode (SMM) code may allow an attacker using a compromised user space to leverage CVE-2018-8897 potentially resulting in privilege escalation.

CVE ID : CVE-2023-20571
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | source : psirt@amd.com


Vulnerability ID : CVE-2023-20592

First published on : 14-11-2023 19:15:16
Last modified on : 14-11-2023 19:30:36

Description :
Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.

CVE ID : CVE-2023-20592
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3005 | source : psirt@amd.com


Vulnerability ID : CVE-2023-20596

First published on : 14-11-2023 19:15:16
Last modified on : 14-11-2023 19:30:36

Description :
Improper input validation in the SMM Supervisor may allow an attacker with a compromised SMI handler to gain Ring0 access potentially leading to arbitrary code execution.

CVE ID : CVE-2023-20596
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7011 | source : psirt@amd.com


Vulnerability ID : CVE-2023-31320

First published on : 14-11-2023 19:15:25
Last modified on : 14-11-2023 19:30:24

Description :
Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.

CVE ID : CVE-2023-31320
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | source : psirt@amd.com


Source : vmware.com

Vulnerability ID : CVE-2023-34060

First published on : 14-11-2023 21:15:09
Last modified on : 14-11-2023 21:38:02

Description :
VMware Cloud Director Appliance contains an authentication bypass vulnerability in case VMware Cloud Director Appliance was upgraded to 10.5 from an older version. On an upgraded version of VMware Cloud Director Appliance 10.5, a malicious actor with network access to the appliance can bypass login restrictions when authenticating on port 22 (ssh) or port 5480 (appliance management console) . This bypass is not present on port 443 (VCD provider and tenant login). On a new installation of VMware Cloud Director Appliance 10.5, the bypass is not present.

CVE ID : CVE-2023-34060
Source : security@vmware.com
CVSS Score : /

References :
https://www.vmware.com/security/advisories/VMSA-2023-0026.html | source : security@vmware.com


This website uses the NVD API, but is not approved or certified by it.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! Youโ€™ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.