Latest vulnerabilities of Tuesday, October 17, 2023

Latest vulnerabilities of Tuesday, October 17, 2023
https://www.securitricks.com/content/images/size/w600/format/webp/2023/12/VULNERABILITIES-REPORTS-LOGO.png
{{titre}}

Last update performed on 10/17/2023 at 11:58:02 PM

(8) CRITICAL VULNERABILITIES [9.0, 10.0]

Source : zuso.ai

Vulnerability ID : CVE-2023-34207

First published on : 17-10-2023 04:15:11
Last modified on : 17-10-2023 12:38:17

Description :
Unrestricted upload of file with dangerous type vulnerability in create template function in EasyUse MailHunter Ultimate 2023 and earlier allows remote authenticated users to perform arbitrary system commands with ‘NT Authority\SYSTEM‘ privilege via a crafted ZIP archive.

CVE ID : CVE-2023-34207
Source : ART@zuso.ai
CVSS Score : 9.9

References :
https://zuso.ai/Advisory/ZA-2023-04 | source : ART@zuso.ai

Vulnerability : CWE-434


Source : liferay.com

Vulnerability ID : CVE-2023-42497

First published on : 17-10-2023 08:15:09
Last modified on : 17-10-2023 12:38:17

Description :
Reflected cross-site scripting (XSS) vulnerability on the Export for Translation page in Liferay Portal 7.4.3.4 through 7.4.3.85, and Liferay DXP 7.4 before update 86 allows remote attackers to inject arbitrary web script or HTML via the `_com_liferay_translation_web_internal_portlet_TranslationPortlet_redirect` parameter.

CVE ID : CVE-2023-42497
Source : security@liferay.com
CVSS Score : 9.6

References :
https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42497 | source : security@liferay.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-44311

First published on : 17-10-2023 10:15:09
Last modified on : 17-10-2023 12:38:17

Description :
Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module's OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941.

CVE ID : CVE-2023-44311
Source : security@liferay.com
CVSS Score : 9.6

References :
https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311 | source : security@liferay.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-42627

First published on : 17-10-2023 13:15:11
Last modified on : 17-10-2023 15:07:46

Description :
Multiple stored cross-site scripting (XSS) vulnerabilities in the Commerce module in Liferay Portal 7.3.5 through 7.4.3.91, and Liferay DXP 7.3 update 33 and earlier, and 7.4 before update 92 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a (1) Shipping Name, (2) Shipping Phone Number, (3) Shipping Address, (4) Shipping Address 2, (5) Shipping Address 3, (6) Shipping Zip, (7) Shipping City, (8) Shipping Region (9), Shipping Country, (10) Billing Name, (11) Billing Phone Number, (12) Billing Address, (13) Billing Address 2, (14) Billing Address 3, (15) Billing Zip, (16) Billing City, (17) Billing Region, (18) Billing Country, or (19) Region Code.

CVE ID : CVE-2023-42627
Source : security@liferay.com
CVSS Score : 9.6

References :
https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42627 | source : security@liferay.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-42629

First published on : 17-10-2023 09:15:10
Last modified on : 17-10-2023 12:38:17

Description :
Stored cross-site scripting (XSS) vulnerability in the manage vocabulary page in Liferay Portal 7.4.2 through 7.4.3.87, and Liferay DXP 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a Vocabulary's 'description' text field.

CVE ID : CVE-2023-42629
Source : security@liferay.com
CVSS Score : 9.0

References :
https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42629 | source : security@liferay.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-44309

First published on : 17-10-2023 09:15:10
Last modified on : 17-10-2023 12:38:17

Description :
Multiple stored cross-site scripting (XSS) vulnerabilities in the fragment components in Liferay Portal 7.4.2 through 7.4.3.53, and Liferay DXP 7.4 before update 54 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into any non-HTML field of a linked source asset.

CVE ID : CVE-2023-44309
Source : security@liferay.com
CVSS Score : 9.0

References :
https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44309 | source : security@liferay.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-44310

First published on : 17-10-2023 10:15:09
Last modified on : 17-10-2023 12:38:17

Description :
Stored cross-site scripting (XSS) vulnerability in Page Tree menu Liferay Portal 7.3.6 through 7.4.3.78, and Liferay DXP 7.3 fix pack 1 through update 23, and 7.4 before update 79 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into page's "Name" text field.

CVE ID : CVE-2023-44310
Source : security@liferay.com
CVSS Score : 9.0

References :
https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44310 | source : security@liferay.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-42628

First published on : 17-10-2023 12:15:10
Last modified on : 17-10-2023 12:38:17

Description :
Stored cross-site scripting (XSS) vulnerability in the Wiki widget in Liferay Portal 7.1.0 through 7.4.3.87, and Liferay DXP 7.0 fix pack 83 through 102, 7.1 fix pack 28 and earlier, 7.2 fix pack 20 and earlier, 7.3 update 33 and earlier, and 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML into a parent wiki page via a crafted payload injected into a wiki page's ‘Content’ text field.

CVE ID : CVE-2023-42628
Source : security@liferay.com
CVSS Score : 9.0

References :
https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42628 | source : security@liferay.com

Vulnerability : CWE-79


(10) HIGH VULNERABILITIES [7.0, 8.9]

Source : mitre.org

Vulnerability ID : CVE-2023-45358

First published on : 17-10-2023 05:15:50
Last modified on : 17-10-2023 12:38:17

Description :
Archer Platform 6.x before 6.13 P2 HF2 (6.13.0.2.2) contains a stored cross-site scripting (XSS) vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. 6.14 (6.14.0) is also a fixed release.

CVE ID : CVE-2023-45358
Source : cve@mitre.org
CVSS Score : 8.5

References :
https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617 | source : cve@mitre.org


Vulnerability ID : CVE-2023-39902

First published on : 17-10-2023 12:15:09
Last modified on : 17-10-2023 12:38:17

Description :
A software vulnerability has been identified in the U-Boot Secondary Program Loader (SPL) before 2023.07 on select NXP i.MX 8M family processors. Under certain conditions, a crafted Flattened Image Tree (FIT) format structure can be used to overwrite SPL memory, allowing unauthenticated software to execute on the target, leading to privilege escalation. This affects i.MX 8M, i.MX 8M Mini, i.MX 8M Nano, and i.MX 8M Plus.

CVE ID : CVE-2023-39902
Source : cve@mitre.org
CVSS Score : 7.0

References :
https://community.nxp.com/t5/i-MX-Security/U-Boot-Secondary-Program-Loader-Authentication-Vulnerability-CVE/ta-p/1736196 | source : cve@mitre.org
https://nxp.com | source : cve@mitre.org


Source : hcl.com

Vulnerability ID : CVE-2023-37537

First published on : 17-10-2023 15:15:10
Last modified on : 17-10-2023 20:30:59

Description :
An unquoted service path vulnerability in HCL AppScan Presence, deployed as a Windows service in HCL AppScan on Cloud (ASoC), may allow a local attacker to gain elevated privileges.

CVE ID : CVE-2023-37537
Source : psirt@hcl.com
CVSS Score : 7.8

References :
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108018 | source : psirt@hcl.com


Source : zuso.ai

Vulnerability ID : CVE-2023-34210

First published on : 17-10-2023 05:15:50
Last modified on : 17-10-2023 12:38:17

Description :
SQL Injection in create customer group function in EasyUse MailHunter Ultimate 2023 and earlier allow remote authenticated users to execute arbitrary SQL commands via the ctl00$ContentPlaceHolder1$txtCustSQL parameter.

CVE ID : CVE-2023-34210
Source : ART@zuso.ai
CVSS Score : 7.7

References :
https://zuso.ai/Advisory/ZA-2023-07 | source : ART@zuso.ai

Vulnerability : CWE-89


Source : us.ibm.com

Vulnerability ID : CVE-2022-22375

First published on : 17-10-2023 02:15:10
Last modified on : 17-10-2023 12:38:17

Description :
IBM Security Verify Privilege On-Premises 11.5 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 221681.

CVE ID : CVE-2022-22375
Source : psirt@us.ibm.com
CVSS Score : 7.2

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/221681 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047202 | source : psirt@us.ibm.com

Vulnerability : CWE-434


Source : patchstack.com

Vulnerability ID : CVE-2023-45005

First published on : 17-10-2023 10:15:10
Last modified on : 17-10-2023 12:38:17

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Castos Seriously Simple Stats plugin <= 1.5.1 versions.

CVE ID : CVE-2023-45005
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/seriously-simple-stats/wordpress-seriously-simple-stats-plugin-1-5-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-45003

First published on : 17-10-2023 11:15:10
Last modified on : 17-10-2023 12:38:17

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Arrow Plugins Social Feed | Custom Feed for Social Media Networks plugin <= 2.2.0 versions.

CVE ID : CVE-2023-45003
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/wp-social-feed/wordpress-social-feed-plugin-2-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-45004

First published on : 17-10-2023 12:15:10
Last modified on : 17-10-2023 12:38:17

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in wp3sixty Woo Custom Emails plugin <= 2.2 versions.

CVE ID : CVE-2023-45004
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/woo-custom-emails/wordpress-woo-custom-emails-plugin-2-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-45006

First published on : 17-10-2023 12:15:10
Last modified on : 17-10-2023 12:38:17

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ByConsole WooODT Lite – WooCommerce Order Delivery or Pickup with Date Time Location plugin <= 2.4.6 versions.

CVE ID : CVE-2023-45006
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/byconsole-woo-order-delivery-time/wordpress-wooodt-lite-plugin-2-4-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-45007

First published on : 17-10-2023 12:15:10
Last modified on : 17-10-2023 12:38:17

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fotomoto plugin <= 1.2.8 versions.

CVE ID : CVE-2023-45007
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/fotomoto/wordpress-fotomoto-plugin-1-2-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


(29) MEDIUM VULNERABILITIES [4.0, 6.9]

Source : eaton.com

Vulnerability ID : CVE-2023-43776

First published on : 17-10-2023 13:15:11
Last modified on : 17-10-2023 15:07:46

Description :
Eaton easyE4 PLC offers a device password protection functionality to facilitate a secure connection and prevent unauthorized access. It was observed that the device password was stored with a weak encoding algorithm in the easyE4 program file when exported to SD card (*.PRG file ending).

CVE ID : CVE-2023-43776
Source : CybersecurityCOE@eaton.com
CVSS Score : 6.8

References :
https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2023-1010.pdf | source : CybersecurityCOE@eaton.com

Vulnerability : CWE-261


Vulnerability ID : CVE-2023-43777

First published on : 17-10-2023 13:15:11
Last modified on : 17-10-2023 15:07:46

Description :
Eaton easySoft software is used to program easy controllers and displays for configuring, programming and defining parameters for all the intelligent relays. This software has a password protection functionality to secure the project file from unauthorized access. This password was being stored insecurely and could be retrieved by skilled adversaries.

CVE ID : CVE-2023-43777
Source : CybersecurityCOE@eaton.com
CVSS Score : 5.9

References :
https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2023-1011.pdf | source : CybersecurityCOE@eaton.com

Vulnerability : CWE-256


Source : hpe.com

Vulnerability ID : CVE-2023-4896

First published on : 17-10-2023 20:15:10
Last modified on : 17-10-2023 20:30:59

Description :
A vulnerability exists which allows an authenticated attacker to access sensitive information on the AirWave Management Platform web-based management interface. Successful exploitation allows the attacker to gain access to some data that could be further exploited to laterally access devices managed and monitored by the AirWave server.

CVE ID : CVE-2023-4896
Source : security-alert@hpe.com
CVSS Score : 6.8

References :
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-015.txt | source : security-alert@hpe.com


Source : grafana.com

Vulnerability ID : CVE-2023-4399

First published on : 17-10-2023 08:15:09
Last modified on : 17-10-2023 12:38:17

Description :
Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address.

CVE ID : CVE-2023-4399
Source : security@grafana.com
CVSS Score : 6.6

References :
https://grafana.com/security/security-advisories/cve-2023-4399/ | source : security@grafana.com

Vulnerability : CWE-183


Source : hq.dhs.gov

Vulnerability ID : CVE-2023-4215

First published on : 17-10-2023 00:15:11
Last modified on : 17-10-2023 12:38:17

Description :
Advantech WebAccess version 9.1.3 contains an exposure of sensitive information to an unauthorized actor vulnerability that could leak user credentials.

CVE ID : CVE-2023-4215
Source : ics-cert@hq.dhs.gov
CVSS Score : 6.5

References :
https://www.cisa.gov/news-events/ics-advisories/icsa-23-285-15 | source : ics-cert@hq.dhs.gov

Vulnerability : CWE-200


Source : us.ibm.com

Vulnerability ID : CVE-2021-29913

First published on : 17-10-2023 02:15:09
Last modified on : 17-10-2023 12:38:17

Description :
IBM Security Verify Privilege On-Premise 11.5 could allow an authenticated user to obtain sensitive information or perform unauthorized actions due to improper input validation. IBM X-Force ID: 207898.

CVE ID : CVE-2021-29913
Source : psirt@us.ibm.com
CVSS Score : 6.5

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/207898 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047202 | source : psirt@us.ibm.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2022-22385

First published on : 17-10-2023 02:15:10
Last modified on : 17-10-2023 12:38:17

Description :
IBM Security Verify Privilege On-Premises 11.5 could disclose sensitive information to an attacked due to the transmission of data in clear text. IBM X-Force ID: 221962.

CVE ID : CVE-2022-22385
Source : psirt@us.ibm.com
CVSS Score : 5.9

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/221962 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047202 | source : psirt@us.ibm.com

Vulnerability : CWE-319


Vulnerability ID : CVE-2023-40372

First published on : 17-10-2023 00:15:10
Last modified on : 17-10-2023 12:38:17

Description :
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to denial of service with a specially crafted SQL statement using External Tables. IBM X-Force ID: 263499.

CVE ID : CVE-2023-40372
Source : psirt@us.ibm.com
CVSS Score : 5.3

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/263499 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047561 | source : psirt@us.ibm.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2023-40373

First published on : 17-10-2023 00:15:10
Last modified on : 17-10-2023 12:38:17

Description :
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) is vulnerable to denial of service with a specially crafted query containing common table expressions. IBM X-Force ID: 263574.

CVE ID : CVE-2023-40373
Source : psirt@us.ibm.com
CVSS Score : 5.3

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/263574 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047563 | source : psirt@us.ibm.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2022-22377

First published on : 17-10-2023 01:15:09
Last modified on : 17-10-2023 12:38:17

Description :
IBM Security Verify Privilege On-Premises 11.5 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 221827.

CVE ID : CVE-2022-22377
Source : psirt@us.ibm.com
CVSS Score : 5.3

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/221827 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047202 | source : psirt@us.ibm.com

Vulnerability : CWE-311


Vulnerability ID : CVE-2021-20581

First published on : 17-10-2023 02:15:09
Last modified on : 17-10-2023 12:38:17

Description :
IBM Security Verify Privilege On-Premises 11.5 could allow a user to obtain sensitive information due to insufficient session expiration. IBM X-Force ID: 199324.

CVE ID : CVE-2021-20581
Source : psirt@us.ibm.com
CVSS Score : 5.3

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/199324 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047202 | source : psirt@us.ibm.com

Vulnerability : CWE-613


Vulnerability ID : CVE-2022-22386

First published on : 17-10-2023 02:15:10
Last modified on : 17-10-2023 12:38:17

Description :
IBM Security Verify Privilege On-Premises 11.5 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 221963.

CVE ID : CVE-2022-22386
Source : psirt@us.ibm.com
CVSS Score : 5.3

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/221963 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047202 | source : psirt@us.ibm.com

Vulnerability : CWE-311


Vulnerability ID : CVE-2022-43889

First published on : 17-10-2023 02:15:10
Last modified on : 17-10-2023 12:38:17

Description :
IBM Security Verify Privilege On-Premises 11.5 could disclose sensitive information through an HTTP request that could aid an attacker in further attacks against the system. IBM X-Force ID: 240452.

CVE ID : CVE-2022-43889
Source : psirt@us.ibm.com
CVSS Score : 5.3

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/240452 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047202 | source : psirt@us.ibm.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-38719

First published on : 17-10-2023 00:15:10
Last modified on : 17-10-2023 12:38:17

Description :
IBM Db2 11.5 could allow a local user with special privileges to cause a denial of service during database deactivation on DPF. IBM X-Force ID: 261607.

CVE ID : CVE-2023-38719
Source : psirt@us.ibm.com
CVSS Score : 5.1

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/261607 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047558 | source : psirt@us.ibm.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2022-22380

First published on : 17-10-2023 02:15:10
Last modified on : 17-10-2023 12:38:17

Description :
IBM Security Verify Privilege On-Premises 11.5 could allow an attacker to spoof a trusted entity due to improperly validating certificates. IBM X-Force ID: 221957.

CVE ID : CVE-2022-22380
Source : psirt@us.ibm.com
CVSS Score : 5.0

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/221957 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047202 | source : psirt@us.ibm.com

Vulnerability : CWE-295


Vulnerability ID : CVE-2022-22384

First published on : 17-10-2023 01:15:09
Last modified on : 17-10-2023 12:38:17

Description :
IBM Security Verify Privilege On-Premises 11.5 could allow an attacker to modify messages returned from the server due to hazardous input validation. IBM X-Force ID: 221961.

CVE ID : CVE-2022-22384
Source : psirt@us.ibm.com
CVSS Score : 4.3

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/221961 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047202 | source : psirt@us.ibm.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2021-38859

First published on : 17-10-2023 02:15:10
Last modified on : 17-10-2023 12:38:17

Description :
IBM Security Verify Privilege On-Premises 11.5 could allow a user to obtain version number information using a specially crafted HTTP request that could be used in further attacks against the system. IBM X-Force ID: 207899.

CVE ID : CVE-2021-38859
Source : psirt@us.ibm.com
CVSS Score : 4.3

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/207899 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047202 | source : psirt@us.ibm.com

Vulnerability : CWE-200


Source : zuso.ai

Vulnerability ID : CVE-2023-34208

First published on : 17-10-2023 04:15:12
Last modified on : 17-10-2023 12:38:17

Description :
Path Traversal in create template function in EasyUse MailHunter Ultimate 2023 and earlier allow remote authenticated users to extract files into arbitrary directories via a crafted ZIP archive.

CVE ID : CVE-2023-34208
Source : ART@zuso.ai
CVSS Score : 6.5

References :
https://zuso.ai/Advisory/ZA-2023-05 | source : ART@zuso.ai

Vulnerability : CWE-22


Vulnerability ID : CVE-2023-34209

First published on : 17-10-2023 05:15:50
Last modified on : 17-10-2023 12:38:17

Description :
Exposure of Sensitive System Information to an Unauthorized Control Sphere in create template function in EasyUse MailHunter Ultimate 2023 and earlier allow remote authenticated users to obtain the absolute path via unencrypted VIEWSTATE parameter.

CVE ID : CVE-2023-34209
Source : ART@zuso.ai
CVSS Score : 5.0

References :
https://zuso.ai/Advisory/ZA-2023-06 | source : ART@zuso.ai

Vulnerability : CWE-497


Source : github.com

Vulnerability ID : CVE-2023-43794

First published on : 17-10-2023 21:15:46
Last modified on : 17-10-2023 21:15:46

Description :
Nocodb is an open source Airtable alternative. Affected versions of nocodb contain a SQL injection vulnerability, that allows an authenticated attacker with creator access to query the underlying database. By supplying a specially crafted payload to the given an attacker can inject arbitrary SQL queries to be executed. Since this is a blind SQL injection, an attacker may need to use time-based payloads which would include a function to delay execution for a given number of seconds. The response time indicates, whether the result of the query execution was true or false. Depending on the result, the HTTP response will be returned after a given number of seconds, indicating TRUE, or immediately, indicating FALSE. In that way, an attacker can reveal the data present in the database. This vulnerability has been addressed in version 0.111.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as `GHSL-2023-141`.

CVE ID : CVE-2023-43794
Source : security-advisories@github.com
CVSS Score : 6.5

References :
https://github.com/nocodb/nocodb/security/advisories/GHSA-3m5q-q39v-xf8f | source : security-advisories@github.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-45803

First published on : 17-10-2023 20:15:10
Last modified on : 17-10-2023 20:30:59

Description :
urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.

CVE ID : CVE-2023-45803
Source : security-advisories@github.com
CVSS Score : 4.2

References :
https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9 | source : security-advisories@github.com
https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4 | source : security-advisories@github.com
https://www.rfc-editor.org/rfc/rfc9110.html#name-get | source : security-advisories@github.com

Vulnerability : CWE-200


Source : vuldb.com

Vulnerability ID : CVE-2011-10004

First published on : 17-10-2023 00:15:10
Last modified on : 17-10-2023 12:38:17

Description :
A vulnerability was found in reciply Plugin up to 1.1.7 on WordPress. It has been rated as critical. This issue affects some unknown processing of the file uploadImage.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. Upgrading to version 1.1.8 is able to address this issue. The identifier of the patch is e3ff616dc08d3aadff9253f1085e13f677d0c676. It is recommended to upgrade the affected component. The identifier VDB-242189 was assigned to this vulnerability.

CVE ID : CVE-2011-10004
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/wp-plugins/reciply/commit/e3ff616dc08d3aadff9253f1085e13f677d0c676 | source : cna@vuldb.com
https://vuldb.com/?ctiid.242189 | source : cna@vuldb.com
https://vuldb.com/?id.242189 | source : cna@vuldb.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2012-10016

First published on : 17-10-2023 00:15:10
Last modified on : 17-10-2023 12:38:17

Description :
A vulnerability classified as problematic has been found in Halulu simple-download-button-shortcode Plugin 1.0 on WordPress. Affected is an unknown function of the file simple-download-button_dl.php of the component Download Handler. The manipulation of the argument file leads to information disclosure. It is possible to launch the attack remotely. Upgrading to version 1.1 is able to address this issue. The patch is identified as e648a8706818297cf02a665ae0bae1c069dea5f1. It is recommended to upgrade the affected component. VDB-242190 is the identifier assigned to this vulnerability.

CVE ID : CVE-2012-10016
Source : cna@vuldb.com
CVSS Score : 4.3

References :
https://github.com/wp-plugins/simple-download-button-shortcode/commit/e648a8706818297cf02a665ae0bae1c069dea5f1 | source : cna@vuldb.com
https://vuldb.com/?ctiid.242190 | source : cna@vuldb.com
https://vuldb.com/?id.242190 | source : cna@vuldb.com

Vulnerability : CWE-200


Source : patchstack.com

Vulnerability ID : CVE-2023-24385

First published on : 17-10-2023 09:15:09
Last modified on : 17-10-2023 12:38:17

Description :
Auth. (author+) Stored Cross-Site Scripting (XSS) vulnerability in David Lingren Media Library Assistant plugin <= 3.11 versions.

CVE ID : CVE-2023-24385
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/media-library-assistant/wordpress-media-library-assistant-plugin-3-11-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-44990

First published on : 17-10-2023 10:15:10
Last modified on : 17-10-2023 12:38:17

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional plugin <= 1.0.7.1 versions.

CVE ID : CVE-2023-44990
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/bulk-editor/wordpress-wolf-plugin-1-0-7-1-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-45010

First published on : 17-10-2023 11:15:10
Last modified on : 17-10-2023 12:38:17

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Alex MacArthur Complete Open Graph plugin <= 3.4.5 versions.

CVE ID : CVE-2023-45010
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/complete-open-graph/wordpress-complete-open-graph-plugin-3-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Source : mattermost.com

Vulnerability ID : CVE-2023-5339

First published on : 17-10-2023 10:15:10
Last modified on : 17-10-2023 12:38:17

Description :
Mattermost Desktop fails to set an appropriate log level during initial run after fresh installation resulting in logging all keystrokes including password entry being logged.

CVE ID : CVE-2023-5339
Source : responsibledisclosure@mattermost.com
CVSS Score : 4.7

References :
https://mattermost.com/security-updates | source : responsibledisclosure@mattermost.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-5522

First published on : 17-10-2023 10:15:10
Last modified on : 17-10-2023 12:38:17

Description :
Mattermost Mobile fails to limit the maximum number of Markdown elements in a post allowing an attacker to send a post with hundreds of emojis to a channel and freeze the mobile app of users when viewing that particular channel.

CVE ID : CVE-2023-5522
Source : responsibledisclosure@mattermost.com
CVSS Score : 4.3

References :
https://mattermost.com/security-updates | source : responsibledisclosure@mattermost.com

Vulnerability : CWE-400


Source : mitre.org

Vulnerability ID : CVE-2023-45357

First published on : 17-10-2023 05:15:50
Last modified on : 17-10-2023 12:38:17

Description :
Archer Platform 6.x before 6.13 P2 HF2 (6.13.0.2.2) contains a sensitive information disclosure vulnerability. An authenticated attacker could potentially obtain access to sensitive information via a popup warning message. 6.14 (6.14.0) is also a fixed release.

CVE ID : CVE-2023-45357
Source : cve@mitre.org
CVSS Score : 4.3

References :
https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617 | source : cve@mitre.org


(6) LOW VULNERABILITIES [0.1, 3.9]

Source : us.ibm.com

Vulnerability ID : CVE-2022-43892

First published on : 17-10-2023 03:15:09
Last modified on : 17-10-2023 12:38:17

Description :
IBM Security Verify Privilege On-Premises 11.5 does not validate, or incorrectly validates, a certificate which could disclose sensitive information which could aid further attacks against the system. IBM X-Force ID: 240455.

CVE ID : CVE-2022-43892
Source : psirt@us.ibm.com
CVSS Score : 3.7

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/240455 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047202 | source : psirt@us.ibm.com

Vulnerability : CWE-295


Vulnerability ID : CVE-2022-43893

First published on : 17-10-2023 02:15:10
Last modified on : 17-10-2023 12:38:17

Description :
IBM Security Verify Privilege On-Premises 11.5 could allow a privileged user to cause by using a malicious payload. IBM X-Force ID: 240634.

CVE ID : CVE-2022-43893
Source : psirt@us.ibm.com
CVSS Score : 2.7

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/240534 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047202 | source : psirt@us.ibm.com

Vulnerability : CWE-400


Vulnerability ID : CVE-2022-43891

First published on : 17-10-2023 03:15:09
Last modified on : 17-10-2023 12:38:17

Description :
IBM Security Verify Privilege On-Premises 11.5 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 240454.

CVE ID : CVE-2022-43891
Source : psirt@us.ibm.com
CVSS Score : 2.7

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/240454 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7047202 | source : psirt@us.ibm.com

Vulnerability : CWE-209


Source : github.com

Vulnerability ID : CVE-2023-45659

First published on : 17-10-2023 00:15:11
Last modified on : 17-10-2023 12:38:17

Description :
Engelsystem is a shift planning system for chaos events. If a users' password is compromised and an attacker gained access to a users' account, i.e., logged in and obtained a session, an attackers' session is not terminated if the users' account password is reset. This vulnerability has been fixed in the commit `dbb089315ff3d`. Users are advised to update their installations. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-45659
Source : security-advisories@github.com
CVSS Score : 3.6

References :
https://github.com/engelsystem/engelsystem/commit/dbb089315ff3d8aabc11445e78fb50765208b27d | source : security-advisories@github.com
https://github.com/engelsystem/engelsystem/security/advisories/GHSA-f6mm-3v2h-jm6x | source : security-advisories@github.com

Vulnerability : CWE-613


Vulnerability ID : CVE-2023-45152

First published on : 17-10-2023 00:15:11
Last modified on : 17-10-2023 12:38:17

Description :
Engelsystem is a shift planning system for chaos events. A Blind SSRF in the "Import schedule" functionality makes it possible to perform a port scan against the local environment. This vulnerability has been fixed in commit ee7d30b33. If a patch cannot be deployed, operators should ensure that no HTTP(s) services listen on localhost and/or systems only reachable from the host running the engelsystem software. If such services are necessary, they should utilize additional authentication.

CVE ID : CVE-2023-45152
Source : security-advisories@github.com
CVSS Score : 2.0

References :
https://github.com/engelsystem/engelsystem/commit/ee7d30b33935ea001705f438fec8ffd05734f295 | source : security-advisories@github.com
https://github.com/engelsystem/engelsystem/security/advisories/GHSA-jj9g-75wf-6ppf | source : security-advisories@github.com

Vulnerability : CWE-918


Source : cert.vde.com

Vulnerability ID : CVE-2023-4089

First published on : 17-10-2023 07:15:10
Last modified on : 17-10-2023 12:38:17

Description :
On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected.

CVE ID : CVE-2023-4089
Source : info@cert.vde.com
CVSS Score : 2.7

References :
https://cert.vde.com/en/advisories/VDE-2023-046/ | source : info@cert.vde.com

Vulnerability : CWE-610


(21) NO SCORE VULNERABILITIES [0.0, 0.0]

Source : mitre.org

Vulnerability ID : CVE-2023-45375

First published on : 17-10-2023 05:15:50
Last modified on : 17-10-2023 12:38:17

Description :
In the module "PireosPay" (pireospay) before version 1.7.10 from 01generator.com for PrestaShop, a guest can perform SQL injection via `PireosPayValidationModuleFrontController::postProcess().`

CVE ID : CVE-2023-45375
Source : cve@mitre.org
CVSS Score : /

References :
https://security.friendsofpresta.org/modules/2023/10/12/pireospay.html | source : cve@mitre.org


Vulnerability ID : CVE-2023-45386

First published on : 17-10-2023 05:15:50
Last modified on : 17-10-2023 12:38:17

Description :
In the module extratabspro before version 2.2.8 from MyPresta.eu for PrestaShop, a guest can perform SQL injection via `extratabspro::searchcategory()`, `extratabspro::searchproduct()` and `extratabspro::searchmanufacturer().'

CVE ID : CVE-2023-45386
Source : cve@mitre.org
CVSS Score : /

References :
https://security.friendsofpresta.org/modules/2023/10/12/extratabspro.html | source : cve@mitre.org


Vulnerability ID : CVE-2023-44693

First published on : 17-10-2023 06:15:09
Last modified on : 17-10-2023 12:38:17

Description :
D-Link Online behavior audit gateway DAR-7000 V31R02B1413C is vulnerable to SQL Injection via /importexport.php.

CVE ID : CVE-2023-44693
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_sql_%20importexport.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-44694

First published on : 17-10-2023 06:15:09
Last modified on : 17-10-2023 12:38:17

Description :
D-Link Online behavior audit gateway DAR-7000 V31R02B1413C is vulnerable to SQL Injection via /log/mailrecvview.php.

CVE ID : CVE-2023-44694
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_rce_%20mailrecvview.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-44824

First published on : 17-10-2023 13:15:11
Last modified on : 17-10-2023 15:07:46

Description :
An issue in Expense Management System v.1.0 allows a local attacker to execute arbitrary code via a crafted file uploaded to the sign-up.php component.

CVE ID : CVE-2023-44824
Source : cve@mitre.org
CVSS Score : /

References :
https://abstracted-howler-727.notion.site/CVE-2023-44824-ab76909b4a0e477b87aa8d0ca4aa4ca7 | source : cve@mitre.org
https://abstracted-howler-727.notion.site/Vulnerability-Description-ccc2e6489a0d43859c61a7982e649da1 | source : cve@mitre.org


Vulnerability ID : CVE-2023-43959

First published on : 17-10-2023 14:15:09
Last modified on : 17-10-2023 15:07:46

Description :
An issue in YeaLinkSIP-T19P-E2 v.53.84.0.15 allows a remote privileged attacker to execute arbitrary code via a crafted request the ping function of the diagnostic component.

CVE ID : CVE-2023-43959
Source : cve@mitre.org
CVSS Score : /

References :
https://hackmd.io/@tahaafarooq/auth_rce_voip | source : cve@mitre.org
https://www.exploit-db.com/exploits/50509 | source : cve@mitre.org


Vulnerability ID : CVE-2023-45901

First published on : 17-10-2023 14:15:10
Last modified on : 17-10-2023 15:07:46

Description :
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin\/category\/add.

CVE ID : CVE-2023-45901
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20in%20the%20newly%20added%20column%20of%20column%20management.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-45902

First published on : 17-10-2023 14:15:10
Last modified on : 17-10-2023 15:07:46

Description :
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/attachment/delete.

CVE ID : CVE-2023-45902
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20in%20the%20attachment%20management%20deletion%20function.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-45903

First published on : 17-10-2023 14:15:10
Last modified on : 17-10-2023 15:07:46

Description :
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/label/delete.

CVE ID : CVE-2023-45903
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20vulnerability%20in%20the%20label%20management%20deletion%20function.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-45904

First published on : 17-10-2023 14:15:10
Last modified on : 17-10-2023 15:07:46

Description :
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /variable/update.

CVE ID : CVE-2023-45904
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20vulnerability%20in%20the%20variable%20management%20modification%20function.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-45905

First published on : 17-10-2023 14:15:10
Last modified on : 17-10-2023 15:07:46

Description :
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/variable/add.

CVE ID : CVE-2023-45905
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20vulnerability%20in%20variable%20management%20with%20added%20functionality.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-45906

First published on : 17-10-2023 14:15:10
Last modified on : 17-10-2023 15:07:46

Description :
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/user/add.

CVE ID : CVE-2023-45906
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20in%20the%20user%20added%20function.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-45907

First published on : 17-10-2023 14:15:10
Last modified on : 17-10-2023 15:07:46

Description :
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/variable/delete.

CVE ID : CVE-2023-45907
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20vulnerability%20in%20the%20variable%20management%20deletion%20function.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-27132

First published on : 17-10-2023 16:15:09
Last modified on : 17-10-2023 20:30:59

Description :
TSplus Remote Work 16.0.0.0 places a cleartext password on the "var pass" line of the HTML source code for the secure single sign-on web portal. NOTE: CVE-2023-31069 is only about the TSplus Remote Access product, not the TSplus Remote Work product.

CVE ID : CVE-2023-27132
Source : cve@mitre.org
CVSS Score : /

References :
https://packetstormsecurity.com/files/174271 | source : cve@mitre.org


Vulnerability ID : CVE-2023-27133

First published on : 17-10-2023 16:15:10
Last modified on : 17-10-2023 20:30:59

Description :
TSplus Remote Work 16.0.0.0 has weak permissions for .exe, .js, and .html files under the %PROGRAMFILES(X86)%\TSplus-RemoteWork\Clients\www folder. This may enable privilege escalation if a different local user modifies a file. NOTE: CVE-2023-31067 and CVE-2023-31068 are only about the TSplus Remote Access product, not the TSplus Remote Work product.

CVE ID : CVE-2023-27133
Source : cve@mitre.org
CVSS Score : /

References :
https://packetstormsecurity.com/files/174272 | source : cve@mitre.org


Vulnerability ID : CVE-2023-45951

First published on : 17-10-2023 20:15:10
Last modified on : 17-10-2023 20:30:59

Description :
lylme_spage v1.7.0 was discovered to contain a SQL injection vulnerability via the $userip parameter at function.php.

CVE ID : CVE-2023-45951
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/LyLme/lylme_spage/issues/32 | source : cve@mitre.org


Vulnerability ID : CVE-2023-45952

First published on : 17-10-2023 20:15:10
Last modified on : 17-10-2023 20:30:59

Description :
An arbitrary file upload vulnerability in the component ajax_link.php of lylme_spage v1.7.0 allows attackers to execute arbitrary code via uploading a crafted file.

CVE ID : CVE-2023-45952
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/LyLme/lylme_spage/issues/33 | source : cve@mitre.org


Source : apache.org

Vulnerability ID : CVE-2023-39456

First published on : 17-10-2023 07:15:09
Last modified on : 17-10-2023 12:38:17

Description :
Improper Input Validation vulnerability in Apache Traffic Server with malformed HTTP/2 frames.This issue affects Apache Traffic Server: from 9.0.0 through 9.2.2. Users are recommended to upgrade to version 9.2.3, which fixes the issue.

CVE ID : CVE-2023-39456
Source : security@apache.org
CVSS Score : /

References :
https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q | source : security@apache.org

Vulnerability : CWE-20


Vulnerability ID : CVE-2023-41752

First published on : 17-10-2023 07:15:09
Last modified on : 17-10-2023 12:38:17

Description :
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 8.1.8, from 9.0.0 through 9.2.2. Users are recommended to upgrade to version 8.1.9 or 9.2.3, which fixes the issue.

CVE ID : CVE-2023-41752
Source : security@apache.org
CVSS Score : /

References :
https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q | source : security@apache.org

Vulnerability : CWE-200


Source : openvpn.net

Vulnerability ID : CVE-2022-3761

First published on : 17-10-2023 13:15:11
Last modified on : 17-10-2023 15:07:46

Description :
OpenVPN Connect versions before 3.4.0.4506 (macOS) and OpenVPN Connect before 3.4.0.3100 (Windows) allows man-in-the-middle attackers to intercept configuration profile download requests which contains the users credentials

CVE ID : CVE-2022-3761
Source : security@openvpn.net
CVSS Score : /

References :
https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/ | source : security@openvpn.net
https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/ | source : security@openvpn.net

Vulnerability : CWE-295


Source : amd.com

Vulnerability ID : CVE-2023-20598

First published on : 17-10-2023 14:15:09
Last modified on : 17-10-2023 15:07:46

Description :
An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.

CVE ID : CVE-2023-20598
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009 | source : psirt@amd.com


This website uses the NVD API, but is not approved or certified by it.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.