Latest vulnerabilities [Tuesday, December 19, 2023]

Latest vulnerabilities [Tuesday, December 19, 2023]
{{titre}}

Last update performed on 12/19/2023 at 11:57:05 PM

(17) CRITICAL VULNERABILITIES [9.0, 10.0]

Source : hackerone.com

Vulnerability ID : CVE-2023-41727

First published on : 19-12-2023 16:15:08
Last modified on : 19-12-2023 16:17:45

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVE ID : CVE-2023-41727
Source : support@hackerone.com
CVSS Score : 9.8

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46216

First published on : 19-12-2023 16:15:09
Last modified on : 19-12-2023 16:17:45

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVE ID : CVE-2023-46216
Source : support@hackerone.com
CVSS Score : 9.8

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46217

First published on : 19-12-2023 16:15:09
Last modified on : 19-12-2023 16:17:42

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVE ID : CVE-2023-46217
Source : support@hackerone.com
CVSS Score : 9.8

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46220

First published on : 19-12-2023 16:15:09
Last modified on : 19-12-2023 16:17:42

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVE ID : CVE-2023-46220
Source : support@hackerone.com
CVSS Score : 9.8

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46221

First published on : 19-12-2023 16:15:09
Last modified on : 19-12-2023 16:17:42

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVE ID : CVE-2023-46221
Source : support@hackerone.com
CVSS Score : 9.8

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46222

First published on : 19-12-2023 16:15:09
Last modified on : 19-12-2023 16:17:42

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVE ID : CVE-2023-46222
Source : support@hackerone.com
CVSS Score : 9.8

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46223

First published on : 19-12-2023 16:15:09
Last modified on : 19-12-2023 16:17:42

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVE ID : CVE-2023-46223
Source : support@hackerone.com
CVSS Score : 9.8

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46224

First published on : 19-12-2023 16:15:10
Last modified on : 19-12-2023 16:17:42

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVE ID : CVE-2023-46224
Source : support@hackerone.com
CVSS Score : 9.8

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46225

First published on : 19-12-2023 16:15:10
Last modified on : 19-12-2023 16:17:42

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVE ID : CVE-2023-46225
Source : support@hackerone.com
CVSS Score : 9.8

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46257

First published on : 19-12-2023 16:15:10
Last modified on : 19-12-2023 16:17:42

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVE ID : CVE-2023-46257
Source : support@hackerone.com
CVSS Score : 9.8

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46258

First published on : 19-12-2023 16:15:10
Last modified on : 19-12-2023 16:17:42

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVE ID : CVE-2023-46258
Source : support@hackerone.com
CVSS Score : 9.8

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46259

First published on : 19-12-2023 16:15:10
Last modified on : 19-12-2023 16:17:42

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVE ID : CVE-2023-46259
Source : support@hackerone.com
CVSS Score : 9.8

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46261

First published on : 19-12-2023 16:15:11
Last modified on : 19-12-2023 16:17:42

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVE ID : CVE-2023-46261
Source : support@hackerone.com
CVSS Score : 9.8

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Source : patchstack.com

Vulnerability ID : CVE-2023-48738

First published on : 19-12-2023 21:15:08
Last modified on : 19-12-2023 21:15:08

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Porto Theme Porto Theme - Functionality.This issue affects Porto Theme - Functionality: from n/a before 2.12.1.

CVE ID : CVE-2023-48738
Source : audit@patchstack.com
CVSS Score : 9.3

References :
https://patchstack.com/database/vulnerability/porto-functionality/wordpress-porto-theme-functionality-plugin-2-11-1-unauthenticated-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-49750

First published on : 19-12-2023 21:15:09
Last modified on : 19-12-2023 21:15:09

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Spoonthemes Couponis - Affiliate & Submitting Coupons WordPress Theme.This issue affects Couponis - Affiliate & Submitting Coupons WordPress Theme: from n/a before 2.2.

CVE ID : CVE-2023-49750
Source : audit@patchstack.com
CVSS Score : 9.3

References :
https://patchstack.com/database/vulnerability/couponis/wordpress-couponis-affiliate-submitting-coupons-wordpress-theme-theme-3-1-7-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Source : huntr.dev

Vulnerability ID : CVE-2023-6940

First published on : 19-12-2023 02:15:45
Last modified on : 19-12-2023 13:42:12

Description :
with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.

CVE ID : CVE-2023-6940
Source : security@huntr.dev
CVSS Score : 9.0

References :
https://github.com/mlflow/mlflow/commit/5139b1087d686fa52e2b087e09da66aff86297b1 | source : security@huntr.dev
https://huntr.com/bounties/c6f59480-ce47-4f78-a3dc-4bd8ca15029c | source : security@huntr.dev

Vulnerability : CWE-77


Vulnerability ID : CVE-2023-6730

First published on : 19-12-2023 13:15:43
Last modified on : 19-12-2023 13:42:12

Description :
Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36.

CVE ID : CVE-2023-6730
Source : security@huntr.dev
CVSS Score : 9.0

References :
https://github.com/huggingface/transformers/commit/1d63b0ec361e7a38f1339385e8a5a855085532ce | source : security@huntr.dev
https://huntr.com/bounties/423611ee-7a2a-442a-babb-3ed2f8385c16 | source : security@huntr.dev

Vulnerability : CWE-502


(28) HIGH VULNERABILITIES [7.0, 8.9]

Source : patchstack.com

Vulnerability ID : CVE-2023-37390

First published on : 19-12-2023 16:15:08
Last modified on : 19-12-2023 16:17:45

Description :
Deserialization of Untrusted Data vulnerability in Themesflat Themesflat Addons For Elementor.This issue affects Themesflat Addons For Elementor: from n/a through 2.0.0.

CVE ID : CVE-2023-37390
Source : audit@patchstack.com
CVSS Score : 8.3

References :
https://patchstack.com/database/vulnerability/themesflat-addons-for-elementor/wordpress-themesflat-addons-for-elementor-plugin-2-0-0-unauthenticated-php-object-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2023-34027

First published on : 19-12-2023 20:15:07
Last modified on : 19-12-2023 20:15:07

Description :
Deserialization of Untrusted Data vulnerability in Rajnish Arora Recently Viewed Products.This issue affects Recently Viewed Products: from n/a through 1.0.0.

CVE ID : CVE-2023-34027
Source : audit@patchstack.com
CVSS Score : 8.3

References :
https://patchstack.com/database/vulnerability/recently-viewed-products/wordpress-recently-viewed-products-plugin-1-0-0-php-object-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2023-48327

First published on : 19-12-2023 21:15:08
Last modified on : 19-12-2023 21:15:08

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WC Vendors WC Vendors โ€“ WooCommerce Multi-Vendor, WooCommerce Marketplace, Product Vendors.This issue affects WC Vendors โ€“ WooCommerce Multi-Vendor, WooCommerce Marketplace, Product Vendors: from n/a through 2.4.7.

CVE ID : CVE-2023-48327
Source : audit@patchstack.com
CVSS Score : 7.6

References :
https://patchstack.com/database/vulnerability/wc-vendors/wordpress-wc-vendors-marketplace-plugin-2-4-7-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-48741

First published on : 19-12-2023 21:15:08
Last modified on : 19-12-2023 21:15:08

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in QuantumCloud AI ChatBot.This issue affects AI ChatBot: from n/a through 4.7.8.

CVE ID : CVE-2023-48741
Source : audit@patchstack.com
CVSS Score : 7.6

References :
https://patchstack.com/database/vulnerability/chatbot/wordpress-ai-chatbot-plugin-4-7-8-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-48764

First published on : 19-12-2023 21:15:08
Last modified on : 19-12-2023 21:15:08

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GuardGiant Brute Force Protection WordPress Brute Force Protection โ€“ Stop Brute Force Attacks.This issue affects WordPress Brute Force Protection โ€“ Stop Brute Force Attacks: from n/a through 2.2.5.

CVE ID : CVE-2023-48764
Source : audit@patchstack.com
CVSS Score : 7.6

References :
https://patchstack.com/database/vulnerability/guardgiant/wordpress-wordpress-brute-force-protection-stop-brute-force-attacks-plugin-2-2-5-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-49764

First published on : 19-12-2023 21:15:09
Last modified on : 19-12-2023 21:15:09

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Younes JFR. Advanced Database Cleaner.This issue affects Advanced Database Cleaner: from n/a through 3.1.2.

CVE ID : CVE-2023-49764
Source : audit@patchstack.com
CVSS Score : 7.6

References :
https://patchstack.com/database/vulnerability/advanced-database-cleaner/wordpress-advanced-database-cleaner-plugin-3-1-2-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-49819

First published on : 19-12-2023 00:15:08
Last modified on : 19-12-2023 13:42:22

Description :
Deserialization of Untrusted Data vulnerability in Gordon Bรถhme, Antonio Leutsch Structured Content (JSON-LD) #wpsc.This issue affects Structured Content (JSON-LD) #wpsc: from n/a through 1.5.3.

CVE ID : CVE-2023-49819
Source : audit@patchstack.com
CVSS Score : 7.5

References :
https://patchstack.com/database/vulnerability/structured-content/wordpress-structured-content-json-ld-wpsc-plugin-1-5-3-php-object-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2023-50376

First published on : 19-12-2023 09:15:36
Last modified on : 19-12-2023 13:42:12

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in smp7, wp.Insider Simple Membership allows Reflected XSS.This issue affects Simple Membership: from n/a through 4.3.8.

CVE ID : CVE-2023-50376
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/simple-membership/wordpress-simple-membership-plugin-4-3-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Source : ncsc.nl

Vulnerability ID : CVE-2023-43870

First published on : 19-12-2023 15:15:08
Last modified on : 19-12-2023 16:17:45

Description :
When installing the Net2 software a root certificate is installed into the trusted store. A potential hacker could access the installer batch file or reverse engineer the source code to gain access to the root certificate password. Using the root certificate and password they could then create their own certificates to emulate another site. Then by establishing a proxy service to emulate the site they could monitor traffic passed between the end user and the site allowing access to the data content.

CVE ID : CVE-2023-43870
Source : cert@ncsc.nl
CVSS Score : 8.1

References :
https://www.paxton-access.com/systems/net2/ | source : cert@ncsc.nl

Vulnerability : CWE-798


Source : incibe.es

Vulnerability ID : CVE-2023-6913

First published on : 19-12-2023 15:15:09
Last modified on : 19-12-2023 16:17:45

Description :
A session hijacking vulnerability has been detected in the Imou Life application affecting version 6.7.0. This vulnerability could allow an attacker to hijack user accounts due to the QR code functionality not properly filtering codes when scanning a new device and directly running WebView without prompting or displaying it to the user. This vulnerability could trigger phishing attacks.

CVE ID : CVE-2023-6913
Source : cve-coordination@incibe.es
CVSS Score : 8.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/session-hijacking-imou-life-app | source : cve-coordination@incibe.es

Vulnerability : CWE-384


Vulnerability ID : CVE-2023-6280

First published on : 19-12-2023 15:15:09
Last modified on : 19-12-2023 16:17:45

Description :
An XXE (XML External Entity) vulnerability has been detected in 52North WPS affecting versions prior to 4.0.0-beta.11. This vulnerability allows the use of external entities in its WebProcessingService servlet for an attacker to retrieve files by making HTTP requests to the internal network.

CVE ID : CVE-2023-6280
Source : cve-coordination@incibe.es
CVSS Score : 7.2

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/xml-external-entity-reference-52north-wps | source : cve-coordination@incibe.es

Vulnerability : CWE-611


Source : gg.jp.panasonic.com

Vulnerability ID : CVE-2023-6314

First published on : 19-12-2023 01:15:12
Last modified on : 19-12-2023 13:42:12

Description :
Stack-based buffer overflow in FPWin Pro version 7.7.0.0 and all previous versions may allow attackers to execute arbitrary code via a specially crafted project file.

CVE ID : CVE-2023-6314
Source : product-security@gg.jp.panasonic.com
CVSS Score : 7.8

References :
https://industry.panasonic.eu/products/automation-devices-solutions/programmable-logic-controllers-plc/plc-software/programming-software-control-fpwin-pro | source : product-security@gg.jp.panasonic.com


Vulnerability ID : CVE-2023-6315

First published on : 19-12-2023 01:15:12
Last modified on : 19-12-2023 13:42:12

Description :
Out-of-bouds read vulnerability in FPWin Pro version 7.7.0.0 and all previous versions may allow attackers to execute arbitrary code via a specially crafted project file.

CVE ID : CVE-2023-6315
Source : product-security@gg.jp.panasonic.com
CVSS Score : 7.8

References :
https://industry.panasonic.eu/products/automation-devices-solutions/programmable-logic-controllers-plc/plc-software/programming-software-control-fpwin-pro | source : product-security@gg.jp.panasonic.com


Source : google.com

Vulnerability ID : CVE-2023-6931

First published on : 19-12-2023 14:15:08
Last modified on : 19-12-2023 14:49:49

Description :
A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation. A perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group(). We recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.

CVE ID : CVE-2023-6931
Source : cve-coordination@google.com
CVSS Score : 7.8

References :
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b | source : cve-coordination@google.com
https://kernel.dance/382c27f4ed28f803b1f1473ac2d8db0afc795a1b | source : cve-coordination@google.com

Vulnerability : CWE-787


Vulnerability ID : CVE-2023-6932

First published on : 19-12-2023 14:15:08
Last modified on : 19-12-2023 14:49:49

Description :
A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.

CVE ID : CVE-2023-6932
Source : cve-coordination@google.com
CVSS Score : 7.8

References :
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1 | source : cve-coordination@google.com
https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1 | source : cve-coordination@google.com

Vulnerability : CWE-416


Source : apache.org

Vulnerability ID : CVE-2023-49734

First published on : 19-12-2023 10:15:08
Last modified on : 19-12-2023 15:15:08

Description :
An authenticated Gamma user has the ability to create a dashboard and add charts to it, this user would automatically become one of the owners of the charts allowing him to incorrectly have write permissions to these charts.This issue affects Apache Superset: before 2.1.2, from 3.0.0 before 3.0.2. Users are recommended to upgrade to version 3.0.2 or 2.1.3, which fixes the issue.

CVE ID : CVE-2023-49734
Source : security@apache.org
CVSS Score : 7.7

References :
http://www.openwall.com/lists/oss-security/2023/12/19/3 | source : security@apache.org
https://lists.apache.org/thread/985h6ltvtbvdoysso780kkj7x744cds5 | source : security@apache.org

Vulnerability : CWE-863


Vulnerability ID : CVE-2023-43826

First published on : 19-12-2023 20:15:08
Last modified on : 19-12-2023 21:15:08

Description :
Apache Guacamole 1.5.3 and older do not consistently ensure that values received from a VNC server will not result in integer overflow. If a user connects to a malicious or compromised VNC server, specially-crafted data could result in memory corruption, possibly allowing arbitrary code to be executed with the privileges of the running guacd process. Users are recommended to upgrade to version 1.5.4, which fixes this issue.

CVE ID : CVE-2023-43826
Source : security@apache.org
CVSS Score : 7.5

References :
http://www.openwall.com/lists/oss-security/2023/12/19/4 | source : security@apache.org
https://lists.apache.org/thread/23gzwftpfgtq97tj6ttmbclry53kmwv6 | source : security@apache.org

Vulnerability : CWE-190


Source : hackerone.com

Vulnerability ID : CVE-2023-46260

First published on : 19-12-2023 16:15:10
Last modified on : 19-12-2023 16:17:42

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVE ID : CVE-2023-46260
Source : support@hackerone.com
CVSS Score : 7.5

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46262

First published on : 19-12-2023 16:15:11
Last modified on : 19-12-2023 16:17:42

Description :
An unauthenticated attacked could send a specifically crafted web request causing a Server-Side Request Forgery (SSRF) in Ivanti Avalanche Remote Control server.

CVE ID : CVE-2023-46262
Source : support@hackerone.com
CVSS Score : 7.5

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46803

First published on : 19-12-2023 16:15:11
Last modified on : 19-12-2023 16:17:42

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS).

CVE ID : CVE-2023-46803
Source : support@hackerone.com
CVSS Score : 7.5

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46804

First published on : 19-12-2023 16:15:12
Last modified on : 19-12-2023 16:17:42

Description :
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS).

CVE ID : CVE-2023-46804
Source : support@hackerone.com
CVSS Score : 7.5

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2021-22962

First published on : 19-12-2023 16:15:07
Last modified on : 19-12-2023 16:17:45

Description :
An attacker can send a specially crafted request which could lead to leakage of sensitive data or potentially a resource-based DoS attack.

CVE ID : CVE-2021-22962
Source : support@hackerone.com
CVSS Score : 7.3

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46266

First published on : 19-12-2023 16:15:11
Last modified on : 19-12-2023 16:17:42

Description :
An attacker can send a specially crafted request which could lead to leakage of sensitive data or potentially a resource-based DoS attack.

CVE ID : CVE-2023-46266
Source : support@hackerone.com
CVSS Score : 7.3

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46263

First published on : 19-12-2023 16:15:11
Last modified on : 19-12-2023 16:17:42

Description :
An unrestricted upload of file with dangerous type vulnerability exists in Avalanche versions 6.4.1 and below that could allow an attacker to achieve a remote code execution.

CVE ID : CVE-2023-46263
Source : support@hackerone.com
CVSS Score : 7.2

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Vulnerability ID : CVE-2023-46264

First published on : 19-12-2023 16:15:11
Last modified on : 19-12-2023 16:17:42

Description :
An unrestricted upload of file with dangerous type vulnerability exists in Avalanche versions 6.4.1 and below that could allow an attacker to achieve a remove code execution.

CVE ID : CVE-2023-46264
Source : support@hackerone.com
CVSS Score : 7.2

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Source : hpe.com

Vulnerability ID : CVE-2023-50272

First published on : 19-12-2023 16:15:12
Last modified on : 19-12-2023 16:17:42

Description :
A potential security vulnerability has been identified in HPE Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 6 (iLO 6). The vulnerability could be remotely exploited to allow authentication bypass.

CVE ID : CVE-2023-50272
Source : security-alert@hpe.com
CVSS Score : 7.5

References :
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04584en_us | source : security-alert@hpe.com


Source : hitachienergy.com

Vulnerability ID : CVE-2023-1514

First published on : 19-12-2023 15:15:08
Last modified on : 19-12-2023 16:17:45

Description :
A vulnerability exists in the component RTU500 Scripting interface. When a client connects to a server using TLS, the server presents a certificate. This certificate links a public key to the identity of the service and is signed by a Certification Authority (CA), allowing the client to validate that the remote service can be trusted and is not malicious. If the client does not validate the parameters of the certificate, then attackers could be able to spoof the identity of the service. An attacker could exploit the vulnerability by using faking the identity of a RTU500 device and intercepting the messages initiated via the RTU500 Scripting interface.

CVE ID : CVE-2023-1514
Source : cybersecurity@hitachienergy.com
CVSS Score : 7.4

References :
https://publisher.hitachienergy.com/preview?DocumentId=8DBD000152&languageCode=en&Preview=true | source : cybersecurity@hitachienergy.com

Vulnerability : CWE-295


Source : trendmicro.com

Vulnerability ID : CVE-2023-38126

First published on : 19-12-2023 22:15:07
Last modified on : 19-12-2023 22:15:07

Description :
Softing edgeAggregator Restore Configuration Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Softing edgeAggregator. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of backup zip files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this to execute code in the context of root. Was ZDI-CAN-20543.

CVE ID : CVE-2023-38126
Source : zdi-disclosures@trendmicro.com
CVSS Score : 7.2

References :
https://www.zerodayinitiative.com/advisories/ZDI-23-1058/ | source : zdi-disclosures@trendmicro.com

Vulnerability : CWE-22


(34) MEDIUM VULNERABILITIES [4.0, 6.9]

Source : patchstack.com

Vulnerability ID : CVE-2023-46154

First published on : 19-12-2023 00:15:07
Last modified on : 19-12-2023 13:42:22

Description :
Deserialization of Untrusted Data vulnerability in E2Pdf.Com E2Pdf โ€“ Export To Pdf Tool for WordPress.This issue affects E2Pdf โ€“ Export To Pdf Tool for WordPress: from n/a through 1.20.18.

CVE ID : CVE-2023-46154
Source : audit@patchstack.com
CVSS Score : 6.6

References :
https://patchstack.com/database/vulnerability/e2pdf/wordpress-e2pdf-plugin-1-20-18-php-object-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2023-44991

First published on : 19-12-2023 16:15:08
Last modified on : 19-12-2023 16:17:45

Description :
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Jordy Meow Media File Renamer: Rename Files (Manual, Auto & AI).This issue affects Media File Renamer: Rename Files (Manual, Auto & AI): from n/a through 5.6.9.

CVE ID : CVE-2023-44991
Source : audit@patchstack.com
CVSS Score : 6.5

References :
https://patchstack.com/database/vulnerability/media-file-renamer/wordpress-media-file-renamer-plugin-5-6-9-sensitive-data-exposure-via-debug-log-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-46212

First published on : 19-12-2023 00:15:07
Last modified on : 19-12-2023 13:42:22

Description :
Missing Authorization, Cross-Site Request Forgery (CSRF) vulnerability in TienCOP WP EXtra allows Accessing Functionality Not Properly Constrained by ACLs, Cross Site Request Forgery.This issue affects WP EXtra: from n/a through 6.2.

CVE ID : CVE-2023-46212
Source : audit@patchstack.com
CVSS Score : 6.3

References :
https://patchstack.com/database/vulnerability/wp-extra/wordpress-wp-extra-plugin-6-2-broken-access-control-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352
Vulnerability : CWE-862


Vulnerability ID : CVE-2023-25715

First published on : 19-12-2023 16:15:07
Last modified on : 19-12-2023 16:17:45

Description :
Missing Authorization vulnerability in GamiPress GamiPress โ€“ The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress.This issue affects GamiPress โ€“ The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress: from n/a through 2.5.6.

CVE ID : CVE-2023-25715
Source : audit@patchstack.com
CVSS Score : 5.4

References :
https://patchstack.com/database/vulnerability/gamipress/wordpress-gamipress-plugin-2-5-6-missing-authorization-leading-to-points-manipulation-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-862


Vulnerability ID : CVE-2023-49164

First published on : 19-12-2023 22:15:08
Last modified on : 19-12-2023 22:15:08

Description :
Cross-Site Request Forgery (CSRF) vulnerability in OceanWP Ocean Extra.This issue affects Ocean Extra: from n/a through 2.2.2.

CVE ID : CVE-2023-49164
Source : audit@patchstack.com
CVSS Score : 5.4

References :
https://patchstack.com/database/vulnerability/ocean-extra/wordpress-ocean-extra-plugin-2-2-2-csrf-leading-to-arbitrary-plugin-activation-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-50835

First published on : 19-12-2023 22:15:08
Last modified on : 19-12-2023 22:15:08

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Praveen Goswami Advanced Category Template.This issue affects Advanced Category Template: from n/a through 0.1.

CVE ID : CVE-2023-50835
Source : audit@patchstack.com
CVSS Score : 5.4

References :
https://patchstack.com/database/vulnerability/advanced-category-template/wordpress-advanced-category-template-plugin-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2022-45809

First published on : 19-12-2023 00:15:07
Last modified on : 19-12-2023 13:42:22

Description :
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Ricard Torres Thumbs Rating.This issue affects Thumbs Rating: from n/a through 5.0.0.

CVE ID : CVE-2022-45809
Source : audit@patchstack.com
CVSS Score : 5.3

References :
https://patchstack.com/database/vulnerability/thumbs-rating/wordpress-thumbs-rating-plugin-4-1-0-race-condition-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-367


Vulnerability ID : CVE-2023-44982

First published on : 19-12-2023 01:15:11
Last modified on : 19-12-2023 13:42:12

Description :
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Jordy Meow Perfect Images (Manage Image Sizes, Thumbnails, Replace, Retina).This issue affects Perfect Images (Manage Image Sizes, Thumbnails, Replace, Retina): from n/a through 6.4.5.

CVE ID : CVE-2023-44982
Source : audit@patchstack.com
CVSS Score : 5.3

References :
https://patchstack.com/database/vulnerability/wp-retina-2x/wordpress-wp-retina-2x-plugin-6-4-5-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-44983

First published on : 19-12-2023 16:15:08
Last modified on : 19-12-2023 16:17:45

Description :
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Aruba.It Aruba HiSpeed Cache.This issue affects Aruba HiSpeed Cache: from n/a through 2.0.6.

CVE ID : CVE-2023-44983
Source : audit@patchstack.com
CVSS Score : 5.3

References :
https://patchstack.com/database/vulnerability/aruba-hispeed-cache/wordpress-aruba-hispeed-cache-plugin-2-0-6-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-49812

First published on : 19-12-2023 21:15:09
Last modified on : 19-12-2023 21:15:09

Description :
Authorization Bypass Through User-Controlled Key vulnerability in J.N. Breetvelt a.K.A. OpaJaap WP Photo Album Plus.This issue affects WP Photo Album Plus: from n/a through 8.5.02.005.

CVE ID : CVE-2023-49812
Source : audit@patchstack.com
CVSS Score : 5.3

References :
https://patchstack.com/database/vulnerability/wp-photo-album-plus/wordpress-wp-photo-album-plus-plugin-8-5-02-005-insecure-direct-object-references-idor-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-639


Vulnerability ID : CVE-2023-38478

First published on : 19-12-2023 20:15:07
Last modified on : 19-12-2023 20:15:07

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks Integration for WooCommerce and QuickBooks.This issue affects Integration for WooCommerce and QuickBooks: from n/a through 1.2.3.

CVE ID : CVE-2023-38478
Source : audit@patchstack.com
CVSS Score : 4.7

References :
https://patchstack.com/database/vulnerability/wp-woocommerce-quickbooks/wordpress-integration-for-woocommerce-and-quickbooks-plugin-1-2-3-open-redirection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Vulnerability ID : CVE-2023-38481

First published on : 19-12-2023 20:15:07
Last modified on : 19-12-2023 20:15:07

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks Integration for WooCommerce and Zoho CRM, Books, Invoice, Inventory, Bigin.This issue affects Integration for WooCommerce and Zoho CRM, Books, Invoice, Inventory, Bigin: from n/a before 1.3.7.

CVE ID : CVE-2023-38481
Source : audit@patchstack.com
CVSS Score : 4.7

References :
https://patchstack.com/database/vulnerability/woo-zoho/wordpress-integration-for-woocommerce-and-zoho-crm-plugin-1-3-7-open-redirection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Vulnerability ID : CVE-2023-40602

First published on : 19-12-2023 20:15:07
Last modified on : 19-12-2023 20:15:07

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Doofinder Doofinder WP & WooCommerce Search.This issue affects Doofinder WP & WooCommerce Search: from n/a through 1.5.49.

CVE ID : CVE-2023-40602
Source : audit@patchstack.com
CVSS Score : 4.7

References :
https://patchstack.com/database/vulnerability/doofinder-for-woocommerce/wordpress-doofinder-for-woocommerce-plugin-1-5-49-open-redirection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Vulnerability ID : CVE-2023-41648

First published on : 19-12-2023 20:15:08
Last modified on : 19-12-2023 20:15:08

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Swapnil V. Patil Login and Logout Redirect.This issue affects Login and Logout Redirect: from n/a through 2.0.3.

CVE ID : CVE-2023-41648
Source : audit@patchstack.com
CVSS Score : 4.7

References :
https://patchstack.com/database/vulnerability/login-and-logout-redirect/wordpress-login-and-logout-redirect-plugin-2-0-2-open-redirection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Vulnerability ID : CVE-2023-45105

First published on : 19-12-2023 20:15:08
Last modified on : 19-12-2023 20:15:08

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in SERVIT Software Solutions affiliate-toolkit โ€“ WordPress Affiliate Plugin.This issue affects affiliate-toolkit โ€“ WordPress Affiliate Plugin: from n/a through 3.3.9.

CVE ID : CVE-2023-45105
Source : audit@patchstack.com
CVSS Score : 4.7

References :
https://patchstack.com/database/vulnerability/affiliate-toolkit-starter/wordpress-affiliate-toolkit-wordpress-affiliate-plugin-plugin-3-3-9-open-redirection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Vulnerability ID : CVE-2023-35883

First published on : 19-12-2023 21:15:07
Last modified on : 19-12-2023 21:15:07

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Magazine3 Core Web Vitals & PageSpeed Booster.This issue affects Core Web Vitals & PageSpeed Booster: from n/a through 1.0.12.

CVE ID : CVE-2023-35883
Source : audit@patchstack.com
CVSS Score : 4.7

References :
https://patchstack.com/database/vulnerability/core-web-vitals-pagespeed-booster/wordpress-core-web-vitals-pagespeed-booster-plugin-1-0-12-open-redirection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Vulnerability ID : CVE-2023-37982

First published on : 19-12-2023 21:15:07
Last modified on : 19-12-2023 21:15:07

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks Integration for Salesforce and Contact Form 7, WPForms, Elementor, Ninja Forms.This issue affects Integration for Salesforce and Contact Form 7, WPForms, Elementor, Ninja Forms: from n/a through 1.3.3.

CVE ID : CVE-2023-37982
Source : audit@patchstack.com
CVSS Score : 4.7

References :
https://patchstack.com/database/vulnerability/cf7-salesforce/wordpress-integration-for-contact-form-7-and-salesforce-plugin-1-3-3-open-redirection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Vulnerability ID : CVE-2023-46624

First published on : 19-12-2023 22:15:07
Last modified on : 19-12-2023 22:15:07

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Parcel Pro.This issue affects Parcel Pro: from n/a through 1.6.11.

CVE ID : CVE-2023-46624
Source : audit@patchstack.com
CVSS Score : 4.7

References :
https://patchstack.com/database/vulnerability/woo-parcel-pro/wordpress-parcel-pro-plugin-1-6-3-open-redirection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Vulnerability ID : CVE-2023-34382

First published on : 19-12-2023 20:15:07
Last modified on : 19-12-2023 20:15:07

Description :
Deserialization of Untrusted Data vulnerability in weDevs Dokan โ€“ Best WooCommerce Multivendor Marketplace Solution โ€“ Build Your Own Amazon, eBay, Etsy.This issue affects Dokan โ€“ Best WooCommerce Multivendor Marketplace Solution โ€“ Build Your Own Amazon, eBay, Etsy: from n/a through 3.7.19.

CVE ID : CVE-2023-34382
Source : audit@patchstack.com
CVSS Score : 4.4

References :
https://patchstack.com/database/vulnerability/dokan-lite/wordpress-dokan-plugin-3-7-19-php-object-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2023-47754

First published on : 19-12-2023 00:15:07
Last modified on : 19-12-2023 13:42:22

Description :
Missing Authorization vulnerability in Clever plugins Delete Duplicate Posts allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Delete Duplicate Posts: from n/a through 4.8.9.

CVE ID : CVE-2023-47754
Source : audit@patchstack.com
CVSS Score : 4.3

References :
https://patchstack.com/database/vulnerability/delete-duplicate-posts/wordpress-delete-duplicate-posts-plugin-4-8-9-broken-access-control-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-862


Vulnerability ID : CVE-2023-48751

First published on : 19-12-2023 00:15:07
Last modified on : 19-12-2023 13:42:22

Description :
Missing Authorization, Cross-Site Request Forgery (CSRF) vulnerability in Roland Barker, xnau webdesign Participants Database allows Accessing Functionality Not Properly Constrained by ACLs, Cross Site Request Forgery.This issue affects Participants Database: from n/a through 2.5.5.

CVE ID : CVE-2023-48751
Source : audit@patchstack.com
CVSS Score : 4.3

References :
https://patchstack.com/database/vulnerability/participants-database/wordpress-participants-database-plugin-2-5-5-broken-access-control-vulnerability | source : audit@patchstack.com

Vulnerability : CWE-352
Vulnerability : CWE-862


Vulnerability ID : CVE-2022-43450

First published on : 19-12-2023 22:15:07
Last modified on : 19-12-2023 22:15:07

Description :
Authorization Bypass Through User-Controlled Key vulnerability in XWP Stream.This issue affects Stream: from n/a through 3.9.2.

CVE ID : CVE-2022-43450
Source : audit@patchstack.com
CVSS Score : 4.3

References :
https://patchstack.com/database/vulnerability/stream/wordpress-stream-plugin-3-9-2-auth-insecure-direct-object-references-idor-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-639


Source : apache.org

Vulnerability ID : CVE-2023-46104

First published on : 19-12-2023 10:15:07
Last modified on : 19-12-2023 15:15:08

Description :
Uncontrolled resource consumption can be triggered by authenticated attacker that uploads a malicious ZIP to import database, dashboards or datasets. This vulnerability exists in Apache Superset versions up to and including 2.1.2 and versions 3.0.0, 3.0.1.

CVE ID : CVE-2023-46104
Source : security@apache.org
CVSS Score : 6.5

References :
http://www.openwall.com/lists/oss-security/2023/12/19/1 | source : security@apache.org
https://lists.apache.org/thread/yxbxg4wryb7cb7wyybk11l5nqy0rsrvl | source : security@apache.org

Vulnerability : CWE-400


Vulnerability ID : CVE-2023-49736

First published on : 19-12-2023 10:15:08
Last modified on : 19-12-2023 15:15:08

Description :
A where_in JINJA macro allows users to specify a quote, which combined with a carefully crafted statement would allow for SQL injection in Apache Superset.This issue affects Apache Superset: before 2.1.2, from 3.0.0 before 3.0.2. Users are recommended to upgrade to version 3.0.2, which fixes the issue.

CVE ID : CVE-2023-49736
Source : security@apache.org
CVSS Score : 6.5

References :
http://www.openwall.com/lists/oss-security/2023/12/19/2 | source : security@apache.org
https://lists.apache.org/thread/1kf481bgs3451qcz6hfhobs7xvhp8n1p | source : security@apache.org

Vulnerability : CWE-89


Source : hackerone.com

Vulnerability ID : CVE-2023-46265

First published on : 19-12-2023 16:15:11
Last modified on : 19-12-2023 16:17:42

Description :
An unauthenticated could abuse a XXE vulnerability in the Smart Device Server to leak data or perform a Server-Side Request Forgery (SSRF).

CVE ID : CVE-2023-46265
Source : support@hackerone.com
CVSS Score : 6.5

References :
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | source : support@hackerone.com


Source : wordfence.com

Vulnerability ID : CVE-2023-5413

First published on : 19-12-2023 03:15:08
Last modified on : 19-12-2023 13:42:12

Description :
The Image horizontal reel scroll slideshow plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'ihrss-gallery' shortcode in versions up to, and including, 13.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-5413
Source : security@wordfence.com
CVSS Score : 6.4

References :
https://plugins.trac.wordpress.org/browser/image-horizontal-reel-scroll-slideshow/trunk/image-horizontal-reel-scroll-slideshow.php#L212 | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/3010834/image-horizontal-reel-scroll-slideshow | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/28ba6f91-c696-4019-ae87-28ebfbe464cf?source=cve | source : security@wordfence.com


Vulnerability ID : CVE-2023-5432

First published on : 19-12-2023 04:15:07
Last modified on : 19-12-2023 13:42:12

Description :
The Jquery news ticker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'jquery-news-ticker' shortcode in versions up to, and including, 3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-5432
Source : security@wordfence.com
CVSS Score : 6.4

References :
https://plugins.trac.wordpress.org/browser/jquery-news-ticker/trunk/jquery-news-ticker.php?rev=2827068#L124 | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/3010828/jquery-news-ticker | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/d22d9414-2df9-4528-a426-dce6e83f8d44?source=cve | source : security@wordfence.com


Vulnerability ID : CVE-2023-6488

First published on : 19-12-2023 02:15:44
Last modified on : 19-12-2023 13:42:12

Description :
The WP Shortcodes Plugin โ€” Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'su_button', 'su_members', and 'su_tabs' shortcodes in all versions up to, and including, 7.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-6488
Source : security@wordfence.com
CVSS Score : 5.4

References :
https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/trunk/includes/shortcodes/button.php | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3007660%40shortcodes-ultimate&new=3007660%40shortcodes-ultimate&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/50a89ad1-a3d0-49e3-8d2e-4cb81ac115ba?source=cve | source : security@wordfence.com


Source : hitachienergy.com

Vulnerability ID : CVE-2023-6711

First published on : 19-12-2023 15:15:09
Last modified on : 19-12-2023 16:17:45

Description :
Vulnerability exists in SCI IEC 60870-5-104 and HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. Specially crafted messages sent to the mentioned components are not validated properly and can result in buffer overflow and as final consequence to a reboot of an RTU500 CMU.

CVE ID : CVE-2023-6711
Source : cybersecurity@hitachienergy.com
CVSS Score : 5.9

References :
https://publisher.hitachienergy.com/preview?DocumentId=8DBD000184&languageCode=en&Preview=true | source : cybersecurity@hitachienergy.com

Vulnerability : CWE-20


Source : vuldb.com

Vulnerability ID : CVE-2019-25158

First published on : 19-12-2023 13:15:43
Last modified on : 19-12-2023 13:42:12

Description :
A vulnerability has been found in pedroetb tts-api up to 2.1.4 and classified as critical. This vulnerability affects the function onSpeechDone of the file app.js. The manipulation leads to os command injection. Upgrading to version 2.2.0 is able to address this issue. The patch is identified as 29d9c25415911ea2f8b6de247cb5c4607d13d434. It is recommended to upgrade the affected component. VDB-248278 is the identifier assigned to this vulnerability.

CVE ID : CVE-2019-25158
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://github.com/pedroetb/tts-api/commit/29d9c25415911ea2f8b6de247cb5c4607d13d434 | source : cna@vuldb.com
https://github.com/pedroetb/tts-api/releases/tag/v2.2.0 | source : cna@vuldb.com
https://vuldb.com/?ctiid.248278 | source : cna@vuldb.com
https://vuldb.com/?id.248278 | source : cna@vuldb.com

Vulnerability : CWE-78


Vulnerability ID : CVE-2014-125107

First published on : 19-12-2023 03:15:07
Last modified on : 19-12-2023 13:42:12

Description :
A vulnerability was found in Corveda PHPSandbox 1.3.4 and classified as critical. Affected by this issue is some unknown functionality of the component String Handler. The manipulation leads to protection mechanism failure. The attack may be launched remotely. Upgrading to version 1.3.5 is able to address this issue. The patch is identified as 48fde5ffa4d76014bad260a3cbab7ada3744a4cc. It is recommended to upgrade the affected component. VDB-248270 is the identifier assigned to this vulnerability.

CVE ID : CVE-2014-125107
Source : cna@vuldb.com
CVSS Score : 4.3

References :
https://github.com/Corveda/PHPSandbox/commit/48fde5ffa4d76014bad260a3cbab7ada3744a4cc | source : cna@vuldb.com
https://github.com/Corveda/PHPSandbox/releases/tag/v1.3.5 | source : cna@vuldb.com
https://vuldb.com/?ctiid.248270 | source : cna@vuldb.com
https://vuldb.com/?id.248270 | source : cna@vuldb.com

Vulnerability : CWE-693


Vulnerability ID : CVE-2019-25157

First published on : 19-12-2023 03:15:07
Last modified on : 19-12-2023 13:42:12

Description :
A vulnerability was found in Ethex Contracts. It has been classified as critical. This affects an unknown part of the file EthexJackpot.sol of the component Monthly Jackpot Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 6b8664b698d3d953e16c284fadc6caeb9e58e3db. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248271.

CVE ID : CVE-2019-25157
Source : cna@vuldb.com
CVSS Score : 4.3

References :
https://bitcointalk.org/index.php?topic=5120151.msg50827730#msg50827730 | source : cna@vuldb.com
https://github.com/ethex-bet/ethex-contracts/commit/6b8664b698d3d953e16c284fadc6caeb9e58e3db | source : cna@vuldb.com
https://vuldb.com/?ctiid.248271 | source : cna@vuldb.com
https://vuldb.com/?id.248271 | source : cna@vuldb.com

Vulnerability : CWE-284


Source : us.ibm.com

Vulnerability ID : CVE-2023-47146

First published on : 19-12-2023 22:15:07
Last modified on : 19-12-2023 22:15:07

Description :
IBM Qradar SIEM 7.5 could allow a privileged user to obtain sensitive domain information due to data being misidentified. IBM X-Force ID: 270372.

CVE ID : CVE-2023-47146
Source : psirt@us.ibm.com
CVSS Score : 4.9

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/270372 | source : psirt@us.ibm.com
https://https://www.ibm.com/support/pages/node/7099297 | source : psirt@us.ibm.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-42015

First published on : 19-12-2023 03:15:07
Last modified on : 19-12-2023 13:42:12

Description :
IBM UrbanCode Deploy (UCD) 7.1 through 7.1.2.14, 7.2 through 7.2.3.7, and 7.3 through 7.3.2.2 is vulnerable to HTML injection. This vulnerability may allow a user to embed arbitrary HTML tags in the Web UI potentially leading to sensitive information disclosure. IBM X-Force ID: 265512.

CVE ID : CVE-2023-42015
Source : psirt@us.ibm.com
CVSS Score : 4.3

References :
https://exchange.xforce.ibmcloud.com/vulnerabilities/265512 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7096546 | source : psirt@us.ibm.com


(2) LOW VULNERABILITIES [0.1, 3.9]

Source : redhat.com

Vulnerability ID : CVE-2023-6918

First published on : 19-12-2023 00:15:08
Last modified on : 19-12-2023 13:42:12

Description :
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.

CVE ID : CVE-2023-6918
Source : secalert@redhat.com
CVSS Score : 3.7

References :
https://access.redhat.com/security/cve/CVE-2023-6918 | source : secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2254997 | source : secalert@redhat.com
https://www.libssh.org/2023/12/18/libssh-0-10-6-and-libssh-0-9-8-security-releases/ | source : secalert@redhat.com

Vulnerability : CWE-252


Source : vuldb.com

Vulnerability ID : CVE-2023-6945

First published on : 19-12-2023 11:15:08
Last modified on : 19-12-2023 13:42:12

Description :
A vulnerability has been found in SourceCodester Online Student Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file edit-student-detail.php. The manipulation of the argument notmsg leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248377 was assigned to this vulnerability.

CVE ID : CVE-2023-6945
Source : cna@vuldb.com
CVSS Score : 2.4

References :
https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Online%20student%20management%20system(XSS)%202.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.248377 | source : cna@vuldb.com
https://vuldb.com/?id.248377 | source : cna@vuldb.com

Vulnerability : CWE-79


(28) NO SCORE VULNERABILITIES [0.0, 0.0]

Source : mitre.org

Vulnerability ID : CVE-2023-49006

First published on : 19-12-2023 10:15:07
Last modified on : 19-12-2023 13:42:12

Description :
Cross Site Request Forgery (CSRF) vulnerability in Phpsysinfo version 3.4.3 allows a remote attacker to obtain sensitive information via a crafted page in the XML.php file.

CVE ID : CVE-2023-49006
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/Hebing123/cve/issues/5 | source : cve@mitre.org
https://github.com/phpsysinfo/phpsysinfo/commit/4f2cee505e4f2e9b369a321063ff2c5e0c34ba45 | source : cve@mitre.org
https://huntr.com/bounties/ca6d669f-fd82-4188-aae2-69e08740d982/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-49489

First published on : 19-12-2023 10:15:07
Last modified on : 19-12-2023 13:42:12

Description :
Reflective Cross Site Scripting (XSS) vulnerability in KodeExplorer version 4.51, allows attackers to obtain sensitive information and escalate privileges via the APP_HOST parameter at config/i18n/en/main.php.

CVE ID : CVE-2023-49489
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/kalcaddle/KodExplorer/issues/526 | source : cve@mitre.org


Vulnerability ID : CVE-2023-49706

First published on : 19-12-2023 19:15:07
Last modified on : 19-12-2023 19:50:29

Description :
Defective request context handling in Self Service in LinOTP 3.x before 3.2.5 allows remote unauthenticated attackers to escalate privileges, thereby allowing them to act as and with the permissions of another user. Attackers must generate repeated API requests to trigger a race condition with concurrent user activity in the self-service portal.

CVE ID : CVE-2023-49706
Source : cve@mitre.org
CVSS Score : /

References :
https://linotp.org/CVE-2023-49706.txt | source : cve@mitre.org
https://linotp.org/security-update-linotp3-selfservice.html | source : cve@mitre.org
https://www.linotp.org/news.html | source : cve@mitre.org


Vulnerability ID : CVE-2023-50466

First published on : 19-12-2023 21:15:09
Last modified on : 19-12-2023 21:15:09

Description :
An authenticated command injection vulnerability in Weintek cMT2078X easyweb Web Version v2.1.3, OS v20220215 allows attackers to execute arbitrary code or access sensitive information via injecting a crafted payload into the HMI Name parameter.

CVE ID : CVE-2023-50466
Source : cve@mitre.org
CVSS Score : /

References :
https://literate-bakery-10b.notion.site/Weintek-EasyWeb-cMT-Reports-3fc0b10798b54f51a61d719395c408da?pvs=4 | source : cve@mitre.org


Vulnerability ID : CVE-2023-47267

First published on : 19-12-2023 22:15:08
Last modified on : 19-12-2023 22:15:08

Description :
An issue discovered in TheGreenBow Windows Enterprise Certified VPN Client 6.52, Windows Standard VPN Client 6.87, and Windows Enterprise VPN Client 6.87 allows attackers to gain escalated privileges via crafted changes to memory mapped file.

CVE ID : CVE-2023-47267
Source : cve@mitre.org
CVSS Score : /

References :
https://www.thegreenbow.com/en/support/security-alerts/#deeplink-16093 | source : cve@mitre.org


Vulnerability ID : CVE-2023-49004

First published on : 19-12-2023 22:15:08
Last modified on : 19-12-2023 22:15:08

Description :
An issue in D-Link DIR-850L v.B1_FW223WWb01 allows a remote attacker to execute arbitrary code via a crafted script to the en parameter.

CVE ID : CVE-2023-49004
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/ef4tless/vuln/blob/master/iot/DIR-850L/bug1.md | source : cve@mitre.org


Source : mozilla.org

Vulnerability ID : CVE-2023-50761

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:52

Description :
The signature of a digitally signed S/MIME email message may optionally specify the signature creation date and time. If present, Thunderbird did not compare the signature creation date with the message date and time, and displayed a valid signature despite a date or time mismatch. This could be used to give recipients the impression that a message was sent at a different date or time. This vulnerability affects Thunderbird < 115.6.

CVE ID : CVE-2023-50761
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1865647 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-55/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-50762

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:52

Description :
When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6.

CVE ID : CVE-2023-50762
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1862625 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-55/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6135

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:52

Description :
Multiple NSS NIST curves were susceptible to a side-channel attack known as "Minerva". This attack could potentially allow an attacker to recover the private key. This vulnerability affects Firefox < 121.

CVE ID : CVE-2023-6135
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1853908 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6856

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:49

Description :
The WebGL `DrawElementsInstanced` method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver. This issue could allow an attacker to perform remote code execution and sandbox escape. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.

CVE ID : CVE-2023-6856
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1843782 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-54/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-55/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6857

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:49

Description :
When resolving a symlink, a race may occur where the buffer passed to `readlink` may actually be smaller than necessary. *This bug only affects Firefox on Unix-based operating systems (Android, Linux, MacOS). Windows is unaffected.* This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.

CVE ID : CVE-2023-6857
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1796023 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-54/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-55/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6858

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:49

Description :
Firefox was susceptible to a heap buffer overflow in `nsTextFragment` due to insufficient OOM handling. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.

CVE ID : CVE-2023-6858
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1826791 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-54/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-55/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6859

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:49

Description :
A use-after-free condition affected TLS socket creation when under memory pressure. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.

CVE ID : CVE-2023-6859
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1840144 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-54/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-55/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6860

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:49

Description :
The `VideoBridge` allowed any content process to use textures produced by remote decoders. This could be abused to escape the sandbox. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.

CVE ID : CVE-2023-6860
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1854669 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-54/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-55/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6861

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:49

Description :
The `nsWindow::PickerOpen(void)` method was susceptible to a heap buffer overflow when running in headless mode. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.

CVE ID : CVE-2023-6861
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1864118 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-54/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-55/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6862

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:49

Description :
A use-after-free was identified in the `nsDNSService::Init`. This issue appears to manifest rarely during start-up. This vulnerability affects Firefox ESR < 115.6 and Thunderbird < 115.6.

CVE ID : CVE-2023-6862
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1868042 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-54/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-55/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6863

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:49

Description :
The `ShutdownObserver()` was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.

CVE ID : CVE-2023-6863
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1868901 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-54/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-55/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6864

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:49

Description :
Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.

CVE ID : CVE-2023-6864
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1736385%2C1810805%2C1846328%2C1856090%2C1858033%2C1858509%2C1862089%2C1862777%2C1864015 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-54/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-55/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6865

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:49

Description :
`EncryptingOutputStream` was susceptible to exposing uninitialized data. This issue could only be abused in order to write data to a local disk which may have implications for private browsing mode. This vulnerability affects Firefox ESR < 115.6 and Firefox < 121.

CVE ID : CVE-2023-6865
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1864123 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-54/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6866

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:49

Description :
TypedArrays can be fallible and lacked proper exception handling. This could lead to abuse in other APIs which expect TypedArrays to always succeed. This vulnerability affects Firefox < 121.

CVE ID : CVE-2023-6866
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1849037 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6867

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:49

Description :
The timing of a button click causing a popup to disappear was approximately the same length as the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. This vulnerability affects Firefox ESR < 115.6 and Firefox < 121.

CVE ID : CVE-2023-6867
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1863863 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-54/ | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6868

First published on : 19-12-2023 14:15:07
Last modified on : 19-12-2023 14:49:49

Description :
In some instances, the user-agent would allow push requests which lacked a valid VAPID even though the push manager subscription defined one. This could allow empty messages to be sent from unauthorized parties. *This bug only affects Firefox on Android.* This vulnerability affects Firefox < 121.

CVE ID : CVE-2023-6868
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1865488 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6869

First published on : 19-12-2023 14:15:08
Last modified on : 19-12-2023 17:15:07

Description :
A `&lt;dialog>` element could have been manipulated to paint content outside of a sandboxed iframe. This could allow untrusted content to display under the guise of trusted content. This vulnerability affects Firefox < 121.

CVE ID : CVE-2023-6869
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1799036 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6870

First published on : 19-12-2023 14:15:08
Last modified on : 19-12-2023 14:49:49

Description :
Applications which spawn a Toast notification in a background thread may have obscured fullscreen notifications displayed by Firefox. *This issue only affects Android versions of Firefox and Firefox Focus.* This vulnerability affects Firefox < 121.

CVE ID : CVE-2023-6870
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1823316 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6871

First published on : 19-12-2023 14:15:08
Last modified on : 19-12-2023 14:49:49

Description :
Under certain conditions, Firefox did not display a warning when a user attempted to navigate to a new protocol handler. This vulnerability affects Firefox < 121.

CVE ID : CVE-2023-6871
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1828334 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6872

First published on : 19-12-2023 14:15:08
Last modified on : 19-12-2023 14:49:49

Description :
Browser tab titles were being leaked by GNOME to system logs. This could potentially expose the browsing habits of users running in a private tab. This vulnerability affects Firefox < 121.

CVE ID : CVE-2023-6872
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/show_bug.cgi?id=1849186 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Vulnerability ID : CVE-2023-6873

First published on : 19-12-2023 14:15:08
Last modified on : 19-12-2023 14:49:49

Description :
Memory safety bugs present in Firefox 120. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 121.

CVE ID : CVE-2023-6873
Source : security@mozilla.org
CVSS Score : /

References :
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1855327%2C1862089%2C1862723 | source : security@mozilla.org
https://www.mozilla.org/security/advisories/mfsa2023-56/ | source : security@mozilla.org


Source : apple.com

Vulnerability ID : CVE-2023-42940

First published on : 19-12-2023 22:15:07
Last modified on : 19-12-2023 22:15:07

Description :
A session rendering issue was addressed with improved session tracking. This issue is fixed in macOS Sonoma 14.2.1. A user who shares their screen may unintentionally share the incorrect content.

CVE ID : CVE-2023-42940
Source : product-security@apple.com
CVSS Score : /

References :
https://support.apple.com/en-us/HT214048 | source : product-security@apple.com


This website uses the NVD API, but is not approved or certified by it.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! Youโ€™ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.