Latest vulnerabilities [Tuesday, February 13, 2024]

Latest vulnerabilities [Tuesday, February 13, 2024]
{{titre}}

Last update performed on 02/13/2024 at 11:57:07 PM

(14) CRITICAL VULNERABILITIES [9.0, 10.0]

Source : siemens.com

Vulnerability ID : CVE-2024-23816

First published on : 13-02-2024 09:15:50
Last modified on : 13-02-2024 14:01:00

Description :
A vulnerability has been identified in Location Intelligence Perpetual Large (9DE5110-8CA13-1AX0) (All versions < V4.3), Location Intelligence Perpetual Medium (9DE5110-8CA12-1AX0) (All versions < V4.3), Location Intelligence Perpetual Non-Prod (9DE5110-8CA10-1AX0) (All versions < V4.3), Location Intelligence Perpetual Small (9DE5110-8CA11-1AX0) (All versions < V4.3), Location Intelligence SUS Large (9DE5110-8CA13-1BX0) (All versions < V4.3), Location Intelligence SUS Medium (9DE5110-8CA12-1BX0) (All versions < V4.3), Location Intelligence SUS Non-Prod (9DE5110-8CA10-1BX0) (All versions < V4.3), Location Intelligence SUS Small (9DE5110-8CA11-1BX0) (All versions < V4.3). Affected products use a hard-coded secret value for the computation of a Keyed-Hash Message Authentication Code. This could allow an unauthenticated remote attacker to gain full administrative access to the application.

CVE ID : CVE-2024-23816
Source : productcert@siemens.com
CVSS Score : 9.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-580228.html | source : productcert@siemens.com

Vulnerability : CWE-798


Source : microsoft.com

Vulnerability ID : CVE-2024-21401

First published on : 13-02-2024 18:15:58
Last modified on : 13-02-2024 18:22:43

Description :
Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21401
Source : secure@microsoft.com
CVSS Score : 9.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21401 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21410

First published on : 13-02-2024 18:15:59
Last modified on : 13-02-2024 18:22:43

Description :
Microsoft Exchange Server Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21410
Source : secure@microsoft.com
CVSS Score : 9.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21413

First published on : 13-02-2024 18:16:00
Last modified on : 13-02-2024 18:22:43

Description :
Microsoft Outlook Remote Code Execution Vulnerability

CVE ID : CVE-2024-21413
Source : secure@microsoft.com
CVSS Score : 9.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21413 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21364

First published on : 13-02-2024 18:15:53
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft Azure Site Recovery Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21364
Source : secure@microsoft.com
CVSS Score : 9.3

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21364 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21376

First published on : 13-02-2024 18:15:55
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerability

CVE ID : CVE-2024-21376
Source : secure@microsoft.com
CVSS Score : 9.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21376 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21403

First published on : 13-02-2024 18:15:58
Last modified on : 13-02-2024 18:22:43

Description :
Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21403
Source : secure@microsoft.com
CVSS Score : 9.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21403 | source : secure@microsoft.com


Source : sap.com

Vulnerability ID : CVE-2024-22131

First published on : 13-02-2024 03:15:08
Last modified on : 13-02-2024 14:01:40

Description :
In SAP ABA (Application Basis) - versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75I, an attacker authenticated as a user with a remote execution authorization can use a vulnerable interface. This allows the attacker to use the interface to invoke an application function to perform actions which they would not normally be permitted to perform. Depending on the function executed, the attack can read or modify any user/business data and can make the entire system unavailable.

CVE ID : CVE-2024-22131
Source : cna@sap.com
CVSS Score : 9.1

References :
https://me.sap.com/notes/3420923 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-94


Source : github.com

Vulnerability ID : CVE-2024-1355

First published on : 13-02-2024 19:15:09
Last modified on : 13-02-2024 19:45:42

Description :
A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via the actions-console docker container while setting a service URL. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the GitHub Bug Bounty program.

CVE ID : CVE-2024-1355
Source : product-cna@github.com
CVSS Score : 9.1

References :
https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.5 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.15 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.10 | source : product-cna@github.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2024-1359

First published on : 13-02-2024 19:15:09
Last modified on : 13-02-2024 19:45:42

Description :
A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when setting up an HTTP proxy. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the GitHub Bug Bounty program https://bounty.github.com .

CVE ID : CVE-2024-1359
Source : product-cna@github.com
CVSS Score : 9.1

References :
https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.5 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.15 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.10 | source : product-cna@github.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2024-1369

First published on : 13-02-2024 19:15:10
Last modified on : 13-02-2024 19:45:42

Description :
A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when setting the username and password for collectd configurations. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the GitHub Bug Bounty program https://bounty.github.com .

CVE ID : CVE-2024-1369
Source : product-cna@github.com
CVSS Score : 9.1

References :
https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.5 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.15 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.10 | source : product-cna@github.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2024-1372

First published on : 13-02-2024 19:15:10
Last modified on : 13-02-2024 19:45:42

Description :
A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when configuring SAML settings. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the GitHub Bug Bounty program https://bounty.github.com .

CVE ID : CVE-2024-1372
Source : product-cna@github.com
CVSS Score : 9.1

References :
https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.5 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.15 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.10 | source : product-cna@github.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2024-1374

First published on : 13-02-2024 19:15:10
Last modified on : 13-02-2024 19:45:42

Description :
A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via nomad templates when configuring audit log forwarding. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the GitHub Bug Bounty program https://bounty.github.com .

CVE ID : CVE-2024-1374
Source : product-cna@github.com
CVSS Score : 9.1

References :
https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.5 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.15 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.10 | source : product-cna@github.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2024-1378

First published on : 13-02-2024 19:15:10
Last modified on : 13-02-2024 19:45:42

Description :
A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via nomad templates when configuring SMTP options. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the GitHub Bug Bounty program https://bounty.github.com .

CVE ID : CVE-2024-1378
Source : product-cna@github.com
CVSS Score : 9.1

References :
https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.5 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.15 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.10 | source : product-cna@github.com

Vulnerability : CWE-20


(90) HIGH VULNERABILITIES [7.0, 8.9]

Source : sap.com

Vulnerability ID : CVE-2024-22126

First published on : 13-02-2024 02:15:08
Last modified on : 13-02-2024 14:01:40

Description :
The User Admin application of SAP NetWeaver AS for Java - version 7.50, insufficiently validates and improperly encodes the incoming URL parameters before including them into the redirect URL. This results in Cross-Site Scripting (XSS) vulnerability, leading to a high impact on confidentiality and mild impact on integrity and availability.

CVE ID : CVE-2024-22126
Source : cna@sap.com
CVSS Score : 8.8

References :
https://me.sap.com/notes/3417627 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2024-24743

First published on : 13-02-2024 03:15:09
Last modified on : 13-02-2024 14:01:40

Description :
SAP NetWeaver AS Java (CAF - Guided Procedures) - version 7.50, allows an unauthenticated attacker to submit a malicious request with a crafted XML file over the network, which when parsed will enable him to access sensitive files and data but not modify them. There are expansion limits in place so that availability is not affected.

CVE ID : CVE-2024-24743
Source : cna@sap.com
CVSS Score : 8.6

References :
https://me.sap.com/notes/3426111 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-611


Vulnerability ID : CVE-2024-22130

First published on : 13-02-2024 03:15:08
Last modified on : 13-02-2024 14:01:40

Description :
Print preview option in SAP CRM WebClient UI - versions S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, S4FND 108, WEBCUIF 700, WEBCUIF 701, WEBCUIF 730, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability. An attacker with low privileges can cause limited impact to confidentiality and integrity of the appliaction data after successful exploitation.

CVE ID : CVE-2024-22130
Source : cna@sap.com
CVSS Score : 7.6

References :
https://me.sap.com/notes/3410875 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2024-22132

First published on : 13-02-2024 03:15:08
Last modified on : 13-02-2024 14:01:40

Description :
SAP IDES ECC-systems contain code that permits the execution of arbitrary program code of user's choice.An attacker can therefore control the behaviour of the system by executing malicious code which can potentially escalate privileges with low impact on confidentiality, integrity and availability of the system.

CVE ID : CVE-2024-22132
Source : cna@sap.com
CVSS Score : 7.4

References :
https://me.sap.com/notes/3421659 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-78


Vulnerability ID : CVE-2024-25642

First published on : 13-02-2024 03:15:09
Last modified on : 13-02-2024 14:01:40

Description :
Due to improper validation of certificate in SAP Cloud Connector - version 2.0, attacker can impersonate the genuine servers to interact with SCC breaking the mutual authentication. Hence, the attacker can intercept the request to view/modify sensitive information. There is no impact on the availability of the system.

CVE ID : CVE-2024-25642
Source : cna@sap.com
CVSS Score : 7.4

References :
https://me.sap.com/notes/3424610 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-295


Source : emc.com

Vulnerability ID : CVE-2024-22454

First published on : 13-02-2024 08:16:35
Last modified on : 13-02-2024 14:01:07

Description :
Dell PowerProtect Data Manager, version 19.15 and prior versions, contain a weak password recovery mechanism for forgotten passwords. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to unauthorized access to the application with privileges of the compromised account. The attacker could retrieve the reset password token without authorization and then perform the password change

CVE ID : CVE-2024-22454
Source : security_alert@emc.com
CVSS Score : 8.8

References :
https://www.dell.com/support/kbdoc/en-us/000222025/dsa-2024-061-dell-power-protect-data-manager-update-for-multiple-security-vulnerabilities | source : security_alert@emc.com

Vulnerability : CWE-640


Vulnerability ID : CVE-2024-22445

First published on : 13-02-2024 08:16:35
Last modified on : 13-02-2024 14:01:07

Description :
Dell PowerProtect Data Manager, version 19.15 and prior versions, contain an OS command injection vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.

CVE ID : CVE-2024-22445
Source : security_alert@emc.com
CVSS Score : 7.2

References :
https://www.dell.com/support/kbdoc/en-us/000222025/dsa-2024-061-dell-power-protect-data-manager-update-for-multiple-security-vulnerabilities | source : security_alert@emc.com

Vulnerability : CWE-78


Source : siemens.com

Vulnerability ID : CVE-2024-23810

First published on : 13-02-2024 09:15:49
Last modified on : 13-02-2024 14:01:00

Description :
A vulnerability has been identified in SINEC NMS (All versions < V2.0 SP1). The affected application is vulnerable to SQL injection. This could allow an unauthenticated remote attacker to execute arbitrary SQL queries on the server database.

CVE ID : CVE-2024-23810
Source : productcert@siemens.com
CVSS Score : 8.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-943925.html | source : productcert@siemens.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-23811

First published on : 13-02-2024 09:15:49
Last modified on : 13-02-2024 14:01:00

Description :
A vulnerability has been identified in SINEC NMS (All versions < V2.0 SP1). The affected application allows users to upload arbitrary files via TFTP. This could allow an attacker to upload malicious firmware images or other files, that could potentially lead to remote code execution.

CVE ID : CVE-2024-23811
Source : productcert@siemens.com
CVSS Score : 8.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-943925.html | source : productcert@siemens.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2024-23812

First published on : 13-02-2024 09:15:49
Last modified on : 13-02-2024 14:01:00

Description :
A vulnerability has been identified in SINEC NMS (All versions < V2.0 SP1). The affected application incorrectly neutralizes special elements when creating a report which could lead to command injection.

CVE ID : CVE-2024-23812
Source : productcert@siemens.com
CVSS Score : 8.0

References :
https://cert-portal.siemens.com/productcert/html/ssa-943925.html | source : productcert@siemens.com

Vulnerability : CWE-78


Vulnerability ID : CVE-2023-49125

First published on : 13-02-2024 09:15:46
Last modified on : 13-02-2024 14:01:07

Description :
A vulnerability has been identified in Parasolid V35.0 (All versions < V35.0.263), Parasolid V35.1 (All versions < V35.1.252), Parasolid V36.0 (All versions < V36.0.198). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted files containing XT format. This could allow an attacker to execute code in the context of the current process.

CVE ID : CVE-2023-49125
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-797296.html | source : productcert@siemens.com

Vulnerability : CWE-125


Vulnerability ID : CVE-2023-50236

First published on : 13-02-2024 09:15:46
Last modified on : 13-02-2024 14:01:07

Description :
A vulnerability has been identified in Polarion ALM (All versions). The affected product is vulnerable due to weak file and folder permissions in the installation path. An attacker with local access could exploit this vulnerability to escalate privileges to NT AUTHORITY\SYSTEM.

CVE ID : CVE-2023-50236
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-871717.html | source : productcert@siemens.com

Vulnerability : CWE-276


Vulnerability ID : CVE-2024-22042

First published on : 13-02-2024 09:15:47
Last modified on : 13-02-2024 14:01:07

Description :
A vulnerability has been identified in Unicam FX (All versions). The windows installer agent used in affected product contains incorrect use of privileged APIs that trigger the Windows Console Host (conhost.exe) as a child process with SYSTEM privileges. This could be exploited by an attacker to perform a local privilege escalation attack.

CVE ID : CVE-2024-22042
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-543502.html | source : productcert@siemens.com

Vulnerability : CWE-648


Vulnerability ID : CVE-2024-23795

First published on : 13-02-2024 09:15:47
Last modified on : 13-02-2024 19:21:23

Description :
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0012), Tecnomatix Plant Simulation V2302 (All versions < V2302.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted WRL file. This could allow an attacker to execute code in the context of the current process.

CVE ID : CVE-2024-23795
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-017796.html | source : productcert@siemens.com

Vulnerability : CWE-787

Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23796

First published on : 13-02-2024 09:15:47
Last modified on : 13-02-2024 19:21:35

Description :
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0012), Tecnomatix Plant Simulation V2302 (All versions < V2302.0006). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.

CVE ID : CVE-2024-23796
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-017796.html | source : productcert@siemens.com

Vulnerability : CWE-787

Vulnerability : CWE-122

Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23797

First published on : 13-02-2024 09:15:47
Last modified on : 13-02-2024 19:21:42

Description :
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0012), Tecnomatix Plant Simulation V2302 (All versions < V2302.0006). The affected applications contain a stack overflow vulnerability while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.

CVE ID : CVE-2024-23797
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-017796.html | source : productcert@siemens.com

Vulnerability : CWE-787

Vulnerability : CWE-121

Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23798

First published on : 13-02-2024 09:15:48
Last modified on : 13-02-2024 19:21:49

Description :
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0012), Tecnomatix Plant Simulation V2302 (All versions < V2302.0006). The affected applications contain a stack overflow vulnerability while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.

CVE ID : CVE-2024-23798
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-017796.html | source : productcert@siemens.com

Vulnerability : CWE-787

Vulnerability : CWE-121

Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23802

First published on : 13-02-2024 09:15:49
Last modified on : 13-02-2024 19:22:31

Description :
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0012), Tecnomatix Plant Simulation V2302 (All versions < V2302.0006). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted SPP files. This could allow an attacker to execute code in the context of the current process.

CVE ID : CVE-2024-23802
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-017796.html | source : productcert@siemens.com

Vulnerability : CWE-125

Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23803

First published on : 13-02-2024 09:15:49
Last modified on : 13-02-2024 14:01:00

Description :
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions), Tecnomatix Plant Simulation V2302 (All versions < V2302.0007). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process.

CVE ID : CVE-2024-23803
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-017796.html | source : productcert@siemens.com

Vulnerability : CWE-787


Vulnerability ID : CVE-2024-23804

First published on : 13-02-2024 09:15:49
Last modified on : 13-02-2024 14:01:00

Description :
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0012), Tecnomatix Plant Simulation V2302 (All versions < V2302.0006). The affected applications contain a stack overflow vulnerability while parsing specially crafted PSOBJ files. This could allow an attacker to execute code in the context of the current process.

CVE ID : CVE-2024-23804
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-017796.html | source : productcert@siemens.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-24920

First published on : 13-02-2024 09:15:50
Last modified on : 13-02-2024 14:01:00

Description :
A vulnerability has been identified in Simcenter Femap (All versions < V2401.0000). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted Catia MODEL file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21710)

CVE ID : CVE-2024-24920
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-000072.html | source : productcert@siemens.com

Vulnerability : CWE-787


Vulnerability ID : CVE-2024-24921

First published on : 13-02-2024 09:15:50
Last modified on : 13-02-2024 14:01:00

Description :
A vulnerability has been identified in Simcenter Femap (All versions < V2401.0000). The affected application is vulnerable to memory corruption while parsing specially crafted Catia MODEL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21712)

CVE ID : CVE-2024-24921
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-000072.html | source : productcert@siemens.com

Vulnerability : CWE-119


Vulnerability ID : CVE-2024-24922

First published on : 13-02-2024 09:15:50
Last modified on : 13-02-2024 14:01:00

Description :
A vulnerability has been identified in Simcenter Femap (All versions < V2401.0000). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted Catia MODEL file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21715)

CVE ID : CVE-2024-24922
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-000072.html | source : productcert@siemens.com

Vulnerability : CWE-787


Vulnerability ID : CVE-2024-24923

First published on : 13-02-2024 09:15:51
Last modified on : 13-02-2024 14:01:00

Description :
A vulnerability has been identified in Simcenter Femap (All versions < V2401.0000), Simcenter Femap (All versions < V2306.0001). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted Catia MODEL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-22055)

CVE ID : CVE-2024-24923
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-000072.html | source : productcert@siemens.com

Vulnerability : CWE-125


Vulnerability ID : CVE-2024-24924

First published on : 13-02-2024 09:15:51
Last modified on : 13-02-2024 14:01:00

Description :
A vulnerability has been identified in Simcenter Femap (All versions < V2306.0000). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted Catia MODEL file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-22059)

CVE ID : CVE-2024-24924
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-000072.html | source : productcert@siemens.com

Vulnerability : CWE-787


Vulnerability ID : CVE-2024-24925

First published on : 13-02-2024 09:15:51
Last modified on : 13-02-2024 14:01:00

Description :
A vulnerability has been identified in Simcenter Femap (All versions < V2306.0000). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted Catia MODEL files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-22060)

CVE ID : CVE-2024-24925
Source : productcert@siemens.com
CVSS Score : 7.8

References :
https://cert-portal.siemens.com/productcert/html/ssa-000072.html | source : productcert@siemens.com

Vulnerability : CWE-824


Vulnerability ID : CVE-2023-51440

First published on : 13-02-2024 09:15:46
Last modified on : 13-02-2024 14:01:07

Description :
A vulnerability has been identified in SIMATIC CP 343-1 (6GK7343-1EX30-0XE0) (All versions), SIMATIC CP 343-1 Lean (6GK7343-1CX10-0XE0) (All versions), SIPLUS NET CP 343-1 (6AG1343-1EX30-7XE0) (All versions), SIPLUS NET CP 343-1 Lean (6AG1343-1CX10-2XE0) (All versions). Affected products incorrectly validate TCP sequence numbers. This could allow an unauthenticated remote attacker to create a denial of service condition by injecting spoofed TCP RST packets.

CVE ID : CVE-2023-51440
Source : productcert@siemens.com
CVSS Score : 7.5

References :
https://cert-portal.siemens.com/productcert/html/ssa-516818.html | source : productcert@siemens.com

Vulnerability : CWE-940


Vulnerability ID : CVE-2024-23813

First published on : 13-02-2024 09:15:50
Last modified on : 13-02-2024 14:01:00

Description :
A vulnerability has been identified in Polarion ALM (All versions). The REST API endpoints of doorsconnector of the affected product lacks proper authentication. An unauthenticated attacker could access the endpoints, and potentially execute code.

CVE ID : CVE-2024-23813
Source : productcert@siemens.com
CVSS Score : 7.3

References :
https://cert-portal.siemens.com/productcert/html/ssa-871717.html | source : productcert@siemens.com

Vulnerability : CWE-287


Source : microsoft.com

Vulnerability ID : CVE-2024-21345

First published on : 13-02-2024 18:15:50
Last modified on : 13-02-2024 18:22:58

Description :
Windows Kernel Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21345
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21345 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21349

First published on : 13-02-2024 18:15:50
Last modified on : 13-02-2024 18:22:58

Description :
Microsoft ActiveX Data Objects Remote Code Execution Vulnerability

CVE ID : CVE-2024-21349
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21349 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21350

First published on : 13-02-2024 18:15:51
Last modified on : 13-02-2024 18:22:58

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-21350
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21350 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21352

First published on : 13-02-2024 18:15:51
Last modified on : 13-02-2024 18:22:58

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-21352
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21352 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21353

First published on : 13-02-2024 18:15:51
Last modified on : 13-02-2024 18:22:58

Description :
Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability

CVE ID : CVE-2024-21353
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21353 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21358

First published on : 13-02-2024 18:15:52
Last modified on : 13-02-2024 18:22:58

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-21358
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21358 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21359

First published on : 13-02-2024 18:15:52
Last modified on : 13-02-2024 18:22:58

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-21359
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21359 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21360

First published on : 13-02-2024 18:15:52
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-21360
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21360 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21361

First published on : 13-02-2024 18:15:53
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-21361
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21361 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21365

First published on : 13-02-2024 18:15:53
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-21365
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21365 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21366

First published on : 13-02-2024 18:15:53
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-21366
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21366 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21367

First published on : 13-02-2024 18:15:54
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-21367
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21367 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21368

First published on : 13-02-2024 18:15:54
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-21368
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21368 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21369

First published on : 13-02-2024 18:15:54
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-21369
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21369 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21370

First published on : 13-02-2024 18:15:54
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-21370
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21370 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21372

First published on : 13-02-2024 18:15:54
Last modified on : 13-02-2024 18:22:53

Description :
Windows OLE Remote Code Execution Vulnerability

CVE ID : CVE-2024-21372
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21372 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21375

First published on : 13-02-2024 18:15:55
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-21375
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21375 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21391

First published on : 13-02-2024 18:15:57
Last modified on : 13-02-2024 18:22:43

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-21391
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21391 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21420

First published on : 13-02-2024 18:16:00
Last modified on : 13-02-2024 18:22:43

Description :
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-21420
Source : secure@microsoft.com
CVSS Score : 8.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21420 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21395

First published on : 13-02-2024 18:15:57
Last modified on : 13-02-2024 18:22:43

Description :
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

CVE ID : CVE-2024-21395
Source : secure@microsoft.com
CVSS Score : 8.2

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21395 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21412

First published on : 13-02-2024 18:15:59
Last modified on : 13-02-2024 18:22:43

Description :
Internet Shortcut Files Security Feature Bypass Vulnerability

CVE ID : CVE-2024-21412
Source : secure@microsoft.com
CVSS Score : 8.1

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21412 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21378

First published on : 13-02-2024 18:15:55
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft Outlook Remote Code Execution Vulnerability

CVE ID : CVE-2024-21378
Source : secure@microsoft.com
CVSS Score : 8.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21378 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21380

First published on : 13-02-2024 18:15:56
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft Dynamics Business Central/NAV Information Disclosure Vulnerability

CVE ID : CVE-2024-21380
Source : secure@microsoft.com
CVSS Score : 8.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21380 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-20673

First published on : 13-02-2024 18:15:47
Last modified on : 13-02-2024 18:23:02

Description :
Microsoft Office Remote Code Execution Vulnerability

CVE ID : CVE-2024-20673
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20673 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21315

First published on : 13-02-2024 18:15:48
Last modified on : 13-02-2024 18:23:02

Description :
Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21315
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21315 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21338

First published on : 13-02-2024 18:15:49
Last modified on : 13-02-2024 18:23:02

Description :
Windows Kernel Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21338
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21338 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21346

First published on : 13-02-2024 18:15:50
Last modified on : 13-02-2024 18:22:58

Description :
Win32k Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21346
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21346 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21354

First published on : 13-02-2024 18:15:51
Last modified on : 13-02-2024 18:22:58

Description :
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21354
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21354 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21363

First published on : 13-02-2024 18:15:53
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

CVE ID : CVE-2024-21363
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21363 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21379

First published on : 13-02-2024 18:15:55
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft Word Remote Code Execution Vulnerability

CVE ID : CVE-2024-21379
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21379 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21384

First published on : 13-02-2024 18:15:56
Last modified on : 13-02-2024 18:22:43

Description :
Microsoft Office OneNote Remote Code Execution Vulnerability

CVE ID : CVE-2024-21384
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21384 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21327

First published on : 13-02-2024 18:15:48
Last modified on : 13-02-2024 18:23:02

Description :
Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability

CVE ID : CVE-2024-21327
Source : secure@microsoft.com
CVSS Score : 7.6

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21327 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21328

First published on : 13-02-2024 18:15:48
Last modified on : 13-02-2024 18:23:02

Description :
Dynamics 365 Sales Spoofing Vulnerability

CVE ID : CVE-2024-21328
Source : secure@microsoft.com
CVSS Score : 7.6

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21328 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21351

First published on : 13-02-2024 18:15:51
Last modified on : 13-02-2024 18:22:58

Description :
Windows SmartScreen Security Feature Bypass Vulnerability

CVE ID : CVE-2024-21351
Source : secure@microsoft.com
CVSS Score : 7.6

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21351 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21389

First published on : 13-02-2024 18:15:56
Last modified on : 13-02-2024 18:22:43

Description :
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

CVE ID : CVE-2024-21389
Source : secure@microsoft.com
CVSS Score : 7.6

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21389 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21393

First published on : 13-02-2024 18:15:57
Last modified on : 13-02-2024 18:22:43

Description :
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

CVE ID : CVE-2024-21393
Source : secure@microsoft.com
CVSS Score : 7.6

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21393 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21394

First published on : 13-02-2024 18:15:57
Last modified on : 13-02-2024 18:22:43

Description :
Dynamics 365 Field Service Spoofing Vulnerability

CVE ID : CVE-2024-21394
Source : secure@microsoft.com
CVSS Score : 7.6

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21394 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21396

First published on : 13-02-2024 18:15:57
Last modified on : 13-02-2024 18:22:43

Description :
Dynamics 365 Sales Spoofing Vulnerability

CVE ID : CVE-2024-21396
Source : secure@microsoft.com
CVSS Score : 7.6

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21396 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-20667

First published on : 13-02-2024 18:15:47
Last modified on : 13-02-2024 18:23:02

Description :
Azure DevOps Server Remote Code Execution Vulnerability

CVE ID : CVE-2024-20667
Source : secure@microsoft.com
CVSS Score : 7.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20667 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21342

First published on : 13-02-2024 18:15:49
Last modified on : 13-02-2024 18:22:58

Description :
Windows DNS Client Denial of Service Vulnerability

CVE ID : CVE-2024-21342
Source : secure@microsoft.com
CVSS Score : 7.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21342 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21347

First published on : 13-02-2024 18:15:50
Last modified on : 13-02-2024 18:22:58

Description :
Microsoft ODBC Driver Remote Code Execution Vulnerability

CVE ID : CVE-2024-21347
Source : secure@microsoft.com
CVSS Score : 7.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21347 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21348

First published on : 13-02-2024 18:15:50
Last modified on : 13-02-2024 18:22:58

Description :
Internet Connection Sharing (ICS) Denial of Service Vulnerability

CVE ID : CVE-2024-21348
Source : secure@microsoft.com
CVSS Score : 7.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21348 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21357

First published on : 13-02-2024 18:15:52
Last modified on : 13-02-2024 18:22:58

Description :
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

CVE ID : CVE-2024-21357
Source : secure@microsoft.com
CVSS Score : 7.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21357 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21386

First published on : 13-02-2024 18:15:56
Last modified on : 13-02-2024 18:22:43

Description :
.NET Denial of Service Vulnerability

CVE ID : CVE-2024-21386
Source : secure@microsoft.com
CVSS Score : 7.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21386 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21404

First published on : 13-02-2024 18:15:59
Last modified on : 13-02-2024 18:22:43

Description :
.NET Denial of Service Vulnerability

CVE ID : CVE-2024-21404
Source : secure@microsoft.com
CVSS Score : 7.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21404 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21406

First published on : 13-02-2024 18:15:59
Last modified on : 13-02-2024 18:22:43

Description :
Windows Printing Service Spoofing Vulnerability

CVE ID : CVE-2024-21406
Source : secure@microsoft.com
CVSS Score : 7.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21406 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21329

First published on : 13-02-2024 18:15:48
Last modified on : 13-02-2024 18:23:02

Description :
Azure Connected Machine Agent Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21329
Source : secure@microsoft.com
CVSS Score : 7.3

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21329 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21377

First published on : 13-02-2024 18:15:55
Last modified on : 13-02-2024 18:22:53

Description :
Windows DNS Information Disclosure Vulnerability

CVE ID : CVE-2024-21377
Source : secure@microsoft.com
CVSS Score : 7.1

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21377 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21402

First published on : 13-02-2024 18:15:58
Last modified on : 13-02-2024 18:22:43

Description :
Microsoft Outlook Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21402
Source : secure@microsoft.com
CVSS Score : 7.1

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21402 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21355

First published on : 13-02-2024 18:15:52
Last modified on : 13-02-2024 18:22:58

Description :
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21355
Source : secure@microsoft.com
CVSS Score : 7.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21355 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21371

First published on : 13-02-2024 18:15:54
Last modified on : 13-02-2024 18:22:53

Description :
Windows Kernel Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21371
Source : secure@microsoft.com
CVSS Score : 7.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21371 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21405

First published on : 13-02-2024 18:15:59
Last modified on : 13-02-2024 18:22:43

Description :
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21405
Source : secure@microsoft.com
CVSS Score : 7.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21405 | source : secure@microsoft.com


Source : hackerone.com

Vulnerability ID : CVE-2024-22024

First published on : 13-02-2024 04:15:07
Last modified on : 13-02-2024 15:15:32

Description :
An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways which allows an attacker to access certain restricted resources without authentication.

CVE ID : CVE-2024-22024
Source : support@hackerone.com
CVSS Score : 8.3

References :
https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US | source : support@hackerone.com

Vulnerability : CWE-611

Vulnerable product(s) : cpe:2.3:a:ivanti:connect_secure:9.1:r14.4:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ivanti:connect_secure:9.1:r17.2:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ivanti:connect_secure:9.1:r18.3:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ivanti:connect_secure:22.4:r2.2:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ivanti:connect_secure:22.5:r1.1:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:ivanti:connect_secure:22.5:r2.2:*:*:*:*:*:*

Vulnerable product(s) : cpe:2.3:a:ivanti:policy_secure:22.5:r1.1:*:*:*:*:*:*

Vulnerable product(s) : cpe:2.3:a:ivanti:zero_trust_access:22.6:r1.3:*:*:*:*:*:*


Source : github.com

Vulnerability ID : CVE-2024-1354

First published on : 13-02-2024 19:15:09
Last modified on : 13-02-2024 19:45:42

Description :
A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via the `syslog-ng` configuration file. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the GitHub Bug Bounty program.

CVE ID : CVE-2024-1354
Source : product-cna@github.com
CVSS Score : 8.0

References :
https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.5 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.15 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.10 | source : product-cna@github.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2024-24814

First published on : 13-02-2024 19:15:11
Last modified on : 13-02-2024 19:45:42

Description :
mod_auth_openidc is an OpenID Certifiedโ„ข authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In affected versions missing input validation on mod_auth_openidc_session_chunks cookie value makes the server vulnerable to a denial of service (DoS) attack. An internal security audit has been conducted and the reviewers found that if they manipulated the value of the mod_auth_openidc_session_chunks cookie to a very large integer, like 99999999, the server struggles with the request for a long time and finally gets back with a 500 error. Making a few requests of this kind caused our server to become unresponsive. Attackers can craft requests that would make the server work very hard (and possibly become unresponsive) and/or crash with minimal effort. This issue has been addressed in version 2.4.15.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2024-24814
Source : security-advisories@github.com
CVSS Score : 7.5

References :
https://github.com/OpenIDC/mod_auth_openidc/commit/4022c12f314bd89d127d1be008b1a80a08e1203d | source : security-advisories@github.com
https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-hxr6-w4gc-7vvv | source : security-advisories@github.com

Vulnerability : CWE-400


Vulnerability ID : CVE-2024-25122

First published on : 13-02-2024 19:15:11
Last modified on : 13-02-2024 19:45:42

Description :
sidekiq-unique-jobs is an open source project which prevents simultaneous Sidekiq jobs with the same unique arguments to run. Specially crafted GET request parameters handled by any of the following endpoints of sidekiq-unique-jobs' "admin" web UI, allow a super-user attacker, or an unwitting, but authorized, victim, who has received a disguised / crafted link, to successfully execute malicious code, which could potentially steal cookies, session data, or local storage data from the app the sidekiq-unique-jobs web UI is mounted in. 1. `/changelogs`, 2. `/locks` or 3. `/expiring_locks`. This issue has been addressed in versions 7.1.33 and 8.0.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2024-25122
Source : security-advisories@github.com
CVSS Score : 7.1

References :
https://github.com/mhenrixon/sidekiq-unique-jobs/commit/ec3afd920c1b55843c72f748a87baac7f8be82ed | source : security-advisories@github.com
https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38 | source : security-advisories@github.com

Vulnerability : CWE-79


Source : fluidattacks.com

Vulnerability ID : CVE-2024-1096

First published on : 13-02-2024 15:15:08
Last modified on : 13-02-2024 15:16:05

Description :
Twister Antivirus v8.17 allows Elevation of Privileges on the computer where it's installed by triggering the 0x80112067, 0x801120CB and 0x801120CC IOCTL codes of the fildds.sys driver.

CVE ID : CVE-2024-1096
Source : help@fluidattacks.com
CVSS Score : 7.8

References :
http://www.filseclab.com/en-us/products/twister.htm | source : help@fluidattacks.com
https://fluidattacks.com/advisories/holiday/ | source : help@fluidattacks.com

Vulnerability : CWE-20


Source : isc.org

Vulnerability ID : CVE-2023-4408

First published on : 13-02-2024 14:15:45
Last modified on : 13-02-2024 16:15:08

Description :
The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers. This issue affects BIND 9 versions 9.0.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.

CVE ID : CVE-2023-4408
Source : security-officer@isc.org
CVSS Score : 7.5

References :
http://www.openwall.com/lists/oss-security/2024/02/13/1 | source : security-officer@isc.org
https://kb.isc.org/docs/cve-2023-4408 | source : security-officer@isc.org


Vulnerability ID : CVE-2023-5517

First published on : 13-02-2024 14:15:45
Last modified on : 13-02-2024 16:15:08

Description :
A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when: - `nxdomain-redirect <domain>;` is configured, and - the resolver receives a PTR query for an RFC 1918 address that would normally result in an authoritative NXDOMAIN response. This issue affects BIND 9 versions 9.12.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.

CVE ID : CVE-2023-5517
Source : security-officer@isc.org
CVSS Score : 7.5

References :
http://www.openwall.com/lists/oss-security/2024/02/13/1 | source : security-officer@isc.org
https://kb.isc.org/docs/cve-2023-5517 | source : security-officer@isc.org


Vulnerability ID : CVE-2023-5679

First published on : 13-02-2024 14:15:45
Last modified on : 13-02-2024 16:15:08

Description :
A bad interaction between DNS64 and serve-stale may cause `named` to crash with an assertion failure during recursive resolution, when both of these features are enabled. This issue affects BIND 9 versions 9.16.12 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.12-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.

CVE ID : CVE-2023-5679
Source : security-officer@isc.org
CVSS Score : 7.5

References :
http://www.openwall.com/lists/oss-security/2024/02/13/1 | source : security-officer@isc.org
https://kb.isc.org/docs/cve-2023-5679 | source : security-officer@isc.org


Vulnerability ID : CVE-2023-6516

First published on : 13-02-2024 14:15:46
Last modified on : 13-02-2024 16:15:08

Description :
To keep its cache database efficient, `named` running as a recursive resolver occasionally attempts to clean up the database. It uses several methods, including some that are asynchronous: a small chunk of memory pointing to the cache element that can be cleaned up is first allocated and then queued for later processing. It was discovered that if the resolver is continuously processing query patterns triggering this type of cache-database maintenance, `named` may not be able to handle the cleanup events in a timely manner. This in turn enables the list of queued cleanup events to grow infinitely large over time, allowing the configured `max-cache-size` limit to be significantly exceeded. This issue affects BIND 9 versions 9.16.0 through 9.16.45 and 9.16.8-S1 through 9.16.45-S1.

CVE ID : CVE-2023-6516
Source : security-officer@isc.org
CVSS Score : 7.5

References :
http://www.openwall.com/lists/oss-security/2024/02/13/1 | source : security-officer@isc.org
https://kb.isc.org/docs/cve-2023-6516 | source : security-officer@isc.org


Source : cert.vde.com

Vulnerability ID : CVE-2024-24781

First published on : 13-02-2024 14:15:46
Last modified on : 13-02-2024 15:16:05

Description :
An unauthenticated remote attacker can use an uncontrolled resource consumption vulnerability to DoS the affected devices through excessive traffic on a single ethernet port.

CVE ID : CVE-2024-24781
Source : info@cert.vde.com
CVSS Score : 7.5

References :
https://cert.vde.com/en/advisories/VDE-2024-013 | source : info@cert.vde.com

Vulnerability : CWE-400


(46) MEDIUM VULNERABILITIES [4.0, 6.9]

Source : snyk.io

Vulnerability ID : CVE-2024-21491

First published on : 13-02-2024 05:15:08
Last modified on : 13-02-2024 14:01:07

Description :
Versions of the package svix before 1.17.0 are vulnerable to Authentication Bypass due to an issue in the verify function where signatures of different lengths are incorrectly compared. An attacker can bypass signature verification by providing a shorter signature that matches the beginning of the actual signature. **Note:** The attacker would need to know a victim uses the Rust library for verification,no easy way to automatically check that; and uses webhooks by a service that uses Svix, and then figure out a way to craft a malicious payload that will actually include all of the correct identifiers needed to trick the receivers to cause actual issues.

CVE ID : CVE-2024-21491
Source : report@snyk.io
CVSS Score : 6.8

References :
https://github.com/svix/svix-webhooks/commit/958821bd3b956d1436af65f70a0964d4ffb7daf6 | source : report@snyk.io
https://github.com/svix/svix-webhooks/pull/1190 | source : report@snyk.io
https://rustsec.org/advisories/RUSTSEC-2024-0010.html | source : report@snyk.io
https://security.snyk.io/vuln/SNYK-RUST-SVIX-6230729 | source : report@snyk.io

Vulnerability : CWE-288


Source : huntr.dev

Vulnerability ID : CVE-2024-1163

First published on : 13-02-2024 15:15:08
Last modified on : 13-02-2024 15:16:05

Description :
Path Traversal in GitHub repository mbloch/mapshaper prior to 0.6.44.

CVE ID : CVE-2024-1163
Source : security@huntr.dev
CVSS Score : 6.8

References :
https://github.com/mbloch/mapshaper/commit/7437d903c0a87802c3751fc529d2de7098094c72 | source : security@huntr.dev
https://huntr.com/bounties/c1cbc18b-e4ab-4332-ad13-0033f0f976f5 | source : security@huntr.dev

Vulnerability : CWE-22


Source : microsoft.com

Vulnerability ID : CVE-2024-21341

First published on : 13-02-2024 18:15:49
Last modified on : 13-02-2024 18:22:58

Description :
Windows Kernel Remote Code Execution Vulnerability

CVE ID : CVE-2024-21341
Source : secure@microsoft.com
CVSS Score : 6.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21341 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21381

First published on : 13-02-2024 18:15:56
Last modified on : 13-02-2024 18:22:43

Description :
Microsoft Azure Active Directory B2C Spoofing Vulnerability

CVE ID : CVE-2024-21381
Source : secure@microsoft.com
CVSS Score : 6.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21381 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-20679

First published on : 13-02-2024 18:15:47
Last modified on : 13-02-2024 18:23:02

Description :
Azure Stack Hub Spoofing Vulnerability

CVE ID : CVE-2024-20679
Source : secure@microsoft.com
CVSS Score : 6.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20679 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-20684

First published on : 13-02-2024 18:15:47
Last modified on : 13-02-2024 18:23:02

Description :
Windows Hyper-V Denial of Service Vulnerability

CVE ID : CVE-2024-20684
Source : secure@microsoft.com
CVSS Score : 6.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20684 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21356

First published on : 13-02-2024 18:15:52
Last modified on : 13-02-2024 18:22:58

Description :
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability

CVE ID : CVE-2024-21356
Source : secure@microsoft.com
CVSS Score : 6.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21356 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21339

First published on : 13-02-2024 18:15:49
Last modified on : 13-02-2024 18:23:02

Description :
Windows USB Generic Parent Driver Remote Code Execution Vulnerability

CVE ID : CVE-2024-21339
Source : secure@microsoft.com
CVSS Score : 6.4

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21339 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21343

First published on : 13-02-2024 18:15:49
Last modified on : 13-02-2024 18:22:58

Description :
Windows Network Address Translation (NAT) Denial of Service Vulnerability

CVE ID : CVE-2024-21343
Source : secure@microsoft.com
CVSS Score : 5.9

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21343 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21344

First published on : 13-02-2024 18:15:50
Last modified on : 13-02-2024 18:22:58

Description :
Windows Network Address Translation (NAT) Denial of Service Vulnerability

CVE ID : CVE-2024-21344
Source : secure@microsoft.com
CVSS Score : 5.9

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21344 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-20695

First published on : 13-02-2024 18:15:48
Last modified on : 13-02-2024 18:23:02

Description :
Skype for Business Information Disclosure Vulnerability

CVE ID : CVE-2024-20695
Source : secure@microsoft.com
CVSS Score : 5.7

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20695 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21362

First published on : 13-02-2024 18:15:53
Last modified on : 13-02-2024 18:22:53

Description :
Windows Kernel Security Feature Bypass Vulnerability

CVE ID : CVE-2024-21362
Source : secure@microsoft.com
CVSS Score : 5.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21362 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21397

First published on : 13-02-2024 18:15:58
Last modified on : 13-02-2024 18:22:43

Description :
Microsoft Azure File Sync Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21397
Source : secure@microsoft.com
CVSS Score : 5.3

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21397 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21374

First published on : 13-02-2024 18:15:55
Last modified on : 13-02-2024 18:22:53

Description :
Microsoft Teams for Android Information Disclosure

CVE ID : CVE-2024-21374
Source : secure@microsoft.com
CVSS Score : 5.0

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21374 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21340

First published on : 13-02-2024 18:15:49
Last modified on : 13-02-2024 18:22:58

Description :
Windows Kernel Information Disclosure Vulnerability

CVE ID : CVE-2024-21340
Source : secure@microsoft.com
CVSS Score : 4.6

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21340 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21304

First published on : 13-02-2024 18:15:48
Last modified on : 13-02-2024 18:23:02

Description :
Trusted Compute Base Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21304
Source : secure@microsoft.com
CVSS Score : 4.1

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21304 | source : secure@microsoft.com


Source : yd.MitsubishiElectric.co.jp

Vulnerability ID : CVE-2023-6815

First published on : 13-02-2024 07:15:46
Last modified on : 13-02-2024 14:01:07

Description :
Incorrect Privilege Assignment vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series Safety CPU R08/16/32/120SFCPU all versions and MELSEC iQ-R Series SIL2 Process CPU R08/16/32/120PSFCPU all versions allows a remote authenticated attacker who has logged into the product as a non-administrator user to disclose the credentials (user ID and password) of a user with a lower access level than the attacker by sending a specially crafted packet.

CVE ID : CVE-2023-6815
Source : Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
CVSS Score : 6.5

References :
https://jvn.jp/vu/JVNVU95085830/index.html | source : Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-021_en.pdf | source : Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp

Vulnerability : CWE-266


Source : siemens.com

Vulnerability ID : CVE-2023-48363

First published on : 13-02-2024 09:15:45
Last modified on : 13-02-2024 14:01:07

Description :
A vulnerability has been identified in OpenPCS 7 V9.1 (All versions), SIMATIC BATCH V9.1 (All versions), SIMATIC PCS 7 V9.1 (All versions), SIMATIC Route Control V9.1 (All versions), SIMATIC WinCC Runtime Professional V18 (All versions), SIMATIC WinCC Runtime Professional V19 (All versions), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 15), SIMATIC WinCC V8.0 (All versions < V8.0 SP4). The implementation of the RPC (Remote Procedure call) communication protocol in the affected products do not properly handle certain unorganized RPC messages. An attacker could use this vulnerability to cause a denial of service condition in the RPC server.

CVE ID : CVE-2023-48363
Source : productcert@siemens.com
CVSS Score : 6.5

References :
https://cert-portal.siemens.com/productcert/html/ssa-753746.html | source : productcert@siemens.com

Vulnerability : CWE-476


Vulnerability ID : CVE-2023-48364

First published on : 13-02-2024 09:15:45
Last modified on : 13-02-2024 14:01:07

Description :
A vulnerability has been identified in OpenPCS 7 V9.1 (All versions), SIMATIC BATCH V9.1 (All versions), SIMATIC PCS 7 V9.1 (All versions), SIMATIC Route Control V9.1 (All versions), SIMATIC WinCC Runtime Professional V18 (All versions), SIMATIC WinCC Runtime Professional V19 (All versions), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 15), SIMATIC WinCC V8.0 (All versions < V8.0 SP4). The implementation of the RPC (Remote Procedure call) communication protocol in the affected products do not properly handle certain malformed RPC messages. An attacker could use this vulnerability to cause a denial of service condition in the RPC server.

CVE ID : CVE-2023-48364
Source : productcert@siemens.com
CVSS Score : 6.5

References :
https://cert-portal.siemens.com/productcert/html/ssa-753746.html | source : productcert@siemens.com

Vulnerability : CWE-476


Vulnerability ID : CVE-2024-23799

First published on : 13-02-2024 09:15:48
Last modified on : 13-02-2024 19:22:01

Description :
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions), Tecnomatix Plant Simulation V2302 (All versions < V2302.0007). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted SPP files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.

CVE ID : CVE-2024-23799
Source : productcert@siemens.com
CVSS Score : 5.5

References :
https://cert-portal.siemens.com/productcert/html/ssa-017796.html | source : productcert@siemens.com

Vulnerability : CWE-476

Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:2201.0:-:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23800

First published on : 13-02-2024 09:15:48
Last modified on : 13-02-2024 19:22:19

Description :
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions), Tecnomatix Plant Simulation V2302 (All versions < V2302.0007). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted SPP files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.

CVE ID : CVE-2024-23800
Source : productcert@siemens.com
CVSS Score : 5.5

References :
https://cert-portal.siemens.com/productcert/html/ssa-017796.html | source : productcert@siemens.com

Vulnerability : CWE-476

Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:2201.0:-:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23801

First published on : 13-02-2024 09:15:48
Last modified on : 13-02-2024 19:22:25

Description :
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions), Tecnomatix Plant Simulation V2302 (All versions < V2302.0007). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted SPP files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.

CVE ID : CVE-2024-23801
Source : productcert@siemens.com
CVSS Score : 5.5

References :
https://cert-portal.siemens.com/productcert/html/ssa-017796.html | source : productcert@siemens.com

Vulnerability : CWE-476

Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*
Vulnerable product(s) : cpe:2.3:a:siemens:tecnomatix_plant_simulation:2201.0:-:*:*:*:*:*:*


Source : github.com

Vulnerability ID : CVE-2024-1084

First published on : 13-02-2024 19:15:09
Last modified on : 13-02-2024 19:45:42

Description :
Cross-site Scripting in the tag name pattern field in the tag protections UI in GitHub Enterprise Server allows a malicious website that requires user interaction and social engineering to make changes to a user account via CSP bypass with created CSRF tokens. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in all versions of 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the GitHub Bug Bounty program.

CVE ID : CVE-2024-1084
Source : product-cna@github.com
CVSS Score : 6.5

References :
https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.5 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.15 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.10 | source : product-cna@github.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2024-1082

First published on : 13-02-2024 19:15:08
Last modified on : 13-02-2024 19:45:42

Description :
A path traversal vulnerability was identified in GitHub Enterprise Server that allowed an attacker to gain unauthorized read permission to files by deploying arbitrary symbolic links to a GitHub Pages site with a specially crafted artifact tarball. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.15, 3.9.10, 3.10.7, 3.11.5. This vulnerability was reported via the GitHub Bug Bounty program.

CVE ID : CVE-2024-1082
Source : product-cna@github.com
CVSS Score : 6.3

References :
https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.5 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.15 | source : product-cna@github.com
https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.10 | source : product-cna@github.com

Vulnerability : CWE-22


Vulnerability ID : CVE-2024-24751

First published on : 13-02-2024 19:15:10
Last modified on : 13-02-2024 19:45:42

Description :
sf_event_mgt is an event management and registration extension for the TYPO3 CMS based on ExtBase and Fluid. In affected versions the existing access control check for events in the backend module got broken during the update of the extension to TYPO3 12.4, because the `RedirectResponse` from the `$this->redirect()` function was never handled. This issue has been addressed in version 7.4.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2024-24751
Source : security-advisories@github.com
CVSS Score : 4.3

References :
https://github.com/derhansen/sf_event_mgt/commit/a08c2cd48695c07e462d15eeb70434ddc0206e4c | source : security-advisories@github.com
https://github.com/derhansen/sf_event_mgt/security/advisories/GHSA-4576-pgh2-g34j | source : security-advisories@github.com

Vulnerability : CWE-284
Vulnerability : CWE-863


Source : wordfence.com

Vulnerability ID : CVE-2024-1159

First published on : 13-02-2024 10:15:08
Last modified on : 13-02-2024 14:01:00

Description :
The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 4.8.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2024-1159
Source : security@wordfence.com
CVSS Score : 6.4

References :
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034441%40bold-page-builder&new=3034441%40bold-page-builder&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/e71386ea-0546-4aa7-b77a-e1824e80accc?source=cve | source : security@wordfence.com


Vulnerability ID : CVE-2024-1157

First published on : 13-02-2024 10:15:08
Last modified on : 13-02-2024 14:01:00

Description :
The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's button URL in all versions up to, and including, 4.8.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2024-1157
Source : security@wordfence.com
CVSS Score : 5.4

References :
https://plugins.trac.wordpress.org/browser/bold-page-builder/trunk/content_elements/bt_bb_button/bt_bb_button.php#L161 | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034441%40bold-page-builder&new=3034441%40bold-page-builder&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/e166a7db-45f7-4a0d-9966-dbec9ade204a?source=cve | source : security@wordfence.com


Vulnerability ID : CVE-2024-1160

First published on : 13-02-2024 10:15:08
Last modified on : 13-02-2024 14:01:00

Description :
The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Icon Link in all versions up to, and including, 4.8.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2024-1160
Source : security@wordfence.com
CVSS Score : 5.4

References :
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034441%40bold-page-builder&new=3034441%40bold-page-builder&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/818d3418-8e14-49b9-a112-8eab9eb3c283?source=cve | source : security@wordfence.com


Source : sap.com

Vulnerability ID : CVE-2024-24739

First published on : 13-02-2024 03:15:08
Last modified on : 13-02-2024 14:01:40

Description :
SAP Bank Account Management (BAM) allows an authenticated user with restricted access to use functions which can result in escalation of privileges with low impact on confidentiality, integrity and availability of the application.

CVE ID : CVE-2024-24739
Source : cna@sap.com
CVSS Score : 6.3

References :
https://me.sap.com/notes/2637727 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-862


Vulnerability ID : CVE-2024-22129

First published on : 13-02-2024 04:15:08
Last modified on : 13-02-2024 14:01:40

Description :
SAP Companion - version <3.1.38, has a URL with parameter that could be vulnerable to XSS attack. The attacker could send a malicious link to a user that would possibly allow an attacker to retrieve the sensitive information and cause minor impact on the integrity of the web application.

CVE ID : CVE-2024-22129
Source : cna@sap.com
CVSS Score : 5.4

References :
https://me.sap.com/notes/3404025 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2024-24740

First published on : 13-02-2024 03:15:08
Last modified on : 13-02-2024 14:01:40

Description :
SAP NetWeaver Application Server (ABAP) - versions KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.93, KERNEL 7.94, KRNL64UC 7.53, under certain conditions, allows an attacker to access information which could otherwise be restricted with low impact on confidentiality of the application.

CVE ID : CVE-2024-24740
Source : cna@sap.com
CVSS Score : 5.3

References :
https://me.sap.com/notes/3360827 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2024-22128

First published on : 13-02-2024 02:15:08
Last modified on : 13-02-2024 14:01:40

Description :
SAP NWBC for HTML - versions SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. An unauthenticated attacker can inject malicious javascript to cause limited impact to confidentiality and integrity of the application data after successful exploitation.

CVE ID : CVE-2024-22128
Source : cna@sap.com
CVSS Score : 4.7

References :
https://me.sap.com/notes/3396109 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2024-24741

First published on : 13-02-2024 04:15:08
Last modified on : 13-02-2024 14:01:40

Description :
SAP Master Data Governance for Material Data - versions 618, 619, 620, 621, 622, 800, 801, 802, 803, 804, does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. This could allow an attacker to read some sensitive information but no impact to integrity and availability.

CVE ID : CVE-2024-24741
Source : cna@sap.com
CVSS Score : 4.3

References :
https://me.sap.com/notes/2897391 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-862


Vulnerability ID : CVE-2024-25643

First published on : 13-02-2024 04:15:08
Last modified on : 13-02-2024 14:01:07

Description :
The SAP Fiori app (My Overtime Request) - version 605, does not perform the necessary authorization checks for an authenticated user which may result in an escalation of privileges. It is possible to manipulate the URLs of data requests to access information that the user should not have access to. There is no impact on integrity and availability.

CVE ID : CVE-2024-25643
Source : cna@sap.com
CVSS Score : 4.3

References :
https://me.sap.com/notes/3237638 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-862


Vulnerability ID : CVE-2024-24742

First published on : 13-02-2024 03:15:09
Last modified on : 13-02-2024 14:01:40

Description :
SAP CRM WebClient UI - version S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, WEBCUIF 701, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. An attacker with low privileges can cause limited impact to integrity of the application data after successful exploitation. There is no impact on confidentiality and availability.

CVE ID : CVE-2024-24742
Source : cna@sap.com
CVSS Score : 4.1

References :
https://me.sap.com/notes/3158455 | source : cna@sap.com
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | source : cna@sap.com

Vulnerability : CWE-79


Source : fluidattacks.com

Vulnerability ID : CVE-2024-23439

First published on : 13-02-2024 15:15:08
Last modified on : 13-02-2024 15:16:05

Description :
Vba32 Antivirus v3.36.0 is vulnerable to an Arbitrary Memory Read vulnerability by triggering the 0x22201B, 0x22201F, 0x222023, 0x222027 ,0x22202B, 0x22202F, 0x22203F, 0x222057 and 0x22205B IOCTL codes of the Vba32m64.sys driver.

CVE ID : CVE-2024-23439
Source : help@fluidattacks.com
CVSS Score : 6.3

References :
https://fluidattacks.com/advisories/adderley/ | source : help@fluidattacks.com
https://www.anti-virus.by/vba32 | source : help@fluidattacks.com

Vulnerability : CWE-125


Vulnerability ID : CVE-2024-23440

First published on : 13-02-2024 15:15:09
Last modified on : 13-02-2024 15:16:05

Description :
Vba32 Antivirus v3.36.0 is vulnerable to an Arbitrary Memory Read vulnerability. The 0x22200B IOCTL code of the Vba32m64.sys driver allows to read up to 0x802 of memory from ar arbitrary user-supplied pointer.

CVE ID : CVE-2024-23440
Source : help@fluidattacks.com
CVSS Score : 6.3

References :
https://fluidattacks.com/advisories/adderley/ | source : help@fluidattacks.com
https://www.anti-virus.by/vba32 | source : help@fluidattacks.com

Vulnerability : CWE-125


Vulnerability ID : CVE-2024-1140

First published on : 13-02-2024 15:15:08
Last modified on : 13-02-2024 15:16:05

Description :
Twister Antivirus v8.17 is vulnerable to an Out-of-bounds Read vulnerability by triggering the 0x801120B8 IOCTL code of the filmfd.sys driver.

CVE ID : CVE-2024-1140
Source : help@fluidattacks.com
CVSS Score : 5.8

References :
http://www.filseclab.com/en-us/products/twister.htm | source : help@fluidattacks.com
https://fluidattacks.com/advisories/fitzgerald/ | source : help@fluidattacks.com

Vulnerability : CWE-125


Vulnerability ID : CVE-2024-1216

First published on : 13-02-2024 19:15:09
Last modified on : 13-02-2024 19:45:42

Description :
Twister Antivirus v8.17 is vulnerable to a Denial of Service vulnerability by triggering the 0x80112044, 0x8011204B, 0x8011204F, 0x80112057, 0x8011205B, 0x8011205F, 0x80112063, 0x8011206F, 0x80112073, 0x80112077, 0x80112078, 0x8011207C and 0x80112080 IOCTL codes of the fildds.sys driver.

CVE ID : CVE-2024-1216
Source : help@fluidattacks.com
CVSS Score : 5.5

References :
http://www.filseclab.com/en-us/products/twister.htm | source : help@fluidattacks.com
https://fluidattacks.com/advisories/gershwin/ | source : help@fluidattacks.com

Vulnerability : CWE-476


Source : qnapsecurity.com.tw

Vulnerability ID : CVE-2023-47218

First published on : 13-02-2024 03:15:07
Last modified on : 13-02-2024 14:01:40

Description :
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-47218
Source : security@qnapsecurity.com.tw
CVSS Score : 5.8

References :
https://www.qnap.com/en/security-advisory/qsa-23-57 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-77
Vulnerability : CWE-78


Vulnerability ID : CVE-2023-50358

First published on : 13-02-2024 03:15:07
Last modified on : 13-02-2024 14:01:40

Description :
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QTS 4.5.4.2627 build 20231225 and later QTS 4.3.6.2665 build 20240131 and later QTS 4.3.4.2675 build 20240131 and later QTS 4.3.3.2644 build 20240131 and later QTS 4.2.6 build 20240131 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTS hero h4.5.4.2626 build 20231225 and later QuTScloud c5.1.5.2651 and later

CVE ID : CVE-2023-50358
Source : security@qnapsecurity.com.tw
CVSS Score : 5.8

References :
https://www.qnap.com/en/security-advisory/qsa-23-57 | source : security@qnapsecurity.com.tw

Vulnerability : CWE-78


Source : grafana.com

Vulnerability ID : CVE-2023-6152

First published on : 13-02-2024 22:15:45
Last modified on : 13-02-2024 22:15:45

Description :
A user changing their email after signing up and verifying it can change it without verification in profile settings. The configuration option "verify_email_enabled" will only validate email only on sign up.

CVE ID : CVE-2023-6152
Source : security@grafana.com
CVSS Score : 5.4

References :
https://github.com/grafana/bugbounty/security/advisories/GHSA-3hv4-r2fm-h27f | source : security@grafana.com
https://grafana.com/security/security-advisories/cve-2023-6152/ | source : security@grafana.com

Vulnerability : CWE-863


Source : isc.org

Vulnerability ID : CVE-2023-5680

First published on : 13-02-2024 14:15:45
Last modified on : 13-02-2024 15:16:05

Description :
If a resolver cache has a very large number of ECS records stored for the same name, the process of cleaning the cache database node for this name can significantly impair query performance. This issue affects BIND 9 versions 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.

CVE ID : CVE-2023-5680
Source : security-officer@isc.org
CVSS Score : 5.3

References :
https://kb.isc.org/docs/cve-2023-5680 | source : security-officer@isc.org


Source : trellix.com

Vulnerability ID : CVE-2023-6072

First published on : 13-02-2024 10:15:08
Last modified on : 13-02-2024 14:01:00

Description :
A cross-site scripting vulnerability in Trellix Central Management (CM) prior to 9.1.3.97129 allows a remote authenticated attacker to craft CM dashboard internal requests causing arbitrary content to be injected into the response when accessing the CM dashboard.

CVE ID : CVE-2023-6072
Source : trellixpsirt@trellix.com
CVSS Score : 4.6

References :
https://docs.trellix.com/bundle/cm_9-1-5_rn/page/UUID-fad8a50f-6f6f-e970-f418-06494a30932e.html | source : trellixpsirt@trellix.com

Vulnerability : CWE-79


Source : patchstack.com

Vulnerability ID : CVE-2024-25914

First published on : 13-02-2024 05:15:09
Last modified on : 13-02-2024 14:01:07

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Photoboxone SMTP Mail.This issue affects SMTP Mail: from n/a through 1.3.20.

CVE ID : CVE-2024-25914
Source : audit@patchstack.com
CVSS Score : 4.3

References :
https://patchstack.com/database/vulnerability/smtp-mail/wordpress-smtp-mail-plugin-1-3-20-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Source : cert.vde.com

Vulnerability ID : CVE-2024-24782

First published on : 13-02-2024 14:15:47
Last modified on : 13-02-2024 15:16:05

Description :
An unauthenticated attacker can send a ping request from one network to another through an error in the origin verification even though the ports are separated by VLAN.

CVE ID : CVE-2024-24782
Source : info@cert.vde.com
CVSS Score : 4.3

References :
https://cert.vde.com/en/advisories/VDE-2024-013 | source : info@cert.vde.com

Vulnerability : CWE-346


(1) LOW VULNERABILITIES [0.1, 3.9]

Source : siemens.com

Vulnerability ID : CVE-2024-22043

First published on : 13-02-2024 09:15:47
Last modified on : 13-02-2024 14:01:07

Description :
A vulnerability has been identified in Parasolid V35.0 (All versions < V35.0.251), Parasolid V35.1 (All versions < V35.1.170). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted XT files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.

CVE ID : CVE-2024-22043
Source : productcert@siemens.com
CVSS Score : 3.3

References :
https://cert-portal.siemens.com/productcert/html/ssa-797296.html | source : productcert@siemens.com

Vulnerability : CWE-476


(22) NO SCORE VULNERABILITIES [0.0, 0.0]

Source : mitre.org

Vulnerability ID : CVE-2023-42374

First published on : 13-02-2024 01:15:07
Last modified on : 13-02-2024 14:01:40

Description :
An issue in mystenlabs Sui Blockchain before v.1.6.3 allow a remote attacker to execute arbitrary code and cause a denial of service via a crafted compressed script to the Sui node component.

CVE ID : CVE-2023-42374
Source : cve@mitre.org
CVSS Score : /

References :
https://beosin.com/resources/%22memory-bomb%22-vulnerability-causes-sui-node-to-crash?lang=en-US | source : cve@mitre.org
https://github.com/MystenLabs/sui/commit/42d4ad103a21d23fecd7c0271453da41604e71e9 | source : cve@mitre.org
https://medium.com/%40Beosin_com/memory-bomb-vulnerability-causes-sui-node-to-crash-7e8e3ef5057c | source : cve@mitre.org


Vulnerability ID : CVE-2023-49339

First published on : 13-02-2024 01:15:08
Last modified on : 13-02-2024 14:01:40

Description :
Ellucian Banner 9.17 allows Insecure Direct Object Reference (IDOR) via a modified bannerId to the /StudentSelfService/ssb/studentCard/retrieveData endpoint.

CVE ID : CVE-2023-49339
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/3zizme/CVE-2023-49339/ | source : cve@mitre.org
https://www.ellucian.com/solutions/ellucian-banner | source : cve@mitre.org


Vulnerability ID : CVE-2023-52059

First published on : 13-02-2024 01:15:08
Last modified on : 13-02-2024 14:01:40

Description :
A cross-site scripting (XSS) vulnerability in Gestsup v3.2.46 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description text field.

CVE ID : CVE-2023-52059
Source : cve@mitre.org
CVSS Score : /

References :
https://gestsup.fr/index.php?page=download&channel=beta&version=3.2.46&type=patch | source : cve@mitre.org
https://github.com/Tanguy-Boisset/CVE/blob/master/CVE-2023-52059/README.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-52060

First published on : 13-02-2024 01:15:08
Last modified on : 13-02-2024 14:01:40

Description :
A Cross-Site Request Forgery (CSRF) in Gestsup v3.2.46 allows attackers to arbitrarily edit user profile information via a crafted request.

CVE ID : CVE-2023-52060
Source : cve@mitre.org
CVSS Score : /

References :
https://gestsup.fr/index.php?page=download&channel=beta&version=3.2.46&type=patch | source : cve@mitre.org
https://github.com/Tanguy-Boisset/CVE/blob/master/CVE-2023-52060/README.md | source : cve@mitre.org


Vulnerability ID : CVE-2024-25407

First published on : 13-02-2024 01:15:08
Last modified on : 13-02-2024 14:01:40

Description :
SteVe v3.6.0 was discovered to use predictable transaction ID's when receiving a StartTransaction request. This vulnerability can allow attackers to cause a Denial of Service (DoS) by using the predicted transaction ID's to terminate other transactions.

CVE ID : CVE-2024-25407
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/steve-community/steve/issues/1296 | source : cve@mitre.org


Vulnerability ID : CVE-2022-48623

First published on : 13-02-2024 05:15:08
Last modified on : 13-02-2024 14:01:07

Description :
The Cpanel::JSON::XS package before 4.33 for Perl performs out-of-bounds accesses in a way that allows attackers to obtain sensitive information or cause a denial of service.

CVE ID : CVE-2022-48623
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/briandfoy/cpan-security-advisory/blob/9374f98bef51e1ae887f293234050551c079776f/cpansa/CPANSA-Cpanel-JSON-XS.yml#L25-L36 | source : cve@mitre.org
https://github.com/rurban/Cpanel-JSON-XS/commit/41f32396eee9395a40f9ed80145c37622560de9b | source : cve@mitre.org
https://github.com/rurban/Cpanel-JSON-XS/issues/208 | source : cve@mitre.org
https://metacpan.org/release/RURBAN/Cpanel-JSON-XS-4.33/changes | source : cve@mitre.org


Vulnerability ID : CVE-2023-52431

First published on : 13-02-2024 05:15:08
Last modified on : 13-02-2024 14:01:07

Description :
The Plack::Middleware::XSRFBlock package before 0.0.19 for Perl allows attackers to bypass a CSRF protection mechanism via an empty form value and an empty cookie (if signed cookies are disabled).

CVE ID : CVE-2023-52431
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/briandfoy/cpan-security-advisory/blob/9374f98bef51e1ae887f293234050551c079776f/cpansa/CPANSA-Plack-Middleware-XSRFBlock.yml#L2-L15 | source : cve@mitre.org
https://metacpan.org/release/DAKKAR/Plack-Middleware-XSRFBlock-0.0.19/source/Changes | source : cve@mitre.org


Vulnerability ID : CVE-2023-26562

First published on : 13-02-2024 16:15:08
Last modified on : 13-02-2024 18:23:02

Description :
In Zimbra Collaboration (ZCS) 8.8.15 and 9.0, a closed account (with 2FA and generated passwords) can send e-mail messages when configured for Imap/smtp.

CVE ID : CVE-2023-26562
Source : cve@mitre.org
CVSS Score : /

References :
https://wiki.zimbra.com/wiki/Security_Center | source : cve@mitre.org
https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy | source : cve@mitre.org
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | source : cve@mitre.org


Vulnerability ID : CVE-2023-45206

First published on : 13-02-2024 16:15:08
Last modified on : 13-02-2024 18:23:02

Description :
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 9.0, and 10.0. Through the help document endpoint in webmail, an attacker can inject JavaScript or HTML code that leads to cross-site scripting (XSS). (Adding an adequate message to avoid malicious code will mitigate this issue.)

CVE ID : CVE-2023-45206
Source : cve@mitre.org
CVSS Score : /

References :
https://wiki.zimbra.com/wiki/Security_Center | source : cve@mitre.org
https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy | source : cve@mitre.org
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | source : cve@mitre.org


Vulnerability ID : CVE-2023-45207

First published on : 13-02-2024 16:15:08
Last modified on : 13-02-2024 18:23:02

Description :
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 9.0, and 10.0. An attacker can send a PDF document through mail that contains malicious JavaScript. While previewing this file in webmail in the Chrome browser, the stored XSS payload is executed. (This has been mitigated by sanitising the JavaScript code present in a PDF document.)

CVE ID : CVE-2023-45207
Source : cve@mitre.org
CVSS Score : /

References :
https://wiki.zimbra.com/wiki/Security_Center | source : cve@mitre.org
https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy | source : cve@mitre.org
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | source : cve@mitre.org


Vulnerability ID : CVE-2023-48432

First published on : 13-02-2024 16:15:08
Last modified on : 13-02-2024 18:23:02

Description :
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 9.0, and 10.0. XSS, with resultant session stealing, can occur via JavaScript code in a link (for a webmail redirection endpoint) within en email message, e.g., if a victim clicks on that link within Zimbra webmail.

CVE ID : CVE-2023-48432
Source : cve@mitre.org
CVSS Score : /

References :
https://wiki.zimbra.com/wiki/Security_Center | source : cve@mitre.org
https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy | source : cve@mitre.org
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | source : cve@mitre.org


Vulnerability ID : CVE-2024-22923

First published on : 13-02-2024 16:15:08
Last modified on : 13-02-2024 18:23:02

Description :
SQL injection vulnerability in adv radius v.2.2.5 allows a local attacker to execute arbitrary code via a crafted script.

CVE ID : CVE-2024-22923
Source : cve@mitre.org
CVSS Score : /

References :
http://advradius.com/demo/ | source : cve@mitre.org
https://gist.github.com/whiteman007/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-50808

First published on : 13-02-2024 18:15:47
Last modified on : 13-02-2024 18:23:02

Description :
Zimbra Collaboration before Kepler 9.0.0 Patch 38 GA allows DOM-based JavaScript injection in the Modern UI.

CVE ID : CVE-2023-50808
Source : cve@mitre.org
CVSS Score : /

References :
https://wiki.zimbra.com/wiki/Security_Center | source : cve@mitre.org
https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P38 | source : cve@mitre.org
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | source : cve@mitre.org


Vulnerability ID : CVE-2024-24142

First published on : 13-02-2024 21:15:08
Last modified on : 13-02-2024 21:15:08

Description :
Sourcecodester School Task Manager 1.0 allows SQL Injection via the 'subject' parameter.

CVE ID : CVE-2024-24142
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/BurakSevben/School-Task-Manager-SQL-Injection-2 | source : cve@mitre.org


Source : wordfence.com

Vulnerability ID : CVE-2024-0707

First published on : 13-02-2024 14:15:46
Last modified on : 13-02-2024 14:15:46

Description :
Rejected reason: **REJECT** Not a valid vulnerability.

CVE ID : CVE-2024-0707
Source : security@wordfence.com
CVSS Score : /

References :


Source : honeywell.com

Vulnerability ID : CVE-2024-1309

First published on : 13-02-2024 14:15:46
Last modified on : 13-02-2024 15:16:05

Description :
Uncontrolled Resource Consumption vulnerability in Honeywell Niagara Framework on Windows, Linux, QNX allows Content Spoofing.This issue affects Niagara Framework: before Niagara AX 3.8.1, before Niagara 4.1.

CVE ID : CVE-2024-1309
Source : psirt@honeywell.com
CVSS Score : /

References :
https://process.honeywell.com | source : psirt@honeywell.com
https://www.honeywell.com/us/en/product-security | source : psirt@honeywell.com

Vulnerability : CWE-400


Source : amd.com

Vulnerability ID : CVE-2023-20570

First published on : 13-02-2024 18:15:47
Last modified on : 13-02-2024 18:23:02

Description :
Insufficient verification of data authenticity in the configuration state machine may allow a local attacker to potentially load arbitrary bitstreams.

CVE ID : CVE-2023-20570
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-8002.html | source : psirt@amd.com


Vulnerability ID : CVE-2021-46757

First published on : 13-02-2024 20:15:50
Last modified on : 13-02-2024 20:15:50

Description :
Insufficient checking of memory buffer in ASP Secure OS may allow an attacker with a malicious TA to read/write to the ASP Secure OS kernel virtual address space potentially leading to privilege escalation.

CVE ID : CVE-2021-46757
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | source : psirt@amd.com


Vulnerability ID : CVE-2023-20579

First published on : 13-02-2024 20:15:52
Last modified on : 13-02-2024 20:15:52

Description :
Improper Access Control in the AMD SPI protection feature may allow a user with Ring0 (kernel mode) privileged access to bypass protections potentially resulting in loss of integrity and availability.

CVE ID : CVE-2023-20579
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7009 | source : psirt@amd.com


Vulnerability ID : CVE-2023-20587

First published on : 13-02-2024 20:15:52
Last modified on : 13-02-2024 20:15:52

Description :
Improper Access Control in System Management Mode (SMM) may allow an attacker access to the SPI flash potentially leading to arbitrary code execution.

CVE ID : CVE-2023-20587
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7009 | source : psirt@amd.com


Vulnerability ID : CVE-2023-31346

First published on : 13-02-2024 20:15:52
Last modified on : 13-02-2024 20:15:52

Description :
Failure to initialize memory in SEV Firmware may allow a privileged attacker to access stale data from other guests.

CVE ID : CVE-2023-31346
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007 | source : psirt@amd.com


Vulnerability ID : CVE-2023-31347

First published on : 13-02-2024 20:15:52
Last modified on : 13-02-2024 20:15:52

Description :
Due to a code bug in Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a guest to observe an incorrect TSC when Secure TSC is enabled potentially resulting in a loss of guest integrity.

CVE ID : CVE-2023-31347
Source : psirt@amd.com
CVSS Score : /

References :
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007 | source : psirt@amd.com


This website uses the NVD API, but is not approved or certified by it.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! Youโ€™ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.