‼ CVE-2023-21768 ‼
📖 Read
via "National Vulnerability Database".
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21744 ‼
📖 Read
via "National Vulnerability Database".
Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21742.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21552 ‼
📖 Read
via "National Vulnerability Database".
Windows GDI Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2023-21532.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4337 ‼
📖 Read
via "National Vulnerability Database".
An out-of-bounds read in Organization Specific TLV was found in various versions of OpenvSwitch.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21790 ‼
📖 Read
via "National Vulnerability Database".
3D Builder Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21780, CVE-2023-21781, CVE-2023-21782, CVE-2023-21783, CVE-2023-21784, CVE-2023-21785, CVE-2023-21786, CVE-2023-21787, CVE-2023-21788, CVE-2023-21789, CVE-2023-21791, CVE-2023-21792, CVE-2023-21793.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21535 ‼
📖 Read
via "National Vulnerability Database".
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21548.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21772 ‼
📖 Read
via "National Vulnerability Database".
Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2023-21675, CVE-2023-21747, CVE-2023-21748, CVE-2023-21749, CVE-2023-21750, CVE-2023-21754, CVE-2023-21755, CVE-2023-21773, CVE-2023-21774.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-38492 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in EasyVista 2020.2.125.3 and 2022.1.109.0.03 before 2022.1.110.1.02. One parameter allows SQL injection.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21786 ‼
📖 Read
via "National Vulnerability Database".
3D Builder Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21780, CVE-2023-21781, CVE-2023-21782, CVE-2023-21783, CVE-2023-21784, CVE-2023-21785, CVE-2023-21787, CVE-2023-21788, CVE-2023-21789, CVE-2023-21790, CVE-2023-21791, CVE-2023-21792, CVE-2023-21793.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21780 ‼
📖 Read
via "National Vulnerability Database".
3D Builder Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21781, CVE-2023-21782, CVE-2023-21783, CVE-2023-21784, CVE-2023-21785, CVE-2023-21786, CVE-2023-21787, CVE-2023-21788, CVE-2023-21789, CVE-2023-21790, CVE-2023-21791, CVE-2023-21792, CVE-2023-21793.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21789 ‼
📖 Read
via "National Vulnerability Database".
3D Builder Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21780, CVE-2023-21781, CVE-2023-21782, CVE-2023-21783, CVE-2023-21784, CVE-2023-21785, CVE-2023-21786, CVE-2023-21787, CVE-2023-21788, CVE-2023-21790, CVE-2023-21791, CVE-2023-21792, CVE-2023-21793.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21737 ‼
📖 Read
via "National Vulnerability Database".
Microsoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21736, CVE-2023-21738.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21787 ‼
📖 Read
via "National Vulnerability Database".
3D Builder Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21780, CVE-2023-21781, CVE-2023-21782, CVE-2023-21783, CVE-2023-21784, CVE-2023-21785, CVE-2023-21786, CVE-2023-21788, CVE-2023-21789, CVE-2023-21790, CVE-2023-21791, CVE-2023-21792, CVE-2023-21793.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21759 ‼
📖 Read
via "National Vulnerability Database".
Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21682 ‼
📖 Read
via "National Vulnerability Database".
Windows Point-to-Point Protocol (PPP) Information Disclosure Vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21742 ‼
📖 Read
via "National Vulnerability Database".
Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21744.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22469 ‼
📖 Read
via "National Vulnerability Database".
Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. When getting the reference preview for Deck cards the user has no access to, unauthorized user could eventually get the cached data of a user that has access. There are currently no known workarounds. It is recommended that the Nextcloud app Deck is upgraded to 1.8.2.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21678 ‼
📖 Read
via "National Vulnerability Database".
Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2023-21760, CVE-2023-21765.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21743 ‼
📖 Read
via "National Vulnerability Database".
Microsoft SharePoint Server Security Feature Bypass Vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21543 ‼
📖 Read
via "National Vulnerability Database".
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21546, CVE-2023-21555, CVE-2023-21556, CVE-2023-21679.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-46163 ‼
📖 Read
via "National Vulnerability Database".
Travel support program is a rails app to support the travel support program of openSUSE (TSP). Sensitive user data (bank account details, password Hash) can be extracted via Ransack query injection. Every deployment of travel-support-program below the patched version is affected. The travel-support-program uses the Ransack library to implement search functionality. In its default configuration, Ransack will allow for query conditions based on properties of associated database objects [1]. The `*_start`, `*_end` or `*_cont` search matchers [2] can then be abused to exfiltrate sensitive string values of associated database objects via character-by-character brute-force (A match is indicated by the returned JSON not being empty). A single bank account number can be extracted with <200 requests, a password hash can be extracted with ~1200 requests, all within a few minutes. The problem has been patched in commit d22916275c51500b4004933ff1b0a69bc807b2b7. In order to work around this issue, you can also cherry pick that patch, however it will not work without the Rails 5.0 migration that was done in #150, which in turn had quite a few pull requests it depended on.📖 Read
via "National Vulnerability Database".