βΌ CVE-2023-20946 βΌ
π Read
via "National Vulnerability Database".
In onStart of BluetoothSwitchPreferenceController.java, there is a possible permission bypass due to a confused deputy. This could lead to remote escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-244423101π Read
via "National Vulnerability Database".
β€1
βΌ CVE-2023-25432 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Online Reviewer Management System v1.0. There is a SQL injection that can directly issue instructions to the background database system via reviewer_0/admins/assessments/course/course-update.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20937 βΌ
π Read
via "National Vulnerability Database".
In several functions of the Android Linux kernel, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-257443051References: Upstream kernelπ Read
via "National Vulnerability Database".
βΌ CVE-2022-20551 βΌ
π Read
via "National Vulnerability Database".
In createTrack of AudioFlinger.cpp, there is a possible way to record audio without a privacy indicator due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-243376549π Read
via "National Vulnerability Database".
βΌ CVE-2022-41725 βΌ
π Read
via "National Vulnerability Database".
A denial of service is possible from excessive resource consumption in net/http and mime/multipart. Multipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory and disk files. This also affects form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. ReadForm takes a maxMemory parameter, and is documented as storing "up to maxMemory bytes +10MB (reserved for non-file parts) in memory". File parts which cannot be stored in memory are stored on disk in temporary files. The unconfigurable 10MB reserved for non-file parts is excessively large and can potentially open a denial of service vector on its own. However, ReadForm did not properly account for all memory consumed by a parsed form, such as map entry overhead, part names, and MIME headers, permitting a maliciously crafted form to consume well over 10MB. In addition, ReadForm contained no limit on the number of disk files created, permitting a relatively small request body to create a large number of disk temporary files. With fix, ReadForm now properly accounts for various forms of memory overhead, and should now stay within its documented limit of 10MB + maxMemory bytes of memory consumption. Users should still be aware that this limit is high and may still be hazardous. In addition, ReadForm now creates at most one on-disk temporary file, combining multiple form parts into a single temporary file. The mime/multipart.File interface type's documentation states, "If stored on disk, the File's underlying concrete type will be an *os.File.". This is no longer the case when a form contains more than one file part, due to this coalescing of parts into a single file. The previous behavior of using distinct files for each form part may be reenabled with the environment variable GODEBUG=multipartfiles=distinct. Users should be aware that multipart.ReadForm and the http.Request methods that call it do not limit the amount of disk consumed by temporary files. Callers can limit the size of form data with http.MaxBytesReader.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27320 βΌ
π Read
via "National Vulnerability Database".
Sudo before 1.9.13p2 has a double free in the per-command chroot feature.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27293 βΌ
π Read
via "National Vulnerability Database".
Improper neutralization of input during web page generation allows an unauthenticated attacker to submit malicious Javascript as the answer to a questionnaire which would then be executed when an authenticated user reviews the candidate's submission. This could be used to steal other usersΓ’β¬β’ cookies and force users to make actions without their knowledge.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20943 βΌ
π Read
via "National Vulnerability Database".
In clearApplicationUserData of ActivityManagerService.java, there is a possible way to remove system files due to a path traversal error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-240267890π Read
via "National Vulnerability Database".
βΌ CVE-2023-20939 βΌ
π Read
via "National Vulnerability Database".
In multiple functions of looper_backed_event_loop.cpp, there is a possible way to corrupt memory due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-243362981π Read
via "National Vulnerability Database".
βΌ CVE-2023-20940 βΌ
π Read
via "National Vulnerability Database".
In the Android operating system, there is a possible way to replace a boot partition due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-256237041π Read
via "National Vulnerability Database".
βΌ CVE-2023-25540 βΌ
π Read
via "National Vulnerability Database".
Dell PowerScale OneFS 9.4.0.x contains an incorrect default permissions vulnerability. A local malicious user could potentially exploit this vulnerability to overwrite arbitrary files causing denial of service.π Read
via "National Vulnerability Database".
βΌ CVE-2023-25431 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Online Reviewer Management System v1.0. There is a XSS vulnerability via reviewer_0/admins/assessments/course/course-update.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27294 βΌ
π Read
via "National Vulnerability Database".
Improper neutralization of input during web page generation allows an authenticated attacker with access to a restricted account to submit malicious Javascript as the description for a calendar event, which would then be executed in other users' browsers if they browse to that event. This could result in stealing session tokens from users with higher permission levels or forcing users to make actions without their knowledge.π Read
via "National Vulnerability Database".
βΌ CVE-2023-23689 βΌ
π Read
via "National Vulnerability Database".
Dell PowerScale nodes A200, A2000, H400, H500, H600, H5600, F800, F810 integrated hardware management software contains an uncontrolled resource consumption vulnerability. This may allow an unauthenticated network host to impair built-in hardware management functionality and trigger OneFS data protection mechanism causing a denial of service.π Read
via "National Vulnerability Database".
π΄ WannaCry Hero & Kronos Malware Author Named Cybrary Fellow π΄
π Read
via "Dark Reading".
Marcus Hutchins, who set up a "kill switch" that stopped WannaCry's spread, later pled guilty to creating the infamous Kronos banking malware.π Read
via "Dark Reading".
Dark Reading
WannaCry Hero & Kronos Malware Author Named Cybrary Fellow
Marcus Hutchins, who set up a "kill switch" that stopped WannaCry's spread, later pled guilty to creating the infamous Kronos banking malware.
π΄ US Marshals Ransomware Hit Is 'Major' Incident π΄
π Read
via "Dark Reading".
Unknown attackers made off with a raft of PII, the Justice Department says β but witnesses in the protection program are still safe.π Read
via "Dark Reading".
Dark Reading
US Marshals Ransomware Hit Is 'Major' Incident
Unknown attackers made off with a raft of PII, the Justice Department says β but witnesses in the protection program are still safe.
βΌ CVE-2019-14592 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.π Read
via "National Vulnerability Database".
βΌ CVE-2019-14571 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.π Read
via "National Vulnerability Database".
βΌ CVE-2019-14617 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.π Read
via "National Vulnerability Database".
βΌ CVE-2019-14583 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.π Read
via "National Vulnerability Database".
βΌ CVE-2019-14616 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.π Read
via "National Vulnerability Database".