βΌ CVE-2023-20021 βΌ
π Read
via "National Vulnerability Database".
Multiple vulnerabilities in specific Cisco Identity Services Engine (ISE) CLI commands could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit these vulnerabilities, an attacker must have valid Administrator privileges on the affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.π Read
via "National Vulnerability Database".
β US government warning! What if anyone could open your garage door? β
π Read
via "Naked Security".
Grab a message/Play it back/You've just performed/A big phat hack...π Read
via "Naked Security".
Naked Security
Hack and enter! The βsecureβ garage doors that anyone can open from anywhere β what you need to know
Grab a message/Play it back/Youβve just performed/A big phat hackβ¦
βΌ CVE-2023-1882 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.12.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1886 βΌ
π Read
via "National Vulnerability Database".
Authentication Bypass by Capture-replay in GitHub repository thorsten/phpmyfaq prior to 3.1.12.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1878 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1412 βΌ
π Read
via "National Vulnerability Database".
An unprivileged (non-admin) user can exploit an Improper Access Control vulnerability in the Cloudflare WARP Client for Windows (<= 2022.12.582.0) to perform privileged operations with SYSTEM context by working with a combination of opportunistic locks (oplock) and symbolic links (which can both be created by an unprivileged user). After installing the Cloudflare WARP Client (admin privileges required), an MSI-Installer is placed under C:\Windows\Installer. The vulnerability lies in the repair function of this MSI. ImpactAn unprivileged (non-admin) user can exploit this vulnerability to perform privileged operations with SYSTEM context, including deleting arbitrary files and reading arbitrary file content. This can lead to a variety of attacks, including the manipulation of system files and privilege escalation. PatchesA new installer with a fix that addresses this vulnerability was released in version 2023.3.381.0. While the WARP Client itself is not vulnerable (only the installer), users are encouraged to upgrade to the latest version and delete any older installers present in their systems.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1884 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.12.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20030 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to access sensitive information, conduct a server-side request forgery (SSRF) attack through an affected device, or negatively impact the responsiveness of the web-based management interface itself. This vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by uploading a crafted XML file that contains references to external entities. A successful exploit could allow the attacker to retrieve files from the local system, resulting in the disclosure of confidential information. A successful exploit could also cause the web application to perform arbitrary HTTP requests on behalf of the attacker or consume memory resources to reduce the availability of the web-based management interface. To successfully exploit this vulnerability, an attacker would need valid Super Admin or Policy Admin credentials.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1877 βΌ
π Read
via "National Vulnerability Database".
Command Injection in GitHub repository microweber/microweber prior to 1.3.3.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20023 βΌ
π Read
via "National Vulnerability Database".
Multiple vulnerabilities in specific Cisco Identity Services Engine (ISE) CLI commands could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit these vulnerabilities, an attacker must have valid Administrator privileges on the affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28633 βΌ
π Read
via "National Vulnerability Database".
GLPI is a free asset and IT management software package. Starting in version 0.84 and prior to versions 9.5.13 and 10.0.7, usage of RSS feeds is subject to server-side request forgery (SSRF). In case the remote address is not a valid RSS feed, an RSS autodiscovery feature is triggered. This feature does not check safety or URLs. Versions 9.5.13 and 10.0.7 contain a patch for this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43664 βΌ
π Read
via "National Vulnerability Database".
A use-after-free vulnerability exists within the way Ichitaro Word Processor 2022, version 1.0.1.57600, processes protected documents. A specially crafted document can trigger reuse of freed memory, which can lead to further memory corruption and potentially result in arbitrary code execution. An attacker can provide a malicious document to trigger this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1887 βΌ
π Read
via "National Vulnerability Database".
Business Logic Errors in GitHub repository thorsten/phpmyfaq prior to 3.1.12.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20068 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco Prime Infrastructure Software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of the web-based management interface on an affected device to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1788 βΌ
π Read
via "National Vulnerability Database".
Insufficient Session Expiration in GitHub repository firefly-iii/firefly-iii prior to 6.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20073 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device. This vulnerability is due to insufficient authorization enforcement mechanisms in the context of file uploads. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to upload arbitrary files to the affected device.π Read
via "National Vulnerability Database".
βΌ CVE-2023-29389 βΌ
π Read
via "National Vulnerability Database".
Toyota RAV4 2021 vehicles automatically trust messages from other ECUs on a CAN bus, which allows physically proximate attackers to drive a vehicle by accessing the control CAN bus after pulling the bumper away and reaching the headlight connector, and then sending forged "Key is validated" messages via CAN Injection, as exploited in the wild in (for example) July 2022.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1880 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.12.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1879 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20022 βΌ
π Read
via "National Vulnerability Database".
Multiple vulnerabilities in specific Cisco Identity Services Engine (ISE) CLI commands could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit these vulnerabilities, an attacker must have valid Administrator privileges on the affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1883 βΌ
π Read
via "National Vulnerability Database".
Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.12.π Read
via "National Vulnerability Database".