βΌ CVE-2023-26068 βΌ
π Read
via "National Vulnerability Database".
Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 2 of 4).π Read
via "National Vulnerability Database".
βΌ CVE-2023-26064 βΌ
π Read
via "National Vulnerability Database".
Certain Lexmark devices through 2023-02-19 have an Out-of-bounds Write.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27076 βΌ
π Read
via "National Vulnerability Database".
Command injection vulnerability found in Tenda G103 v.1.0.0.5 allows attacker to execute arbitrary code via a the language parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26495 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Open Design Alliance Drawings SDK before 2024.1. A crafted DWG file can force the SDK to reuse an object that has been freed. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28093 βΌ
π Read
via "National Vulnerability Database".
A user with a compromised configuration can start an unsigned binary as a service.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26773 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting vulnerability found in Sales Tracker Management System v.1.0 allows a remote attacker to gain privileges via the product list function in the Master.php file.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26065 βΌ
π Read
via "National Vulnerability Database".
Certain Lexmark devices through 2023-02-19 have an Integer Overflow.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26063 βΌ
π Read
via "National Vulnerability Database".
Certain Lexmark devices through 2023-02-19 access a Resource By Using an Incompatible Type.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26069 βΌ
π Read
via "National Vulnerability Database".
Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 3 of 4).π Read
via "National Vulnerability Database".
π1
βΌ CVE-2023-29192 βΌ
π Read
via "National Vulnerability Database".
SilverwareGames.io versions before 1.2.19 allow users with access to the game upload panel to edit download links for games uploaded by other developers. This has been fixed in version 1.2.19.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1668 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24721 βΌ
π Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in LiveAction LiveSP v21.1.2 allows attackers to execute arbitrary web scripts or HTML.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26467 βΌ
π Read
via "National Vulnerability Database".
A man in the middle can redirect traffic to a malicious server in a compromised configuration.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1916 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.π Read
via "National Vulnerability Database".
π΄ Renewed Focus on Incident Response Brings New Competitors and Partnerships π΄
π Read
via "Dark Reading".
Microsoft and others are doubling down on incident response, adding services and integrating programs to make security analysts and IR engagements more efficient.π Read
via "Dark Reading".
Dark Reading
Renewed Focus on Incident Response Brings New Competitors and Partnerships
Microsoft and others are doubling down on incident response, adding services and integrating programs to make security analysts and incident response engagements more efficient.
βΌ CVE-2023-1903 βΌ
π Read
via "National Vulnerability Database".
SAP HCM Fiori App My Forms (Fiori 2.0) - version 605, does not perform necessary authorization checks for an authenticated user exposing the restricted header data.π Read
via "National Vulnerability Database".
βΌ CVE-2023-29112 βΌ
π Read
via "National Vulnerability Database".
The SAP Application Interface (Message Monitoring) - versions 600, 700, allows an authorized attacker to input links or headings with custom CSS classes into a comment. The comment will render links and custom CSS classes as HTML objects. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.π Read
via "National Vulnerability Database".
βΌ CVE-2023-29108 βΌ
π Read
via "National Vulnerability Database".
The IP filter in ABAP Platform and SAP Web Dispatcher - versions WEBDISP 7.85, 7.89, KERNEL 7.85, 7.89, 7.91, may be vulnerable by erroneous IP netmask handling. This may enable access to backend applications from unwanted sources.π Read
via "National Vulnerability Database".
βΌ CVE-2023-29111 βΌ
π Read
via "National Vulnerability Database".
The SAP AIF (ODATA service) - versions 755, 756, discloses more detailed information than is required. An authorized attacker can use the collected information possibly to exploit the component. As a result, an attacker can cause a low impact on the confidentiality of the application.π Read
via "National Vulnerability Database".
βΌ CVE-2023-29186 βΌ
π Read
via "National Vulnerability Database".
In SAP NetWeaver (BI CONT ADDON) - versions 707, 737, 747, 757, an attacker can exploit a directory traversal flaw in a report toΓ upload and overwrite files on the SAP server. Data cannot be read but if a remote attacker has sufficient (administrative) privileges then potentially critical OS files can be overwritten making the system unavailable.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28765 βΌ
π Read
via "National Vulnerability Database".
An attacker with basic privileges in SAP BusinessObjects Business Intelligence Platform (Promotion Management) - versions 420, 430, can get access to lcmbiar file and further decrypt the file. After this attacker can gain access to BI userΓ’β¬β’s passwords and depending on the privileges of the BI user, the attacker can perform operations that can completely compromise the application.π Read
via "National Vulnerability Database".