βΌ CVE-2023-25001 βΌ
π Read
via "National Vulnerability Database".
A maliciously crafted SKP file in Autodesk Navisworks 2023 and 2022 be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36464 βΌ
π Read
via "National Vulnerability Database".
pypdf is an open source, pure-python PDF library. In affected versions an attacker may craft a PDF which leads to an infinite loop if `__parse_content_stream` is executed. That is, for example, the case if the user extracted text from such a PDF. This issue was introduced in pull request #969 and resolved in pull request #1828. Users are advised to upgrade. Users unable to upgrade may modify the line `while peek not in (b"\r", b"\n")` in `pypdf/generic/_data_structures.py` to `while peek not in (b"\r", b"\n", b"")`.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3327 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-35823. Reason: This candidate is a reservation duplicate of CVE-2023-35823. Notes: All CVE users should reference CVE-2023-35823 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1844 βΌ
π Read
via "National Vulnerability Database".
The Subscribe2 plugin for WordPress is vulnerable to unauthorized access to email functionality due to a missing capability check when sending test emails in versions up to, and including, 10.40. This makes it possible for author-level attackers to send emails with arbitrary content and attachments to site users.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3407 βΌ
π Read
via "National Vulnerability Database".
The Subscribe2 plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 10.40. This is due to missing or incorrect nonce validation when sending test emails. This makes it possible for unauthenticated attackers to send test emails with custom content to users on sites running a vulnerable version of this plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3331 βΌ
π Read
via "National Vulnerability Database".
Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2200HP all versions allowsΓ a attackerΓ toΓ delete specific files in the product.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3333 βΌ
π Read
via "National Vulnerability Database".
Improper Neutralization of Special Elements used in an OS Command vulnerability in NEC Corporation Aterm WG2200HP all versions allowsΓ a attackerΓ toΓ execute an arbitrary OS command with the root privilege, after obtaining a high privilege exploiting CVE-2023-3330 and CVE-2023-3331 vulnerabilities.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3330 βΌ
π Read
via "National Vulnerability Database".
Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2200HP all versions allowsΓ a attackerΓ toΓ obtain specific files in the product.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3332 βΌ
π Read
via "National Vulnerability Database".
Improper Neutralization of Input During Web Page Generation vulnerability in NEC Corporation Aterm WG2200HP all versions allowsΓ a attackerΓ toΓ execute an arbitrary script, after obtaining a high privilege exploiting CVE-2023-3330 and CVE-2023-3331 vulnerabilities.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3427 βΌ
π Read
via "National Vulnerability Database".
The Salon Booking System plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 8.4.6. This is due to missing or incorrect nonce validation on the 'save_customer' function. This makes it possible for unauthenticated attackers to change the admin role to customer or change the user meta to arbitrary values via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.π Read
via "National Vulnerability Database".
βΌ CVE-2022-48505 βΌ
π Read
via "National Vulnerability Database".
This issue was addressed with improved data protection. This issue is fixed in macOS Ventura 13. An app may be able to modify protected parts of the file systemπ Read
via "National Vulnerability Database".
βΌ CVE-2023-32623 βΌ
π Read
via "National Vulnerability Database".
Directory traversal vulnerability in Snow Monkey Forms versions v5.1.0 and earlier allows a remote unauthenticated attacker to delete arbitrary files on the server.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26134 βΌ
π Read
via "National Vulnerability Database".
Versions of the package git-commit-info before 2.0.2 are vulnerable to Command Injection such that the package-exported method gitCommitInfo () fails to sanitize its parameter commit, which later flows into a sensitive command execution API. As a result, attackers may inject malicious commands once they control the hash content.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3034 βΌ
π Read
via "National Vulnerability Database".
Reflected XSS affects the Γ’β¬ΛmodeΓ’β¬β’ parameter in the /admin functionality of the web application in versions <=2.0.44π Read
via "National Vulnerability Database".
βΌ CVE-2023-1295 βΌ
π Read
via "National Vulnerability Database".
A time-of-check to time-of-use issue exists in io_uring subsystem's IORING_OP_CLOSE operation in the Linux kernel's versions 5.6 - 5.11 (inclusive), which allows a local user to elevate their privileges to root. Introduced in b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb, patched in 9eac1904d3364254d622bf2c771c4f85cd435fc2, backported to stable in 788d0824269bef539fe31a785b1517882eafed93.π Read
via "National Vulnerability Database".
π1
π΄ 3 Strategies for Bringing Rigor to Software Security π΄
π Read
via "Dark Reading".
With the National Cybersecurity Strategy planning to add real teeth into enforcement actions, software vendors have extra incentive to reduce applications' security debt. π Read
via "Dark Reading".
Dark Reading
3 Strategies for Bringing Rigor to Software Security
With the National Cybersecurity Strategy planning to add real teeth into enforcement actions, software vendors have extra incentive to reduce applications' security debt.
βΌ CVE-2023-34934 βΌ
π Read
via "National Vulnerability Database".
A stack overflow in the Edit_BasicSSID_5G function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.π Read
via "National Vulnerability Database".
βΌ CVE-2023-34928 βΌ
π Read
via "National Vulnerability Database".
A stack overflow in the Edit_BasicSSID function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20136 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the OpenAPI of Cisco Secure Workload could allow an authenticated, remote attacker with the privileges of a read-only user to execute operations that should require Administrator privileges. The attacker would need valid user credentials. This vulnerability is due to improper role-based access control (RBAC) of certain OpenAPI operations. An attacker could exploit this vulnerability by issuing a crafted OpenAPI function call with valid credentials. A successful exploit could allow the attacker to execute OpenAPI operations that are reserved for the Administrator user, including the creation and deletion of user labels.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20178 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established. This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. A successful exploit could allow the attacker to execute code with SYSTEM privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2023-34930 βΌ
π Read
via "National Vulnerability Database".
A stack overflow in the EditMacList function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.π Read
via "National Vulnerability Database".