βΌ CVE-2023-36462 βΌ
π Read
via "National Vulnerability Database".
Mastodon is a free, open-source social network server based on ActivityPub. Starting in version 2.6.0 and prior to versions 3.5.9, 4.0.5, and 4.1.3, an attacker can craft a verified profile link using specific formatting to conceal arbitrary parts of the link, enabling it to appear to link to a different URL altogether. The link is visually misleading, but clicking on it will reveal the actual link. This can still be used for phishing, though, similar to IDN homograph attacks. Versions 3.5.9, 4.0.5, and 4.1.3 contain a patch for this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2023-29824 βΌ
π Read
via "National Vulnerability Database".
A use-after-free issue was discovered in Py_FindObjects() function in SciPy versions prior to 1.8.0.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20899 βΌ
π Read
via "National Vulnerability Database".
VMware SD-WAN (Edge) contains a bypass authentication vulnerability. An unauthenticated attacker can download the Diagnostic bundle of the application under VMware SD-WAN Management.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36859 βΌ
π Read
via "National Vulnerability Database".
PiiGAB M-Bus SoftwarePack 900Sdoes not correctly sanitize user input, which could allow an attacker to inject arbitrary commands.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36829 βΌ
π Read
via "National Vulnerability Database".
Sentry is an error tracking and performance monitoring platform. Starting in version 23.6.0 and prior to version 23.6.2, the Sentry API incorrectly returns the `access-control-allow-credentials: true` HTTP header if the `Origin` request header ends with the `system.base-hostname` option of Sentry installation. This only affects installations that have `system.base-hostname` option explicitly set, as it is empty by default. Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks. The patch has been released in Sentry 23.6.2.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31277 βΌ
π Read
via "National Vulnerability Database".
PiiGAB M-Bus transmits credentials in plaintext format.π Read
via "National Vulnerability Database".
βΌ CVE-2023-33868 βΌ
π Read
via "National Vulnerability Database".
The number of login attempts is not limited. This could allow an attacker to perform a brute force on HTTP basic authentication.π Read
via "National Vulnerability Database".
β€1
βΌ CVE-2023-35987 βΌ
π Read
via "National Vulnerability Database".
PiiGAB M-Bus contains hard-coded credentials which it uses for authentication.π Read
via "National Vulnerability Database".
βΌ CVE-2023-34433 βΌ
π Read
via "National Vulnerability Database".
PiiGAB M-Bus stores passwords using a weak hash algorithm.π Read
via "National Vulnerability Database".
βΌ CVE-2023-32652 βΌ
π Read
via "National Vulnerability Database".
PiiGAB M-BusΓ does not validate identification strings before processing, which could make it vulnerable to cross-site scripting attacks.π Read
via "National Vulnerability Database".
βΌ CVE-2023-37192 βΌ
π Read
via "National Vulnerability Database".
Memory management and protection issues in Bitcoin Core v22 allows attackers to modify the stored sending address within the app's memory, potentially allowing them to redirect Bitcoin transactions to wallets of their own choosing.π Read
via "National Vulnerability Database".
βΌ CVE-2023-34995 βΌ
π Read
via "National Vulnerability Database".
There are no requirements for setting a complex passwordΓ for PiiGAB M-Bus, which could contribute to a successful brute force attack if the password is inline with recommended password guidelines.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3532 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in GitHub repository outline/outline prior to 0.70.1.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35120 βΌ
π Read
via "National Vulnerability Database".
PiiGAB M-Bus is vulnerable to cross-site request forgery. An attacker who wants to execute a certain command could send a phishing mail to the owner of the device and hope that the owner clicks on the link. If the owner of the device has a cookie stored that allows the owner to be logged in, then the device could execute the GET or POST link request.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35890 βΌ
π Read
via "National Vulnerability Database".
IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security, caused by the improper encoding in a local configuration file. IBM X-Force ID: 258637.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35765 βΌ
π Read
via "National Vulnerability Database".
PiiGAB M-Bus stores credentials in a plaintext file, which could allow a low-level user to gain admin credentials.π Read
via "National Vulnerability Database".
π’ Why are cyber criminals targeting the UK? π’
π Read
via "ITPro".
Attacks will continue until threat actors are hit in their wallets π Read
via "ITPro".
ITPro
Why are cyber criminals targeting the UK?
Attacks will continue until threat actors are hit in their wallets
βΌ CVE-2023-32183 βΌ
π Read
via "National Vulnerability Database".
Incorrect Default Permissions vulnerability in the openSUSE Tumbleweed hawk2 package allows users with access to the hacluster to escalate to rootThis issue affects openSUSE Tumbleweed.π Read
via "National Vulnerability Database".
βΌ CVE-2023-33008 βΌ
π Read
via "National Vulnerability Database".
Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache Johnzon.A malicious attacker can craft up some JSON input that uses large numbers (numbers such asΓ 1e20000000) that Apache Johnzon will deserialize into BigDecimal and maybe use numbers too large which may result in a slow conversion (Denial of service risk). Apache Johnzon 1.2.21 mitigates this by setting a scale limit of 1000 (by default) to the BigDecimal. This issue affects Apache Johnzon: through 1.2.20.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3536 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in SimplePHPscripts Funeral Script PHP 3.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-233288.π Read
via "National Vulnerability Database".
βΌ CVE-2023-37308 βΌ
π Read
via "National Vulnerability Database".
Zoho ManageEngine ADAudit Plus before 7100 allows XSS via the username field.π Read
via "National Vulnerability Database".