‼ CVE-2023-40015 ‼
📖 Read
via "National Vulnerability Database".
Vyper is a Pythonic Smart Contract Language. For the following (probably non-exhaustive) list of expressions, the compiler evaluates the arguments from right to left instead of left to right. `unsafe_add, unsafe_sub, unsafe_mul, unsafe_div, pow_mod256, |, &, ^ (bitwise operators), bitwise_or (deprecated), bitwise_and (deprecated), bitwise_xor (deprecated), raw_call, <, >, <=, >=, ==, !=, in, not in (when lhs and rhs are enums)`. This behaviour becomes a problem when the evaluation of one of the arguments produces side effects that other arguments depend on. The following expressions can produce side-effect: state modifying external call , state modifying internal call, `raw_call`, `pop()` when used on a Dynamic Array stored in the storage, `create_minimal_proxy_to`, `create_copy_of`, `create_from_blueprint`. This issue has not yet been patched. Users are advised to make sure that the arguments of the expression do not produce side effects or, if one does, that no other argument is dependent on those side effects.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41055 ‼
📖 Read
via "National Vulnerability Database".
LibreY is a fork of LibreX, a framework-less and javascript-free privacy respecting meta search engine. LibreY is subject to a Server-Side Request Forgery (SSRF) vulnerability in the `engines/google/text.php` and `engines/duckduckgo/text.php` files in versions before commit be59098abd119cda70b15bf3faac596dfd39a744. This vulnerability allows remote attackers to request the server to send HTTP GET requests to arbitrary targets and conduct Denial-of-Service (DoS) attacks via the `wikipedia_language` cookie. Remote attackers can request the server to download large files to reduce the performance of the server or even deny access from legitimate users. This issue has been patched in https://github.com/Ahwxorg/LibreY/pull/9. LibreY hosters are advised to use the latest commit. There are no known workarounds for this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41054 ‼
📖 Read
via "National Vulnerability Database".
LibreY is a fork of LibreX, a framework-less and javascript-free privacy respecting meta search engine. LibreY is subject to a Server-Side Request Forgery (SSRF) vulnerability in the `image_proxy.php` file of LibreY before commit 8f9b9803f231e2954e5b49987a532d28fe50a627. This vulnerability allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network or conduct Denial-of-Service (DoS) attacks via the `url` parameter. Remote attackers can use the server as a proxy to send HTTP GET requests and retrieve information in the internal network. Remote attackers can also request the server to download large files or chain requests among multiple instances to reduce the performance of the server or even deny access from legitimate users. This issue has been addressed in https://github.com/Ahwxorg/LibreY/pull/31. LibreY hosters are advised to use the latest commit. There are no known workarounds for this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35892 ‼
📖 Read
via "National Vulnerability Database".
IBM Financial Transaction Manager for SWIFT Services 3.2.4 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 258786.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-40936 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-4636 ‼
📖 Read
via "National Vulnerability Database".
The WordPress File Sharing Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 2.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-43903 ‼
📖 Read
via "National Vulnerability Database".
IBM Security Guardium 10.6, 11.3, and 11.4 could allow an authenticated user to cause a denial of service due to due to improper input validation. IBM X-Force ID: 240894.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-36308 ‼
📖 Read
via "National Vulnerability Database".
** DISPUTED ** disintegration Imaging 1.6.2 allows attackers to cause a panic (because of an integer index out of range during a Grayscale call) via a crafted TIFF file to the scan function of scanner.go. NOTE: it is unclear whether there are common use cases in which this panic could have any security consequence📖 Read
via "National Vulnerability Database".
‼ CVE-2023-29261 ‼
📖 Read
via "National Vulnerability Database".
IBM Sterling Secure Proxy 6.0.3 and 6.1.0 could allow a local user with specific information about the system to obtain privileged information due to inadequate memory clearing during operations. IBM X-Force ID: 252139.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22870 ‼
📖 Read
via "National Vulnerability Database".
IBM Aspera Faspex 5.0.5 transmits sensitive information in cleartext which could be obtained by an attacker using man in the middle techniques. IBM X-Force ID: 244121.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-32338 ‼
📖 Read
via "National Vulnerability Database".
IBM Sterling Secure Proxy and IBM Sterling External Authentication Server 6.0.3 and 6.1.0 stores user credentials in plain clear text which can be read by a local user with container access. IBM X-Force ID: 255585.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2023-40937 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35906 ‼
📖 Read
via "National Vulnerability Database".
IBM Aspera Faspex 5.0.5 could allow a remote attacked to bypass IP restrictions due to improper access controls. IBM X-Force ID: 259649.📖 Read
via "National Vulnerability Database".
🦿 Securing Linux Policy 🦿
📖 Read
via "Tech Republic".
Linux is a powerful and customizable operating system that has been the backbone of many businesses for decades. This policy from TechRepublic Premium provides guidelines for securing Linux on company computers and computers used to conduct company business. It assumes administrative knowledge of Linux servers and/or workstation environments. From the policy: DEVELOP TEMPLATES BASED ON ...📖 Read
via "Tech Republic".
TechRepublic
Securing Linux Policy
Linux is a powerful and customizable operating system that has been the backbone of many businesses for decades. This policy from TechRepublic Premium
‼ CVE-2022-33220 ‼
📖 Read
via "National Vulnerability Database".
Information disclosure in Automotive multimedia due to buffer over-read.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-21662 ‼
📖 Read
via "National Vulnerability Database".
Memory corruption in Core Platform while printing the response buffer in log.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-33019 ‼
📖 Read
via "National Vulnerability Database".
Transient DOS in WLAN Host while doing channel switch announcement (CSA), when a mobile station receives invalid channel in CSA IE.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-38574 ‼
📖 Read
via "National Vulnerability Database".
Open redirect vulnerability in VI Web Client prior to 7.9.6 allows a remote unauthenticated attacker to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-28557 ‼
📖 Read
via "National Vulnerability Database".
Memory corruption in WLAN HAL while processing command parameters from untrusted WMI payload.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-28573 ‼
📖 Read
via "National Vulnerability Database".
Memory corruption in WLAN HAL while parsing WMI command parameters.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2023-33016 ‼
📖 Read
via "National Vulnerability Database".
Transient DOS in WLAN firmware while parsing MLO (multi-link operation).📖 Read
via "National Vulnerability Database".