βΌ CVE-2023-41881 βΌ
π Read
via "National Vulnerability Database".
vantage6 is privacy preserving federated learning infrastructure. When a collaboration is deleted, the linked resources (such as tasks from that collaboration) should be deleted. This is partly to manage data properly, but also to prevent a potential (but unlikely) side-effect that affects versions prior to 4.0.0, where if a collaboration with id=10 is deleted, and subsequently a new collaboration is created with id=10, the authenticated users in that collaboration could potentially see results of the deleted collaboration in some cases. Version 4.0.0 contains a patch for this issue. There are no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35661 βΌ
π Read
via "National Vulnerability Database".
In ProfSixDecomTcpSACKoption of RohcPacketCommon.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.π Read
via "National Vulnerability Database".
βΌ CVE-2023-44186 βΌ
π Read
via "National Vulnerability Database".
An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to a Denial of Service (DoS). Continued receipt and processing of these BGP updates will create a sustained Denial of Service (DoS) condition.This issue is hit when the router has Non-Stop Routing (NSR) enabled, has a non-4-byte-AS capable BGP neighbor, receives a BGP update message with a prefix that includes a long AS PATH containing large number of 4-byte ASes, and has to advertise the prefix towards the non-4-byte-AS capable BGP neighbor.This issue affects:Juniper Networks Junos OS: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R2.Juniper Networks Junos OS Evolved * All versions prior to 20.4R3-S8-EVO; * 21.1 versions 21.1R1-EVO and later; * 21.2 versions prior to 21.2R3-S6-EVO; * 21.3 versions prior to 21.3R3-S5-EVO; * 21.4 versions prior to 21.4R3-S5-EVO; * 22.1 versions prior to 22.1R3-S4-EVO; * 22.2 versions prior to 22.2R3-S2-EVO; * 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO; * 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO; * 23.2 versions prior to 23.2R2-EVO.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35646 βΌ
π Read
via "National Vulnerability Database".
In TBD of TBD, there is a possible stack buffer overflow due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35649 βΌ
π Read
via "National Vulnerability Database".
In several functions of Exynos modem files, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation.π Read
via "National Vulnerability Database".
βΌ CVE-2023-45132 βΌ
π Read
via "National Vulnerability Database".
NAXSI is an open-source maintenance web application firewall (WAF) for NGINX. An issue present starting in version 1.3 and prior to version 1.6 allows someone to bypass the WAF when a malicious `X-Forwarded-For` IP matches `IgnoreIP` `IgnoreCIDR` rules. This old code was arranged to allow older NGINX versions to also support `IgnoreIP` `IgnoreCIDR` when multiple reverse proxies were present. The issue is patched in version 1.6. As a workaround, do not set any `IgnoreIP` `IgnoreCIDR` for older versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-42298 βΌ
π Read
via "National Vulnerability Database".
An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to cause a denial of service via the Q_DecCoordOnUnitSphere function of file src/bifs/unquantize.c.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1943 βΌ
π Read
via "National Vulnerability Database".
Privilege Escalation in kOps using GCE/GCP Provider in Gossip Mode.π Read
via "National Vulnerability Database".
π2
π΄ Pan-African Financial Apps Leak Encryption, Authentication Keys π΄
π Read
via "Dark Reading".
Cryptocurrency apps were the most high risk for exposing sensitive information, a reverse-engineering study shows.π Read
via "Dark Reading".
Dark Reading
Pan-African Financial Apps Leak Encryption, Authentication Keys
Cryptocurrency apps were the most high risk for exposing sensitive information, a reverse-engineering study shows.
π΄ New California Delete Act Tightens Rules for Data Brokers π΄
π Read
via "Dark Reading".
Companies with customers in California need to prepare for a new process for demanding deletion of personal data.π Read
via "Dark Reading".
Dark Reading
New California Delete Act Tightens Rules for Data Brokers
Companies with customers in California need to prepare for a new process for demanding deletion of personal data.
π΄ How to Scan Your Environment for Vulnerable Versions of Curl π΄
π Read
via "Dark Reading".
This Tech Tip outlines how enterprise defenders can mitigate the risks of the curl and libcurl vulnerabilities in their environment.π Read
via "Dark Reading".
Dark Reading
How to Scan Your Environment for Vulnerable Versions of Curl
This Tech Tip outlines how enterprise defenders can mitigate the risks of the curl and libcurl vulnerabilities in their environments.
βΌ CVE-2023-45058 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in KaizenCoders Short URL plugin <=Γ 1.6.8 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-43789 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in libXpm where a vulnerability exists due to a boundary condition, a local user can trigger an out-of-bounds read error and read contents of memory on the system.π Read
via "National Vulnerability Database".
βΌ CVE-2023-23737 βΌ
π Read
via "National Vulnerability Database".
Unauth. SQL Injection (SQLi) vulnerability in MainWP MainWP Broken Links Checker Extension plugin <=Γ 4.0 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-5045 βΌ
π Read
via "National Vulnerability Database".
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Biltay Technology Kayisi allows SQL Injection, Command Line Execution through SQL Injection.This issue affects Kayisi: before 1286.π Read
via "National Vulnerability Database".
βΌ CVE-2023-45048 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Repuso Social proof testimonials and reviews by Repuso plugin <=Γ 5.00 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-23651 βΌ
π Read
via "National Vulnerability Database".
Auth. (subscriber+) SQL Injection (SQLi) vulnerability in MainWP Google Analytics ExtensionΓ plugin <= 4.0.4 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-45052 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in dan009 WP Bing Map Pro plugin <Γ 5.0 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-45063 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in ReCorp AI Content Writing Assistant (Content Writer, GPT 3 & 4, ChatGPT, Image Generator) All in One plugin <=Γ 1.1.5 versions.π Read
via "National Vulnerability Database".
β€1
βΌ CVE-2023-45011 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Igor Buyanov WP Power Stats plugin <=Γ 2.2.3 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-45060 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Fla-shop.Com Interactive World Map plugin <=Γ 3.2.0 versions.π Read
via "National Vulnerability Database".