βΌ CVE-2023-5574 βΌ
π Read
via "National Vulnerability Database".
A use-after-free flaw was found in xorg-x11-server-Xvfb. This issue occurs in Xvfb with a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode). If the pointer is warped from a screen 1 to a screen 0, a use-after-free issue may be triggered during shutdown or reset of the Xvfb server, allowing for possible escalation of privileges or denial of service.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46417 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_415498 function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46233 βΌ
π Read
via "National Vulnerability Database".
crypto-js is a JavaScript library of crypto standards. Prior to version 4.2.0, crypto-js PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. If used to generate signatures, the impact is high. Version 4.2.0 contains a patch for this issue. As a workaround, configure crypto-js to use SHA256 with at least 250,000 iterations.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46415 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_41E588 function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-5044 βΌ
π Read
via "National Vulnerability Database".
Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46423 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_417094 function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46412 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a command execution vulnerability via the sub_41D998 function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-45137 βΌ
π Read
via "National Vulnerability Database".
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. `org.xwiki.platform:xwiki-platform-web` starting in version 3.1-milestone-2 and prior to version 13.4-rc-1, as well as `org.xwiki.platform:xwiki-platform-web-templates` prior to versions 14.10.12 and 15.5-rc-1, are vulnerable to cross-site scripting. When trying to create a document that already exists, XWiki displays an error message in the form for creating it. Due to missing escaping, this error message is vulnerable to raw HTML injection and thus XSS. The injected code is the document reference of the existing document so this requires that the attacker first creates a non-empty document whose name contains the attack code. This has been patched in `org.xwiki.platform:xwiki-platform-web` version 13.4-rc-1 and `org.xwiki.platform:xwiki-platform-web-templates` versions 14.10.12 and 15.5-rc-1 by adding the appropriate escaping. The vulnerable template file `createinline.vm` is part of XWiki's WAR and can be patched by manually applying the changes from the fix.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46419 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_415730 function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46421 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_411D00 function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46408 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a command execution vulnerability via the sub_ The 41DD80 function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46414 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_ 41D494 function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-5380 βΌ
π Read
via "National Vulnerability Database".
A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38849 βΌ
π Read
via "National Vulnerability Database".
An issue in tire-sales Line v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38847 βΌ
π Read
via "National Vulnerability Database".
An issue in CHRISTINA JAPAN Line v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46232 βΌ
π Read
via "National Vulnerability Database".
era-compiler-vyper is the EraVM Vyper compiler for zkSync Era, a layer 2 rollup that uses zero-knowledge proofs to scale Ethereum. Prior to era-compiler-vype version 1.3.10, a bug prevented the initialization of the first immutable variable for Vyper contracts meeting certain criteria. The problem arises when there is a String or Array with more 256-bit words allocated than initialized. It results in the second wordΓ’β¬β’s index unset, that is effectively set to 0, so the first immutable value with the actual 0 index is overwritten in the ImmutableSimulator. Version 1.3.10 fixes this issue by setting all indexes in advance. The problem will go away, but it will get more expensive if the user allocates a lot of uninitialized space, e.g. `String[4096]`. Upgrading and redeploying affected contracts is the only way of working around the issue.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46584 βΌ
π Read
via "National Vulnerability Database".
SQL Injection vulnerability in PHPGurukul Nipah virus (NiV) " Testing Management System v.1.0 allows a remote attacker to escalate privileges via a crafted request to the new-user-testing.php endpoint.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38845 βΌ
π Read
via "National Vulnerability Database".
An issue in Anglaise Company Anglaise.Company v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46583 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Scripting (XSS) vulnerability in PHPGurukul Nipah virus (NiV) " Testing Management System v.1.0 allows attackers to execute arbitrary code via a crafted payload injected into the State field.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2023-31421 βΌ
π Read
via "National Vulnerability Database".
It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More specifically, when the client is configured to connect to an IP address (instead of a hostname) it does not validate the server certificate's IP SAN values against that IP address and certificate validation fails, and therefore the connection is not blocked as expected.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46345 βΌ
π Read
via "National Vulnerability Database".
Catdoc v0.95 was discovered to contain a NULL pointer dereference via the component xls2csv at src/xlsparse.c.π Read
via "National Vulnerability Database".