Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2023-3019

Description: A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.

EPSS Score: 0.05%

Source: CVE
December 4th, 2024 (5 months ago)

CVE-2023-29459

Description: The laola.redbull application through 5.1.9-R for Android exposes the exported activity at.redbullsalzburg.android.AppMode.Default.Splash.SplashActivity, which accepts a data: URI. The target of this URI is subsequently loaded into the application's webview, thus allowing the loading of arbitrary content into the context of the application. This can occur via the fcrbs schema or an explicit intent invocation.

CVSS: LOW (0.0)

EPSS Score: 0.11%

Source: CVE
December 4th, 2024 (5 months ago)

CVE-2023-29043

Description: Presentations may contain references to images, which are user-controlled, and could include malicious script code that is being processed when editing a document. Script code embedded in malicious documents could be executed in the context of the user editing the document when performing certain actions, like copying content. The relevant attribute does now get encoded to avoid the possibility of executing script code. No publicly available exploits are known.

CVSS: MEDIUM (6.1)

EPSS Score: 0.06%

Source: CVE
December 4th, 2024 (5 months ago)

CVE-2023-2877

Description: The Formidable Forms WordPress plugin before 6.3.1 does not adequately authorize the user or validate the plugin URL in its functionality for installing add-ons. This allows a user with a role as low as Subscriber to install and activate arbitrary plugins of arbitrary versions from the WordPress.org plugin repository onto the site, leading to Remote Code Execution.

CVSS: LOW (0.0)

EPSS Score: 0.25%

Source: CVE
December 4th, 2024 (5 months ago)

CVE-2023-2744

Description: The ERP WordPress plugin before 1.12.4 does not properly sanitise and escape the `type` parameter in the `erp/v1/accounting/v1/people` REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.

CVSS: LOW (0.0)

EPSS Score: 0.25%

Source: CVE
December 4th, 2024 (5 months ago)

CVE-2023-26456

Description: Users were able to set an arbitrary "product name" for OX Guard. The chosen value was not sufficiently sanitized before processing it at the user interface, allowing for indirect cross-site scripting attacks. Accounts that were temporarily taken over could be configured to trigger persistent code execution, allowing an attacker to build a foothold. Sanitization is in place for product names now. No publicly available exploits are known.

CVSS: MEDIUM (5.4)

EPSS Score: 0.05%

Source: CVE
December 4th, 2024 (5 months ago)

CVE-2023-26442

Description: In case Cacheservice was configured to use a sproxyd object-storage backend, it would follow HTTP redirects issued by that backend. An attacker with access to a local or restricted network with the capability to intercept and replay HTTP requests to sproxyd (or who is in control of the sproxyd service) could perform a server-side request-forgery attack and make Cacheservice connect to unexpected resources. We have disabled the ability to follow HTTP redirects when connecting to sproxyd resources. No publicly available exploits are known.

CVSS: LOW (3.2)

EPSS Score: 0.09%

Source: CVE
December 4th, 2024 (5 months ago)

CVE-2023-26432

Description: When adding an external mail account, processing of SMTP "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue SMTP service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted SMTP server response to reasonable length/size. No publicly available exploits are known.

CVSS: MEDIUM (4.3)

EPSS Score: 0.17%

Source: CVE
December 4th, 2024 (5 months ago)

CVE-2023-2627

Description: The KiviCare WordPress plugin before 3.2.1 does not have proper CSRF and authorisation checks in various AJAX actions, allowing any authenticated users, such as subscriber to call them. Attacks include but are not limited to: Add arbitrary Clinic Admin/Doctors/etc and update plugin's settings

CVSS: LOW (0.0)

EPSS Score: 0.05%

Source: CVE
December 4th, 2024 (5 months ago)

CVE-2023-26136

Description: Versions of the package tough-cookie before 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.

CVSS: MEDIUM (6.5)

EPSS Score: 0.49%

Source: CVE
December 4th, 2024 (5 months ago)