CVE-2023-3347 |
Description: A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.
EPSS Score: 0.1%
December 7th, 2024 (5 months ago)
|
CVE-2023-33405 |
Description: Blogengine.net 3.3.8.0 and earlier is vulnerable to Open Redirect.
CVSS: LOW (0.0) EPSS Score: 0.13%
December 7th, 2024 (5 months ago)
|
CVE-2023-33387 |
Description: A reflected cross-site scripting (XSS) vulnerability in DATEV eG Personal-Management System Comfort/Comfort Plus v15.1.0 to v16.1.1 P4 allows attackers to steal targeted users' login data by sending a crafted link.
CVSS: LOW (0.0) EPSS Score: 0.09%
December 7th, 2024 (5 months ago)
|
CVE-2023-33289 |
Description: The urlnorm crate through 0.1.4 for Rust allows Regular Expression Denial of Service (ReDos) via a crafted URL to lib.rs.
CVSS: LOW (0.0) EPSS Score: 0.12%
December 7th, 2024 (5 months ago)
|
CVE-2023-32571 |
Description: Dynamic Linq 1.0.7.10 through 1.2.25 before 1.3.0 allows attackers to execute arbitrary code and commands when untrusted input to methods including Where, Select, OrderBy is parsed.
CVSS: LOW (0.0) EPSS Score: 0.47%
December 7th, 2024 (5 months ago)
|
CVE-2023-32274 |
Description:
Enphase Installer Toolkit versions 3.27.0 has hard coded credentials embedded in binary code in the Android application. An attacker can exploit this and gain access to sensitive information.
CVSS: HIGH (8.6) EPSS Score: 0.1%
December 7th, 2024 (5 months ago)
|
CVE-2023-31868 |
Description: Sage X3 version 12.14.0.50-0 is vulnerable to Cross Site Scripting (XSS). Some parts of the Web application are dynamically built using user's inputs. Yet, those inputs are not verified nor filtered by the application, so they mathed the expected format. Therefore, when HTML/JavaScript code is injected into those fields, this code will be saved by the application and executed by the web browser of the user viewing the web page. Several injection points have been identified on the application. The major one requires the user to be authenticated with a common account, he can then target an Administrator. All others endpoints need the malicious user to be authenticated as an Administrator. Therefore, the impact is diminished.
CVSS: LOW (0.0) EPSS Score: 0.06%
December 7th, 2024 (5 months ago)
|
CVE-2023-31867 |
Description: Sage X3 version 12.14.0.50-0 is vulnerable to CSV Injection.
CVSS: LOW (0.0) EPSS Score: 0.13%
December 7th, 2024 (5 months ago)
|
CVE-2023-3128 |
Description: Grafana is validating Azure AD accounts based on the email claim.
On Azure AD, the profile email field is not unique and can be easily modified.
This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.
CVSS: CRITICAL (9.4) EPSS Score: 0.22%
December 7th, 2024 (5 months ago)
|
CVE-2023-30347 |
Description: Cross Site Scripting (XSS) vulnerability in Neox Contact Center 2.3.9, via the serach_sms_api_name parameter to the SMA API search.
CVSS: LOW (0.0) EPSS Score: 0.06%
December 7th, 2024 (5 months ago)
|