Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2023-3347

Description: A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

EPSS Score: 0.1%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-33405

Description: Blogengine.net 3.3.8.0 and earlier is vulnerable to Open Redirect.

CVSS: LOW (0.0)

EPSS Score: 0.13%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-33387

Description: A reflected cross-site scripting (XSS) vulnerability in DATEV eG Personal-Management System Comfort/Comfort Plus v15.1.0 to v16.1.1 P4 allows attackers to steal targeted users' login data by sending a crafted link.

CVSS: LOW (0.0)

EPSS Score: 0.09%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-33289

Description: The urlnorm crate through 0.1.4 for Rust allows Regular Expression Denial of Service (ReDos) via a crafted URL to lib.rs.

CVSS: LOW (0.0)

EPSS Score: 0.12%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-32571

Description: Dynamic Linq 1.0.7.10 through 1.2.25 before 1.3.0 allows attackers to execute arbitrary code and commands when untrusted input to methods including Where, Select, OrderBy is parsed.

CVSS: LOW (0.0)

EPSS Score: 0.47%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-32274

Description: Enphase Installer Toolkit versions 3.27.0 has hard coded credentials embedded in binary code in the Android application. An attacker can exploit this and gain access to sensitive information.

CVSS: HIGH (8.6)

EPSS Score: 0.1%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-31868

Description: Sage X3 version 12.14.0.50-0 is vulnerable to Cross Site Scripting (XSS). Some parts of the Web application are dynamically built using user's inputs. Yet, those inputs are not verified nor filtered by the application, so they mathed the expected format. Therefore, when HTML/JavaScript code is injected into those fields, this code will be saved by the application and executed by the web browser of the user viewing the web page. Several injection points have been identified on the application. The major one requires the user to be authenticated with a common account, he can then target an Administrator. All others endpoints need the malicious user to be authenticated as an Administrator. Therefore, the impact is diminished.

CVSS: LOW (0.0)

EPSS Score: 0.06%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-31867

Description: Sage X3 version 12.14.0.50-0 is vulnerable to CSV Injection.

CVSS: LOW (0.0)

EPSS Score: 0.13%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-3128

Description: Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.

CVSS: CRITICAL (9.4)

EPSS Score: 0.22%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-30347

Description: Cross Site Scripting (XSS) vulnerability in Neox Contact Center 2.3.9, via the serach_sms_api_name parameter to the SMA API search.

CVSS: LOW (0.0)

EPSS Score: 0.06%

Source: CVE
December 7th, 2024 (5 months ago)