Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2023-30362

Description: Buffer Overflow vulnerability in coap_send function in libcoap library 4.3.1-103-g52cfd56 fixed in 4.3.1-120-ge242200 allows attackers to obtain sensitive information via malformed pdu.

CVSS: LOW (0.0)

EPSS Score: 0.17%

Source: CVE
December 6th, 2024 (5 months ago)

CVE-2023-30260

Description: Command injection vulnerability in RaspAP raspap-webgui 2.8.8 and earlier allows remote attackers to run arbitrary commands via crafted POST request to hostapd settings form.

CVSS: LOW (0.0)

EPSS Score: 0.27%

Source: CVE
December 6th, 2024 (5 months ago)

CVE-2023-30258

Description: Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request.

CVSS: LOW (0.0)

EPSS Score: 79.42%

Source: CVE
December 6th, 2024 (5 months ago)

CVE-2023-2996

Description: The Jetpack WordPress plugin before 12.1.1 does not validate uploaded files, allowing users with author roles or above to manipulate existing files on the site, deleting arbitrary files, and in rare cases achieve Remote Code Execution via phar deserialization.

CVSS: LOW (0.0)

EPSS Score: 0.37%

Source: CVE
December 6th, 2024 (5 months ago)

CVE-2023-2989

Description: Fortra Globalscape EFT versions before 8.1.0.16 suffer from an out of bounds memory read in their administration server, which can allow an attacker to crash the service or bypass authentication if successfully exploited

CVSS: LOW (0.0)

EPSS Score: 0.12%

Source: CVE
December 6th, 2024 (5 months ago)

CVE-2023-29860

Description: An insecure permissions in /Taier/API/tenant/listTenant interface in DTStack Taier 1.3.0 allows attackers to view sensitive information via the getCookie method.

CVSS: LOW (0.0)

EPSS Score: 0.19%

Source: CVE
December 6th, 2024 (5 months ago)

CVE-2023-29068

Description: A maliciously crafted file consumed through pskernel.dll file could lead to memory corruption vulnerabilities. These vulnerabilities in conjunction with other vulnerabilities could lead to code execution in the context of the current process.

CVSS: LOW (0.0)

EPSS Score: 0.07%

Source: CVE
December 6th, 2024 (5 months ago)

CVE-2023-28929

Description: Trend Micro Security 2021, 2022, and 2023 (Consumer) are vulnerable to a DLL Hijacking vulnerability which could allow an attacker to use a specific executable file as an execution and/or persistence mechanism which could execute a malicious program each time the executable file is started.

CVSS: LOW (0.0)

EPSS Score: 0.07%

Source: CVE
December 6th, 2024 (5 months ago)

CVE-2023-28799

Description: A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.

CVSS: HIGH (8.2)

EPSS Score: 0.18%

Source: CVE
December 6th, 2024 (5 months ago)

CVE-2023-28202

Description: This issue was addressed with improved state management. This issue is fixed in iOS 16.5 and iPadOS 16.5, watchOS 9.5, tvOS 16.5, macOS Ventura 13.4. An app firewall setting may not take effect after exiting the Settings app.

CVSS: LOW (0.0)

EPSS Score: 0.05%

Source: CVE
December 6th, 2024 (5 months ago)