CVE-2023-36612 |
Description: Directory traversal can occur in the Basecamp com.basecamp.bc3 application before 4.2.1 for Android, which may allow an attacker to write arbitrary files in the application's private directory. Additionally, by using a malicious intent, the attacker may redirect the server's responses (containing sensitive information) to third-party applications by using a custom-crafted deeplink scheme.
CVSS: LOW (0.0) EPSS Score: 0.06%
November 28th, 2024 (6 months ago)
|
CVE-2023-36476 |
Description: calamares-nixos-extensions provides Calamares branding and modules for NixOS, a distribution of GNU/Linux. Users of calamares-nixos-extensions version 0.3.12 and prior who installed NixOS through the graphical calamares installer, with an unencrypted `/boot`, on either non-UEFI systems or with a LUKS partition different from `/` have their LUKS key file in `/boot` as a plaintext CPIO archive attached to their NixOS initrd. A patch is available and anticipated to be part of version 0.3.13 to backport to NixOS 22.11, 23.05, and unstable channels. Expert users who have a copy of their data may, as a workaround, re-encrypt the LUKS partition(s) themselves.
CVSS: HIGH (7.9) EPSS Score: 0.09%
November 28th, 2024 (6 months ago)
|
CVE-2023-36475 |
Parse Server vulnerable to remote code execution via MongoDB BSON parser through prototype pollution
Description: Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 5.5.2 and 6.2.1, an attacker can use a prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. A patch is available in versions 5.5.2 and 6.2.1.
CVSS: CRITICAL (9.8) EPSS Score: 14.4%
November 28th, 2024 (6 months ago)
|
CVE-2023-36377 |
|
CVE-2023-36347 |
|
CVE-2023-36291 |
|
CVE-2023-36146 |
|
CVE-2023-36144 |
Description: An authentication bypass in Intelbras Switch SG 2404 MR in firmware 1.00.54 allows an unauthenticated attacker to download the backup file of the device, exposing critical information about the device configuration.
CVSS: LOW (0.0) EPSS Score: 6.89%
November 28th, 2024 (6 months ago)
|
CVE-2023-36143 |
|
CVE-2023-35932 |
Description: jcvi is a Python library to facilitate genome assembly, annotation, and comparative genomics. A configuration injection happens when user input is considered by the application in an unsanitized format and can reach the configuration file. A malicious user may craft a special payload that may lead to a command injection. The impact of a configuration injection may vary. Under some conditions, it may lead to command injection if there is for instance shell code execution from the configuration file values. This vulnerability does not currently have a fix.
CVSS: HIGH (7.1) EPSS Score: 0.14%
November 28th, 2024 (6 months ago)
|