CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2023-47630

Description: Kyverno is a policy engine designed for Kubernetes. An issue was found in Kyverno that allowed an attacker to control the digest of images used by Kyverno users. The issue would require the attacker to compromise the registry that the Kyverno users fetch their images from. The attacker could then return an vulnerable image to the the user and leverage that to further escalate their position. As such, the attacker would need to know which images the Kyverno user consumes and know of one of multiple exploitable vulnerabilities in previous digests of the images. Alternatively, if the attacker has compromised the registry, they could craft a malicious image with a different digest with intentionally placed vulnerabilities and deliver the image to the user. Users pulling their images by digests and from trusted registries are not impacted by this vulnerability. There is no evidence of this being exploited in the wild. The issue has been patched in 1.10.5. All users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS: HIGH (7.1)

EPSS Score: 0.09%

Source: CVE
November 28th, 2024 (7 months ago)

CVE-2023-47038

Description: A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.

EPSS Score: 0.04%

Source: CVE
November 28th, 2024 (7 months ago)

CVE-2023-46728

Description: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.

CVSS: HIGH (7.5)

EPSS Score: 0.53%

Source: CVE
November 28th, 2024 (7 months ago)

CVE-2023-46646

Description: Improper access control in all versions of GitHub Enterprise Server allows unauthorized users to view private repository names via the "Get a check run" API endpoint. This vulnerability did not allow unauthorized access to any repository content besides the name. This vulnerability affected GitHub Enterprise Server version 3.7.0 and above and was fixed in version 3.17.19, 3.8.12, 3.9.7 3.10.4, and 3.11.0.

CVSS: MEDIUM (5.3)

EPSS Score: 0.08%

Source: CVE
November 28th, 2024 (7 months ago)

CVE-2023-46260

Description: An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVSS: HIGH (7.5)

EPSS Score: 1.16%

Source: CVE
November 28th, 2024 (7 months ago)

CVE-2023-46217

Description: An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.

CVSS: CRITICAL (9.8)

EPSS Score: 0.25%

Source: CVE
November 28th, 2024 (7 months ago)

CVE-2023-45120

Description: Online Examination System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'qid' parameter of the /update.php?q=quiz&step=2 resource does not validate the characters received and they are sent unfiltered to the database.

CVSS: CRITICAL (9.8)

EPSS Score: 0.08%

Source: CVE
November 28th, 2024 (7 months ago)

CVE-2023-45117

Description: Online Examination System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'eid' parameter of the /update.php?q=rmquiz resource does not validate the characters received and they are sent unfiltered to the database.

CVSS: CRITICAL (9.8)

EPSS Score: 0.08%

Source: CVE
November 28th, 2024 (7 months ago)

CVE-2023-44482

Description: Leave Management System Project v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'setsickleave' parameter of the admin/setleaves.php resource does not validate the characters received and they are sent unfiltered to the database.

CVSS: HIGH (8.8)

EPSS Score: 0.04%

Source: CVE
November 28th, 2024 (7 months ago)

CVE-2023-44389

Description: Zope is an open-source web application server. The title property, available on most Zope objects, can be used to store script code that is executed while viewing the affected object in the Zope Management Interface (ZMI). All versions of Zope 4 and Zope 5 are affected. Patches will be released with Zope versions 4.8.11 and 5.8.6.

CVSS: LOW (3.1)

EPSS Score: 0.06%

Source: CVE
November 28th, 2024 (7 months ago)