Searching...
Please wait while we search the database
| CVE ID | Severity | Description | Published | Actions |
|---|---|---|---|---|
|
CVE-2023-23928
|
N/A |
reason-jose is a JOSE implementation in ReasonML and OCaml.`Jose.Jws.validate` does not check HS256 signatures. This allows tampering of JWS header and payload data if the service does not perform additional checks. Such tampering could expose applications using reason-jose to authorization bypass. Applications relying on JWS claims assertion to enforce security boundaries may be vulnerable to privilege escalation. This issue has been patched in version 0.8.2.
|
01 Feb 2023
|
|
|
CVE-2023-23630
|
N/A |
Eta is an embedded JS templating engine that works inside Node, Deno, and the browser. XSS attack - anyone using the Express API is impacted. The problem has been resolved. Users should upgrade to version 2.0.0. As a workaround, don't pass user supplied things directly to `res.render`.
|
01 Feb 2023
|
|
|
CVE-2023-23924
|
N/A |
Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will lead to the very least to an arbitrary file deletion and even remote code execution, depending on classes that are available.
|
01 Feb 2023
|
|
|
CVE-2022-4206
|
N/A |
A sensitive information leak issue has been discovered in all versions of DAST API scanner from 1.6.50 prior to 2.0.102, exposing the Authorization header in the vulnerability report
|
01 Feb 2023
|
|
|
CVE-2022-4254
|
N/A |
sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
|
01 Feb 2023
|
|
|
CVE-2023-0454
|
N/A |
OrangeScrum version 2.0.11 allows an authenticated external attacker to delete arbitrary local files from the server. This is possible because the application uses an unsanitized attacker-controlled parameter to construct an internal path.
|
01 Feb 2023
|
|
|
CVE-2023-0524
|
N/A |
As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escalate privileges. We have resolved the issue and also made several defense-in-depth fixes alongside. While the probability of successful exploitation is low, Tenable is committed to securing our customers’ environments and our products. The updates have been distributed via the Tenable plugin feed in feed serial numbers equal to or greater than #202212212055.
|
01 Feb 2023
|
|
|
CVE-2023-0587
|
N/A |
A file upload vulnerability in exists in Trend Micro Apex One server build 11110. Using a malformed Content-Length header in an HTTP PUT message sent to URL /officescan/console/html/cgi/fcgiOfcDDA.exe, an unauthenticated remote attacker can upload arbitrary files to the SampleSubmission directory (i.e., \PCCSRV\TEMP\SampleSubmission) on the server. The attacker can upload a large number of large files to fill up the file system on which the Apex One server is installed.
|
01 Feb 2023
|
|
|
CVE-2023-0606
|
CRITICAL |
Cross-site Scripting (XSS) - Reflected in GitHub repository ampache/ampache prior to 5.5.7.
|
01 Feb 2023
|
|
|
CVE-2023-0607
|
HIGH |
Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606.
|
01 Feb 2023
|
|
|
CVE-2023-20856
|
N/A |
VMware vRealize Operations (vROps) contains a CSRF bypass vulnerability. A malicious user could execute actions on the vROps platform on behalf of the authenticated victim user.
|
01 Feb 2023
|
|
|
CVE-2022-47770
|
N/A |
Serenissima Informatica Fast Checkin version v1.0 is vulnerable to Unauthenticated SQL Injection.
|
01 Feb 2023
|
|
|
CVE-2023-23846
|
N/A |
Due to insufficient length validation in the Open5GS GTP library versions prior to versions 2.4.13 and 2.5.7, when parsing extension headers in GPRS tunneling protocol (GPTv1-U) messages, a protocol payload with any extension header length set to zero causes an infinite loop. The affected process becomes immediately unresponsive, resulting in denial of service and excessive resource consumption. CVSS3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
|
01 Feb 2023
|
|
|
CVE-2022-46934
|
N/A |
kkFileView v4.1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the url parameter at /controller/OnlinePreviewController.java.
|
01 Feb 2023
|
|
|
CVE-2022-47769
|
N/A |
An arbitrary file write vulnerability in Serenissima Informatica Fast Checkin v1.0 allows unauthenticated attackers to upload malicious files in the web root of the application to gain access to the server via the web shell.
|
01 Feb 2023
|
|
|
CVE-2022-37033
|
N/A |
In dotCMS 5.x-22.06, TempFileAPI allows a user to create a temporary file based on a passed in URL, while attempting to block any SSRF access to local IP addresses or private subnets. In resolving this URL, the TempFileAPI follows any 302 redirects that the remote URL returns. Because there is no re-validation of the redirect URL, the TempFileAPI can be used to return data from those local/private hosts that should not be accessible remotely.
|
01 Feb 2023
|
|
|
CVE-2022-37034
|
N/A |
In dotCMS 5.x-22.06, it is possible to call the TempResource multiple times, each time requesting the dotCMS server to download a large file. If done repeatedly, this will result in Tomcat request-thread exhaustion and ultimately a denial of any other requests.
|
01 Feb 2023
|
|
|
CVE-2022-45782
|
N/A |
An issue was discovered in dotCMS core 5.3.8.5 through 5.3.8.15 and 21.03 through 22.10.1. A cryptographically insecure random generation algorithm for password-reset token generation leads to account takeover.
|
01 Feb 2023
|
|
|
CVE-2022-45783
|
N/A |
An issue was discovered in dotCMS core 4.x through 22.10.2. An authenticated directory traversal vulnerability in the dotCMS API can lead to Remote Code Execution.
|
01 Feb 2023
|
|
|
CVE-2022-31902
|
N/A |
Notepad++ v8.4.1 was discovered to contain a stack overflow via the component Finder::add().
|
01 Feb 2023
|
|
|
CVE-2023-0610
|
MEDIUM |
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.
|
01 Feb 2023
|
|
|
CVE-2023-0608
|
MEDIUM |
Cross-site Scripting (XSS) - DOM in GitHub repository microweber/microweber prior to 1.3.2.
|
01 Feb 2023
|
|
|
CVE-2023-0609
|
MEDIUM |
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.
|
01 Feb 2023
|
|
|
CVE-2022-48093
|
N/A |
Seacms v12.7 was discovered to contain a remote code execution (RCE) vulnerability via the ip parameter at admin_ ip.php.
|
01 Feb 2023
|
|
|
CVE-2022-48094
|
N/A |
lmxcms v1.41 was discovered to contain an arbitrary file read vulnerability via TemplateAction.class.php.
|
01 Feb 2023
|
CVE-2023-23928
N/A
01 Feb 2023
reason-jose is a JOSE implementation in ReasonML and OCaml.`Jose.Jws.validate` does not check HS256 signatures. This allows tampering of JWS header and payload data if the service does not perform additional checks. Such tampering could expose applications using reason-jose to authorization bypass. Applications relying on JWS claims assertion to enforce security boundaries may be vulnerable to privilege escalation. This issue has been patched in version 0.8.2.
CVE-2023-23630
N/A
01 Feb 2023
Eta is an embedded JS templating engine that works inside Node, Deno, and the browser. XSS attack - anyone using the Express API is impacted. The problem has been resolved. Users should upgrade to version 2.0.0. As a workaround, don't pass user supplied things directly to `res.render`.
CVE-2023-23924
N/A
01 Feb 2023
Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will lead to the very least to an arbitrary file deletion and even remote code execution, depending on classes that are available.
CVE-2022-4206
N/A
01 Feb 2023
A sensitive information leak issue has been discovered in all versions of DAST API scanner from 1.6.50 prior to 2.0.102, exposing the Authorization header in the vulnerability report
CVE-2022-4254
N/A
01 Feb 2023
sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
CVE-2023-0454
N/A
01 Feb 2023
OrangeScrum version 2.0.11 allows an authenticated external attacker to delete arbitrary local files from the server. This is possible because the application uses an unsanitized attacker-controlled parameter to construct an internal path.
CVE-2023-0524
N/A
01 Feb 2023
As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escalate privileges. We have resolved the issue and also made several defense-in-depth fixes alongside. While the probability of successful exploitation is low, Tenable is committed to securing our customers’ environments and our products. The updates have been distributed via the Tenable plugin feed in feed serial numbers equal to or greater than #202212212055.
CVE-2023-0587
N/A
01 Feb 2023
A file upload vulnerability in exists in Trend Micro Apex One server build 11110. Using a malformed Content-Length header in an HTTP PUT message sent to URL /officescan/console/html/cgi/fcgiOfcDDA.exe, an unauthenticated remote attacker can upload arbitrary files to the SampleSubmission directory (i.e., \PCCSRV\TEMP\SampleSubmission) on the server. The attacker can upload a large number of large files to fill up the file system on which the Apex One server is installed.
CVE-2023-0606
CRITICAL
01 Feb 2023
Cross-site Scripting (XSS) - Reflected in GitHub repository ampache/ampache prior to 5.5.7.
CVE-2023-0607
HIGH
01 Feb 2023
Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606.
CVE-2023-20856
N/A
01 Feb 2023
VMware vRealize Operations (vROps) contains a CSRF bypass vulnerability. A malicious user could execute actions on the vROps platform on behalf of the authenticated victim user.
CVE-2022-47770
N/A
01 Feb 2023
Serenissima Informatica Fast Checkin version v1.0 is vulnerable to Unauthenticated SQL Injection.
CVE-2023-23846
N/A
01 Feb 2023
Due to insufficient length validation in the Open5GS GTP library versions prior to versions 2.4.13 and 2.5.7, when parsing extension headers in GPRS tunneling protocol (GPTv1-U) messages, a protocol payload with any extension header length set to zero causes an infinite loop. The affected process becomes immediately unresponsive, resulting in denial of service and excessive resource consumption. CVSS3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
CVE-2022-46934
N/A
01 Feb 2023
kkFileView v4.1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the url parameter at /controller/OnlinePreviewController.java.
CVE-2022-47769
N/A
01 Feb 2023
An arbitrary file write vulnerability in Serenissima Informatica Fast Checkin v1.0 allows unauthenticated attackers to upload malicious files in the web root of the application to gain access to the server via the web shell.
CVE-2022-37033
N/A
01 Feb 2023
In dotCMS 5.x-22.06, TempFileAPI allows a user to create a temporary file based on a passed in URL, while attempting to block any SSRF access to local IP addresses or private subnets. In resolving this URL, the TempFileAPI follows any 302 redirects that the remote URL returns. Because there is no re-validation of the redirect URL, the TempFileAPI can be used to return data from those local/private hosts that should not be accessible remotely.
CVE-2022-37034
N/A
01 Feb 2023
In dotCMS 5.x-22.06, it is possible to call the TempResource multiple times, each time requesting the dotCMS server to download a large file. If done repeatedly, this will result in Tomcat request-thread exhaustion and ultimately a denial of any other requests.
CVE-2022-45782
N/A
01 Feb 2023
An issue was discovered in dotCMS core 5.3.8.5 through 5.3.8.15 and 21.03 through 22.10.1. A cryptographically insecure random generation algorithm for password-reset token generation leads to account takeover.
CVE-2022-45783
N/A
01 Feb 2023
An issue was discovered in dotCMS core 4.x through 22.10.2. An authenticated directory traversal vulnerability in the dotCMS API can lead to Remote Code Execution.
CVE-2022-31902
N/A
01 Feb 2023
Notepad++ v8.4.1 was discovered to contain a stack overflow via the component Finder::add().
CVE-2023-0610
MEDIUM
01 Feb 2023
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.
CVE-2023-0608
MEDIUM
01 Feb 2023
Cross-site Scripting (XSS) - DOM in GitHub repository microweber/microweber prior to 1.3.2.
CVE-2023-0609
MEDIUM
01 Feb 2023
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.
CVE-2022-48093
N/A
01 Feb 2023
Seacms v12.7 was discovered to contain a remote code execution (RCE) vulnerability via the ip parameter at admin_ ip.php.
CVE-2022-48094
N/A
01 Feb 2023
lmxcms v1.41 was discovered to contain an arbitrary file read vulnerability via TemplateAction.class.php.
Page 574 of 619
Page 574 of 619