Latest Vulnerabilities Updates: AppSecWorld's CVE Daily Digest for November 14-15, 2023

In the dynamic realm of cybersecurity, staying updated on the latest vulnerabilities is imperative.
This edition of the AppSecWorld's CVE Daily Digest provides a snapshot of the vulnerabilities published in National Vulnerability Database between November 14-15, 2023.
During this period, The National Vulnerability Database published 343, and these new Common Vulnerabilities and Exposures (CVEs) are classified as follows:

Critical: 18
High: 107
Medium: 128
Low: 23
Severity Not Assigned: 67

Identifying and understanding these vulnerabilities are pivotal steps towards enhancing security measures and creating a safer digital environment.
Now, let's delve deeper into AppSecWorld's CVE Daily Digest, spotlighting the Critical and High Severity vulnerabilities that demand immediate attention.

1. CVE-2023-47665
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in edward_plainview Plainview Protect Passwords plugin <= 1.4 versions.
References: https://patchstack.com/database/vulnerability/plainview-protect-passwords/wordpress-plainview-protect-passwords-plugin-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

2. CVE-2023-47673
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Stefano Ottolenghi Post Pay Counter plugin <= 2.789 versions.
References: https://patchstack.com/database/vulnerability/post-pay-counter/wordpress-post-pay-counter-plugin-2-789-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

3. CVE-2023-47684
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ThemePunch OHG Essential Grid plugin <= 3.1.0 versions.
References: https://patchstack.com/database/vulnerability/essential-grid/wordpress-essential-grid-plugin-3-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

4. CVE-2023-31403
Base Score: 9.6
Base Severity: CRITICAL
Exploitability Score: 2.8
Impact Score: 6.0
Description: SAP Business One installation - version 10.0, does not perform proper authentication and authorization checks for SMB shared folder. As a result, any malicious user can read and write to the SMB shared folder. Additionally, the files in the folder can be executed or be used by the installation process leading to considerable impact on confidentiality, integrity and availability.


References: https://me.sap.com/notes/3355658
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html

CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found

5. CVE-2023-47629
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: DataHub is an open-source metadata platform. In affected versions sign-up through an invite link does not properly restrict users from signing up as privileged accounts. If a user is given an email sign-up link they can potentially create an admin account given certain preconditions. If the default datahub user has been removed, then the user can sign up for an account that leverages the default policies giving admin privileges to the datahub user. All DataHub instances prior to the patch that have removed the datahub user, but not the default policies applying to that user are affected. Users are advised to update to version 0.12.1 which addresses the issue. There are no known workarounds for this vulnerability.
References: https://github.com/datahub-project/datahub/security/advisories/GHSA-vj59-23ww-p6c8

CWE-ID: CWE-269
Common Platform Enumerations (CPE): Not Found

6. CVE-2023-24585
Base Score: 7.7
Base Severity: HIGH
Exploitability Score: 2.2
Impact Score: 5.5
Description: An out-of-bounds write vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1725

CWE-ID: CWE-119
Common Platform Enumerations (CPE): Not Found

7. CVE-2023-25181
Base Score: 9.0
Base Severity: CRITICAL
Exploitability Score: 2.2
Impact Score: 6.0
Description: A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted set of network packets can lead to arbitrary code execution. An attacker can send a malicious packet to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1726

CWE-ID: CWE-122
Common Platform Enumerations (CPE): Not Found

8. CVE-2023-27882
Base Score: 9.0
Base Severity: CRITICAL
Exploitability Score: 2.2
Impact Score: 6.0
Description: A heap-based buffer overflow vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1733

CWE-ID: CWE-122
Common Platform Enumerations (CPE): Not Found

9. CVE-2023-28379
Base Score: 9.0
Base Severity: CRITICAL
Exploitability Score: 2.2
Impact Score: 6.0
Description: A memory corruption vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1738

CWE-ID: CWE-119
Common Platform Enumerations (CPE): Not Found

10. CVE-2023-28391
Base Score: 9.0
Base Severity: CRITICAL
Exploitability Score: 2.2
Impact Score: 6.0
Description: A memory corruption vulnerability exists in the HTTP Server header parsing functionality of Weston Embedded uC-HTTP v3.01.01. Specially crafted network packets can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1732

CWE-ID: CWE-119
Common Platform Enumerations (CPE): Not Found

11. CVE-2023-31247
Base Score: 9.0
Base Severity: CRITICAL
Exploitability Score: 2.2
Impact Score: 6.0
Description: A memory corruption vulnerability exists in the HTTP Server Host header parsing functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1746

CWE-ID: CWE-119
Common Platform Enumerations (CPE): Not Found

12. CVE-2023-43504
Base Score: 9.6
Base Severity: CRITICAL
Exploitability Score: 2.8
Impact Score: 6.0
Description: A vulnerability has been identified in COMOS (All versions < V10.4.4). Ptmcast executable used for testing cache validation service in affected application is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf

CWE-ID: CWE-120
Common Platform Enumerations (CPE): Not Found

13. CVE-2023-43505
Base Score: 9.6
Base Severity: CRITICAL
Exploitability Score: 3.1
Impact Score: 5.8
Description: A vulnerability has been identified in COMOS (All versions). The affected application lacks proper access controls in SMB shares. This could allow an attacker to access files that the user should not have access to.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf

CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found

14. CVE-2023-44317
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected products do not properly validate the content of uploaded X509 certificates which could allow an attacker with administrative privileges to execute arbitrary code on the device.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf

CWE-ID: CWE-349
Common Platform Enumerations (CPE): Not Found

15. CVE-2023-44373
Base Score: 9.1
Base Severity: CRITICAL
Exploitability Score: 2.3
Impact Score: 6.0
Description: A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf

CWE-ID: CWE-74
Common Platform Enumerations (CPE): Not Found

16. CVE-2023-46098
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: A vulnerability has been identified in SIMATIC PCS neo (All versions < V4.1). When accessing the Information Server from affected products, the products use an overly permissive CORS policy. This could allow an attacker to trick a legitimate user to trigger unwanted behavior.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-456933.pdf

CWE-ID: CWE-942
Common Platform Enumerations (CPE): Not Found

17. CVE-2023-46590
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: A vulnerability has been identified in Siemens OPC UA Modelling Editor (SiOME) (All versions < V2.8). Affected products suffer from a XML external entity (XXE) injection vulnerability. This vulnerability could allow an attacker to interfere with an application's processing of XML data and read arbitrary files in the system.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-197270.pdf

CWE-ID: CWE-611
Common Platform Enumerations (CPE): Not Found

18. CVE-2023-46601
Base Score: 9.6
Base Severity: CRITICAL
Exploitability Score: 3.1
Impact Score: 5.8
Description: A vulnerability has been identified in COMOS (All versions). The affected application lacks proper access controls in making the SQLServer connection. This could allow an attacker to query the database directly to access information that the user should not have access to.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf

CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found

19. CVE-2023-6111
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The function nft_trans_gc_catchall did not remove the catchall set element from the catchall_list when the argument sync is true, making it possible to free a catchall set element many times.

We recommend upgrading past commit 93995bf4af2c5a99e2a87f0cd5ce547d31eb7630.


References: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93995bf4af2c5a99e2a87f0cd5ce547d31eb7630
https://kernel.dance/93995bf4af2c5a99e2a87f0cd5ce547d31eb7630

CWE-ID: CWE-416
Common Platform Enumerations (CPE): Not Found

20. CVE-2023-6130
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 1.6
Impact Score: 5.9
Description: Path Traversal: '\..\filename' in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.
References: https://github.com/salesagility/suitecrm/commit/54bc56c3bd9f1db75408db1c1d7d652c3f5f71e9
https://huntr.com/bounties/22a27be9-f016-4daf-9887-c77eb3e1dc74

CWE-ID: CWE-29
Common Platform Enumerations (CPE): Not Found

21. CVE-2023-6131
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: Code Injection in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.
References: https://github.com/salesagility/suitecrm/commit/54bc56c3bd9f1db75408db1c1d7d652c3f5f71e9
https://huntr.com/bounties/5fa50b25-f6b1-408c-99df-4442c86c563f

CWE-ID: CWE-94
Common Platform Enumerations (CPE): Not Found

22. CVE-2023-26205
Base Score: 8.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.2
Description: An improper access control vulnerability [CWE-284] in FortiADC automation feature 7.1.0 through 7.1.2, 7.0 all versions, 6.2 all versions, 6.1 all versions may allow an authenticated low-privileged attacker to escalate their privileges to super_admin via a specific crafted configuration of fabric automation CLI script.
References: https://fortiguard.com/psirt/FG-IR-22-292

CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found

23. CVE-2023-34991
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.0 through 8.4.2 and 8.3.0 through 8.3.2 and 8.2.2 allows attacker to execute unauthorized code or commands via a crafted http request.
References: https://fortiguard.com/psirt/FG-IR-23-142

CWE-ID: CWE-89
Common Platform Enumerations (CPE): Not Found

24. CVE-2023-36017
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Windows Scripting Engine Memory Corruption Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36017

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

25. CVE-2023-36018
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Visual Studio Code Jupyter Extension Spoofing Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36018

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

26. CVE-2023-36021
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: Microsoft On-Prem Data Gateway Security Feature Bypass Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36021

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

27. CVE-2023-36025
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Windows SmartScreen Security Feature Bypass Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36025

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

28. CVE-2023-36028
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36028

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

29. CVE-2023-36031
Base Score: 7.6
Base Severity: HIGH
Exploitability Score: 2.3
Impact Score: 4.7
Description: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36031

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

30. CVE-2023-36033
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows DWM Core Library Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36033

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

31. CVE-2023-36035
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: Microsoft Exchange Server Spoofing Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36035

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

32. CVE-2023-36036
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36036

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

33. CVE-2023-36037
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Microsoft Excel Security Feature Bypass Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36037

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

34. CVE-2023-36039
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: Microsoft Exchange Server Spoofing Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36039

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

35. CVE-2023-36041
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Microsoft Excel Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36041

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

36. CVE-2023-36045
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Microsoft Office Graphics Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36045

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

37. CVE-2023-36046
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.2
Description: Windows Authentication Denial of Service Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36046

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

38. CVE-2023-36047
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Authentication Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36047

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

39. CVE-2023-36050
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: Microsoft Exchange Server Spoofing Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36050

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

40. CVE-2023-36052
Base Score: 8.6
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.0
Description: Azure CLI REST Command Information Disclosure Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36052

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

41. CVE-2023-36392
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: DHCP Server Service Denial of Service Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36392

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

42. CVE-2023-36393
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows User Interface Application Core Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36393

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

43. CVE-2023-36394
Base Score: 7.0
Base Severity: HIGH
Exploitability Score: 1.0
Impact Score: 5.9
Description: Windows Search Service Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36394

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

44. CVE-2023-36395
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Windows Deployment Services Denial of Service Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36395

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

45. CVE-2023-36396
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Compressed Folder Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36396

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

46. CVE-2023-36397
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36397

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

47. CVE-2023-36399
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.2
Description: Windows Storage Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36399

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

48. CVE-2023-36400
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.0
Impact Score: 6.0
Description: Windows HMAC Key Derivation Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36400

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

49. CVE-2023-36401
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: Microsoft Remote Registry Service Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36401

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

50. CVE-2023-36402
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36402

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

51. CVE-2023-36403
Base Score: 7.0
Base Severity: HIGH
Exploitability Score: 1.0
Impact Score: 5.9
Description: Windows Kernel Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36403

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

52. CVE-2023-36405
Base Score: 7.0
Base Severity: HIGH
Exploitability Score: 1.0
Impact Score: 5.9
Description: Windows Kernel Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36405

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

53. CVE-2023-36407
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Hyper-V Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36407

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

54. CVE-2023-36408
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Hyper-V Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36408

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

55. CVE-2023-36410
Base Score: 7.6
Base Severity: HIGH
Exploitability Score: 2.3
Impact Score: 4.7
Description: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36410

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

56. CVE-2023-36422
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Microsoft Windows Defender Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36422

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

57. CVE-2023-36423
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: Microsoft Remote Registry Service Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36423

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

58. CVE-2023-36424
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Common Log File System Driver Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36424

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

59. CVE-2023-36425
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 1.3
Impact Score: 6.0
Description: Windows Distributed File System (DFS) Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36425

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

60. CVE-2023-36427
Base Score: 7.0
Base Severity: HIGH
Exploitability Score: 1.0
Impact Score: 5.9
Description: Windows Hyper-V Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36427

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

61. CVE-2023-36439
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: Microsoft Exchange Server Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36439

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

62. CVE-2023-36553
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 and 5.0.0 through 5.0.1 and 4.10.0 and 4.9.0 and 4.7.2 allows attacker to execute unauthorized code or commands via crafted API requests.
References: https://fortiguard.com/psirt/FG-IR-23-135

CWE-ID: CWE-78
Common Platform Enumerations (CPE): Not Found

63. CVE-2023-36560
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: ASP.NET Security Feature Bypass Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36560

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

64. CVE-2023-36705
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Installer Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36705

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

65. CVE-2023-36719
Base Score: 8.4
Base Severity: HIGH
Exploitability Score: 2.5
Impact Score: 5.9
Description: Microsoft Speech Application Programming Interface (SAPI) Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36719

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

66. CVE-2023-38151
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Microsoft Host Integration Server 2020 Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38151

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

67. CVE-2023-41840
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: A untrusted search path vulnerability in Fortinet FortiClientWindows 7.0.9 allows an attacker to perform a DLL Hijack attack via a malicious OpenSSL engine library in the search path.
References: https://fortiguard.com/psirt/FG-IR-23-274

CWE-ID: CWE-426
Common Platform Enumerations (CPE): Not Found

68. CVE-2023-42783
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.2 through 8.4.0 and 8.3.2 through 8.3.0 and 8.2.2 allows attacker to read arbitrary files via crafted http requests.
References: https://fortiguard.com/psirt/FG-IR-23-143

CWE-ID: CWE-23
Common Platform Enumerations (CPE): Not Found

69. CVE-2022-24379
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: Improper input validation in some Intel(R) Server System M70KLP Family BIOS firmware before version 01.04.0029 may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html

CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found

70. CVE-2022-29262
Base Score: 7.9
Base Severity: HIGH
Exploitability Score: 1.5
Impact Score: 5.8
Description: Improper buffer restrictions in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html

CWE-ID: CWE-92
Common Platform Enumerations (CPE): Not Found

71. CVE-2022-29510
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: Improper buffer restrictions in some Intel(R) Server Board M10JNP2SB BIOS firmware before version 7.219 may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html

CWE-ID: CWE-92
Common Platform Enumerations (CPE): Not Found

72. CVE-2022-33945
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 1.5
Impact Score: 6.0
Description: Improper input validation in some Intel(R) Server board and Intel(R) Server System BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html

CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found

73. CVE-2022-36374
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools before version iDmi Windows 5.27.03.0003 may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html

CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found

74. CVE-2022-36396
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 1.5
Impact Score: 6.0
Description: Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools before version iDmiEdit-Linux-5.27.06.0017 may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html

CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found

75. CVE-2022-40681
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.2
Description: A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to cause denial of service via sending a crafted request to a specific named pipe.
References: https://fortiguard.com/psirt/FG-IR-22-299

CWE-ID: CWE-863
Common Platform Enumerations (CPE): Not Found

76. CVE-2022-41689
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 1.3
Impact Score: 5.9
Description: Improper access control in some Intel In-Band Manageability software before version 3.0.14 may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00968.html

CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found

77. CVE-2023-22285
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Improper access control for some Intel Unison software may allow an unauthenticated user to potentially enable denial of service via network access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html

CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found

78. CVE-2023-22292
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.5
Description: Uncaught exception for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html

CWE-ID: CWE-248
Common Platform Enumerations (CPE): Not Found

79. CVE-2023-22337
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Improper input validation for some Intel Unison software may allow an unauthenticated user to potentially enable denial of service via network access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html

CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found

80. CVE-2023-23583
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.0
Impact Score: 6.0
Description: Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
References: http://www.openwall.com/lists/oss-security/2023/11/14/4
http://www.openwall.com/lists/oss-security/2023/11/14/5
http://www.openwall.com/lists/oss-security/2023/11/14/6
http://www.openwall.com/lists/oss-security/2023/11/14/7
http://www.openwall.com/lists/oss-security/2023/11/14/8
http://www.openwall.com/lists/oss-security/2023/11/14/9
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html

CWE-ID: CWE-1281
Common Platform Enumerations (CPE): Not Found

81. CVE-2023-24592
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 1.3
Impact Score: 5.9
Description: Path traversal in the some Intel(R) oneAPI Toolkits and Component software before version 2023.1 may allow authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html

CWE-ID: CWE-22
Common Platform Enumerations (CPE): Not Found

82. CVE-2023-28397
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated to potentially enable escalation of privileges via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html

CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found

83. CVE-2023-28737
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.0
Impact Score: 6.0
Description: Improper initialization in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html

CWE-ID: CWE-665
Common Platform Enumerations (CPE): Not Found

84. CVE-2023-28741
Base Score: 7.9
Base Severity: HIGH
Exploitability Score: 1.5
Impact Score: 5.8
Description: Buffer overflow in some Intel(R) QAT drivers for Windows - HW Version 1.0 before version 1.10 may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00861.html

CWE-ID: CWE-120
Common Platform Enumerations (CPE): Not Found

85. CVE-2023-29157
Base Score: 8.4
Base Severity: HIGH
Exploitability Score: 2.0
Impact Score: 5.8
Description: Improper access control in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00900.html

CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found

86. CVE-2023-31273
Base Score: 10.0
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 6.0
Description: Protection mechanism failure in some Intel DCM software before version 5.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00902.html

CWE-ID: CWE-693
Common Platform Enumerations (CPE): Not Found

87. CVE-2023-32204
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.0
Impact Score: 6.0
Description: Improper access control in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00900.html

CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found

88. CVE-2023-32279
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Improper access control in user mode driver for some Intel(R) Connectivity Performance Suite before version 2.1123.214.2 may allow unauthenticated user to potentially enable information disclosure via network access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00944.html

CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found

89. CVE-2023-32641
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 0.9
Impact Score: 5.8
Description: Improper input validation in firmware for Intel(R) QAT before version QAT20.L.1.0.40-00004 may allow escalation of privilege and denial of service via adjacent access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00945.html

CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found

90. CVE-2023-32701
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.2
Description: Improper Input Validation in the Networking Stack of QNX SDP version(s) 6.6, 7.0, and 7.1 could allow an attacker to potentially cause Information Disclosure or a Denial-of-Service condition.


References: https://support.blackberry.com/kb/articleDetail?articleNumber=000112401

CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found

91. CVE-2023-34431
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 1.5
Impact Score: 6.0
Description: Improper input validation in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html

CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found

92. CVE-2023-36860
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 4.2
Description: Improper input validation for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via network access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html

CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found

93. CVE-2023-26222
Base Score: 8.7
Base Severity: HIGH
Exploitability Score: 2.3
Impact Score: 5.8
Description: The Web Application component of TIBCO Software Inc.'s TIBCO EBX and TIBCO Product and Service Catalog powered by TIBCO EBX contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a stored XSS on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO EBX: versions 5.9.22 and below, versions 6.0.13 and below and TIBCO Product and Service Catalog powered by TIBCO EBX: versions 5.0.0 and below.


References: https://www.tibco.com/services/support/advisories

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

94. CVE-2023-47550
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Cross-Site Request Forgery (CSRF) vulnerability in RedNao Donations Made Easy – Smart Donations allows Stored XSS.This issue affects Donations Made Easy – Smart Donations: from n/a through 4.0.12.


References: https://patchstack.com/database/vulnerability/smart-donations/wordpress-donations-made-easy-smart-donations-plugin-4-0-12-cross-site-scripting-xss-vulnerability-2?_s_id=cve

CWE-ID: CWE-352
Common Platform Enumerations (CPE): Not Found

95. CVE-2023-36007
Base Score: 7.6
Base Severity: HIGH
Exploitability Score: 2.3
Impact Score: 4.7
Description: Microsoft Send Customer Voice survey from Dynamics 365 Spoofing Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36007

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

96. CVE-2023-36049
Base Score: 7.6
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 4.7
Description: .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36049

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

97. CVE-2023-36437
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Azure DevOps Server Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36437

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

98. CVE-2023-46132
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 4.2
Description: Hyperledger Fabric is an open source permissioned distributed ledger framework. Combining two molecules to one another, called "cross-linking" results in a molecule with a chemical formula that is composed of all atoms of the original two molecules. In Fabric, one can take a block of transactions and cross-link the transactions in a way that alters the way the peers parse the transactions. If a first peer receives a block B and a second peer receives a block identical to B but with the transactions being cross-linked, the second peer will parse transactions in a different way and thus its world state will deviate from the first peer. Orderers or peers cannot detect that a block has its transactions cross-linked, because there is a vulnerability in the way Fabric hashes the transactions of blocks. It simply and naively concatenates them, which is insecure and lets an adversary craft a "cross-linked block" (block with cross-linked transactions) which alters the way peers process transactions. For example, it is possible to select a transaction and manipulate a peer to completely avoid processing it, without changing the computed hash of the block. Additional validations have been added in v2.2.14 and v2.5.5 to detect potential cross-linking issues before processing blocks. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References: https://github.com/hyperledger/fabric/security/advisories/GHSA-v9w2-543f-h69m

CWE-ID: CWE-362
Common Platform Enumerations (CPE): Not Found

99. CVE-2023-47130
Base Score: 8.1
Base Severity: HIGH
Exploitability Score: 2.2
Impact Score: 5.9
Description: Yii is an open source PHP web framework. yiisoft/yii before version 1.1.29 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. An attacker may leverage this vulnerability to compromise the host system. A fix has been developed for the 1.1.29 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References: https://github.com/yiisoft/yii/commit/37142be4dc5831114a375392e86d6450d4951c06
https://github.com/yiisoft/yii/security/advisories/GHSA-mw2w-2hj2-fg8q
https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection

CWE-ID: CWE-502
Common Platform Enumerations (CPE): Not Found

100. CVE-2023-47544
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Atarim Visual Website Collaboration, Feedback & Project Management – Atarim plugin <= 3.12 versions.
References: https://patchstack.com/database/vulnerability/atarim-visual-collaboration/wordpress-atarim-plugin-3-11-unauthenticated-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

101. CVE-2023-47547
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPFactory Products, Order & Customers Export for WooCommerce plugin <= 2.0.7 versions.
References: https://patchstack.com/database/vulnerability/export-woocommerce/wordpress-products-order-customers-export-for-woocommerce-plugin-2-0-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

102. CVE-2023-47630
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: Kyverno is a policy engine designed for Kubernetes. An issue was found in Kyverno that allowed an attacker to control the digest of images used by Kyverno users. The issue would require the attacker to compromise the registry that the Kyverno users fetch their images from. The attacker could then return an vulnerable image to the the user and leverage that to further escalate their position. As such, the attacker would need to know which images the Kyverno user consumes and know of one of multiple exploitable vulnerabilities in previous digests of the images. Alternatively, if the attacker has compromised the registry, they could craft a malicious image with a different digest with intentionally placed vulnerabilities and deliver the image to the user. Users pulling their images by digests and from trusted registries are not impacted by this vulnerability. There is no evidence of this being exploited in the wild. The issue has been patched in 1.10.5. All users are advised to upgrade. There are no known workarounds for this vulnerability.
References: https://github.com/kyverno/kyverno/security/advisories/GHSA-3hfq-cx9j-923w

CWE-ID: CWE-345
Common Platform Enumerations (CPE): Not Found

103. CVE-2023-47631
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: vantage6 is a framework to manage and deploy privacy enhancing technologies like Federated Learning (FL) and Multi-Party Computation (MPC). In affected versions a node does not check if an image is allowed to run if a `parent_id` is set. A malicious party that breaches the server may modify it to set a fake `parent_id` and send a task of a non-whitelisted algorithm. The node will then execute it because the `parent_id` that is set prevents checks from being run. This impacts all servers that are breached by an expert user. This vulnerability has been patched in version 4.1.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.

References: https://github.com/vantage6/vantage6/blob/version/4.1.1/vantage6-node/vantage6/node/docker/docker_manager.py#L265-L268
https://github.com/vantage6/vantage6/commit/bf83521eb12fa80aa5fc92ef1692010a9a7f8243
https://github.com/vantage6/vantage6/security/advisories/GHSA-vc3v-ppc7-v486

CWE-ID: CWE-345
Common Platform Enumerations (CPE): Not Found

104. CVE-2023-5528
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.
References: https://github.com/kubernetes/kubernetes/issues/121879
https://groups.google.com/g/kubernetes-security-announce/c/SL_d4NR8pzA

CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found

105. CVE-2023-36038
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.2
Description: ASP.NET Core Denial of Service Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36038

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

106. CVE-2023-39535
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
References: https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023008.pdf

CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found

107. CVE-2023-39536
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
References: https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023008.pdf

CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found

108. CVE-2023-39537
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
References: https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023008.pdf

CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found

109. CVE-2023-47520
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Michael Uno (miunosoft) Responsive Column Widgets plugin <= 1.2.7 versions.
References: https://patchstack.com/database/vulnerability/responsive-column-widgets/wordpress-responsive-column-widgets-plugin-1-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

110. CVE-2023-47522
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Photo Feed plugin <= 2.2.1 versions.
References: https://patchstack.com/database/vulnerability/photo-feed/wordpress-photo-feed-plugin-2-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

111. CVE-2023-48217
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Statamic is a flat-first, Laravel + Git powered CMS designed for building websites. In affected versions certain additional PHP files crafted to look like images may be uploaded regardless of mime type validation rules. This affects front-end forms using the "Forms" feature, and asset upload fields in the control panel. Malicious users could leverage this vulnerability to upload and execute code. This issue has been patched in versions 3.4.14 and 4.34.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References: https://github.com/statamic/cms/commit/4c6fe041e2203a8033e5949ce4a5d9d6c0ad2411
https://github.com/statamic/cms/security/advisories/GHSA-2r53-9295-3m86

CWE-ID: CWE-94
Common Platform Enumerations (CPE): Not Found

112. CVE-2023-45614
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.


References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

113. CVE-2023-45615
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.


References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

114. CVE-2023-45616
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: There is a buffer overflow vulnerability in the underlying AirWave client service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.


References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

115. CVE-2023-45617
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.2
Description: There are arbitrary file deletion vulnerabilities in the CLI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.


References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

116. CVE-2023-45618
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.2
Description: There are arbitrary file deletion vulnerabilities in the AirWave client service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.


References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

117. CVE-2023-45619
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.2
Description: There is an arbitrary file deletion vulnerability in the RSSI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.


References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

118. CVE-2023-45620
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.


References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

119. CVE-2023-45621
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.


References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

120. CVE-2023-45622
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the BLE daemon service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.


References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

121. CVE-2023-45623
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Wi-Fi Uplink service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.


References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

122. CVE-2023-45624
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: An unauthenticated Denial-of-Service (DoS) vulnerability exists in the soft ap daemon accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected access point.


References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

123. CVE-2023-45625
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: Multiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.


References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

124. CVE-2023-47517
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in SendPress Newsletters plugin <= 1.23.11.6 versions.
References: https://patchstack.com/database/vulnerability/sendpress/wordpress-sendpress-newsletters-plugin-1-22-3-31-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

125. CVE-2023-47518
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Matthew Muro Restrict Categories plugin <= 2.6.4 versions.
References: https://patchstack.com/database/vulnerability/restrict-categories/wordpress-restrict-categories-plugin-2-6-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

Previous Post Next Post

Contact Form