In the dynamic realm of cybersecurity, staying updated on the latest vulnerabilities is imperative.
This edition of the AppSecWorld's CVE Daily Digest provides a snapshot of the vulnerabilities published in National Vulnerability Database between November 14-15, 2023.
During this period, The National Vulnerability Database published 343, and these new Common Vulnerabilities and Exposures (CVEs) are classified as follows:
Critical: 18
High: 107
Medium: 128
Low: 23
Severity Not Assigned: 67
Identifying and understanding these vulnerabilities are pivotal steps towards enhancing security measures and creating a safer digital environment.
Now, let's delve deeper into AppSecWorld's CVE Daily Digest, spotlighting the Critical and High Severity vulnerabilities that demand immediate attention.
1. CVE-2023-47665
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in edward_plainview Plainview Protect Passwords plugin <= 1.4 versions.
References: https://patchstack.com/database/vulnerability/plainview-protect-passwords/wordpress-plainview-protect-passwords-plugin-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
2. CVE-2023-47673
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Stefano Ottolenghi Post Pay Counter plugin <= 2.789 versions.
References: https://patchstack.com/database/vulnerability/post-pay-counter/wordpress-post-pay-counter-plugin-2-789-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
3. CVE-2023-47684
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ThemePunch OHG Essential Grid plugin <= 3.1.0 versions.
References: https://patchstack.com/database/vulnerability/essential-grid/wordpress-essential-grid-plugin-3-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
4. CVE-2023-31403
Base Score: 9.6
Base Severity: CRITICAL
Exploitability Score: 2.8
Impact Score: 6.0
Description: SAP Business One installation - version 10.0, does not perform proper authentication and authorization checks for SMB shared folder. As a result, any malicious user can read and write to the SMB shared folder. Additionally, the files in the folder can be executed or be used by the installation process leading to considerable impact on confidentiality, integrity and availability.
References: https://me.sap.com/notes/3355658
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
5. CVE-2023-47629
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: DataHub is an open-source metadata platform. In affected versions sign-up through an invite link does not properly restrict users from signing up as privileged accounts. If a user is given an email sign-up link they can potentially create an admin account given certain preconditions. If the default datahub user has been removed, then the user can sign up for an account that leverages the default policies giving admin privileges to the datahub user. All DataHub instances prior to the patch that have removed the datahub user, but not the default policies applying to that user are affected. Users are advised to update to version 0.12.1 which addresses the issue. There are no known workarounds for this vulnerability.
References: https://github.com/datahub-project/datahub/security/advisories/GHSA-vj59-23ww-p6c8
CWE-ID: CWE-269
Common Platform Enumerations (CPE): Not Found
6. CVE-2023-24585
Base Score: 7.7
Base Severity: HIGH
Exploitability Score: 2.2
Impact Score: 5.5
Description: An out-of-bounds write vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1725
CWE-ID: CWE-119
Common Platform Enumerations (CPE): Not Found
7. CVE-2023-25181
Base Score: 9.0
Base Severity: CRITICAL
Exploitability Score: 2.2
Impact Score: 6.0
Description: A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted set of network packets can lead to arbitrary code execution. An attacker can send a malicious packet to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1726
CWE-ID: CWE-122
Common Platform Enumerations (CPE): Not Found
8. CVE-2023-27882
Base Score: 9.0
Base Severity: CRITICAL
Exploitability Score: 2.2
Impact Score: 6.0
Description: A heap-based buffer overflow vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1733
CWE-ID: CWE-122
Common Platform Enumerations (CPE): Not Found
9. CVE-2023-28379
Base Score: 9.0
Base Severity: CRITICAL
Exploitability Score: 2.2
Impact Score: 6.0
Description: A memory corruption vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1738
CWE-ID: CWE-119
Common Platform Enumerations (CPE): Not Found
10. CVE-2023-28391
Base Score: 9.0
Base Severity: CRITICAL
Exploitability Score: 2.2
Impact Score: 6.0
Description: A memory corruption vulnerability exists in the HTTP Server header parsing functionality of Weston Embedded uC-HTTP v3.01.01. Specially crafted network packets can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1732
CWE-ID: CWE-119
Common Platform Enumerations (CPE): Not Found
11. CVE-2023-31247
Base Score: 9.0
Base Severity: CRITICAL
Exploitability Score: 2.2
Impact Score: 6.0
Description: A memory corruption vulnerability exists in the HTTP Server Host header parsing functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1746
CWE-ID: CWE-119
Common Platform Enumerations (CPE): Not Found
12. CVE-2023-43504
Base Score: 9.6
Base Severity: CRITICAL
Exploitability Score: 2.8
Impact Score: 6.0
Description: A vulnerability has been identified in COMOS (All versions < V10.4.4). Ptmcast executable used for testing cache validation service in affected application is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf
CWE-ID: CWE-120
Common Platform Enumerations (CPE): Not Found
13. CVE-2023-43505
Base Score: 9.6
Base Severity: CRITICAL
Exploitability Score: 3.1
Impact Score: 5.8
Description: A vulnerability has been identified in COMOS (All versions). The affected application lacks proper access controls in SMB shares. This could allow an attacker to access files that the user should not have access to.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
14. CVE-2023-44317
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected products do not properly validate the content of uploaded X509 certificates which could allow an attacker with administrative privileges to execute arbitrary code on the device.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf
CWE-ID: CWE-349
Common Platform Enumerations (CPE): Not Found
15. CVE-2023-44373
Base Score: 9.1
Base Severity: CRITICAL
Exploitability Score: 2.3
Impact Score: 6.0
Description: A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf
CWE-ID: CWE-74
Common Platform Enumerations (CPE): Not Found
16. CVE-2023-46098
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: A vulnerability has been identified in SIMATIC PCS neo (All versions < V4.1). When accessing the Information Server from affected products, the products use an overly permissive CORS policy. This could allow an attacker to trick a legitimate user to trigger unwanted behavior.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-456933.pdf
CWE-ID: CWE-942
Common Platform Enumerations (CPE): Not Found
17. CVE-2023-46590
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: A vulnerability has been identified in Siemens OPC UA Modelling Editor (SiOME) (All versions < V2.8). Affected products suffer from a XML external entity (XXE) injection vulnerability. This vulnerability could allow an attacker to interfere with an application's processing of XML data and read arbitrary files in the system.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-197270.pdf
CWE-ID: CWE-611
Common Platform Enumerations (CPE): Not Found
18. CVE-2023-46601
Base Score: 9.6
Base Severity: CRITICAL
Exploitability Score: 3.1
Impact Score: 5.8
Description: A vulnerability has been identified in COMOS (All versions). The affected application lacks proper access controls in making the SQLServer connection. This could allow an attacker to query the database directly to access information that the user should not have access to.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
19. CVE-2023-6111
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.
The function nft_trans_gc_catchall did not remove the catchall set element from the catchall_list when the argument sync is true, making it possible to free a catchall set element many times.
We recommend upgrading past commit 93995bf4af2c5a99e2a87f0cd5ce547d31eb7630.
References: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93995bf4af2c5a99e2a87f0cd5ce547d31eb7630
https://kernel.dance/93995bf4af2c5a99e2a87f0cd5ce547d31eb7630
CWE-ID: CWE-416
Common Platform Enumerations (CPE): Not Found
20. CVE-2023-6130
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 1.6
Impact Score: 5.9
Description: Path Traversal: '\..\filename' in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.
References: https://github.com/salesagility/suitecrm/commit/54bc56c3bd9f1db75408db1c1d7d652c3f5f71e9
https://huntr.com/bounties/22a27be9-f016-4daf-9887-c77eb3e1dc74
CWE-ID: CWE-29
Common Platform Enumerations (CPE): Not Found
21. CVE-2023-6131
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: Code Injection in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.
References: https://github.com/salesagility/suitecrm/commit/54bc56c3bd9f1db75408db1c1d7d652c3f5f71e9
https://huntr.com/bounties/5fa50b25-f6b1-408c-99df-4442c86c563f
CWE-ID: CWE-94
Common Platform Enumerations (CPE): Not Found
22. CVE-2023-26205
Base Score: 8.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.2
Description: An improper access control vulnerability [CWE-284] in FortiADC automation feature 7.1.0 through 7.1.2, 7.0 all versions, 6.2 all versions, 6.1 all versions may allow an authenticated low-privileged attacker to escalate their privileges to super_admin via a specific crafted configuration of fabric automation CLI script.
References: https://fortiguard.com/psirt/FG-IR-22-292
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
23. CVE-2023-34991
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.0 through 8.4.2 and 8.3.0 through 8.3.2 and 8.2.2 allows attacker to execute unauthorized code or commands via a crafted http request.
References: https://fortiguard.com/psirt/FG-IR-23-142
CWE-ID: CWE-89
Common Platform Enumerations (CPE): Not Found
24. CVE-2023-36017
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Windows Scripting Engine Memory Corruption Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36017
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
25. CVE-2023-36018
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Visual Studio Code Jupyter Extension Spoofing Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36018
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
26. CVE-2023-36021
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: Microsoft On-Prem Data Gateway Security Feature Bypass Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36021
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
27. CVE-2023-36025
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Windows SmartScreen Security Feature Bypass Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36025
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
28. CVE-2023-36028
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36028
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
29. CVE-2023-36031
Base Score: 7.6
Base Severity: HIGH
Exploitability Score: 2.3
Impact Score: 4.7
Description: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36031
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
30. CVE-2023-36033
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows DWM Core Library Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36033
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
31. CVE-2023-36035
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: Microsoft Exchange Server Spoofing Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36035
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
32. CVE-2023-36036
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36036
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
33. CVE-2023-36037
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Microsoft Excel Security Feature Bypass Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36037
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
34. CVE-2023-36039
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: Microsoft Exchange Server Spoofing Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36039
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
35. CVE-2023-36041
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Microsoft Excel Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36041
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
36. CVE-2023-36045
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Microsoft Office Graphics Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36045
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
37. CVE-2023-36046
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.2
Description: Windows Authentication Denial of Service Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36046
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
38. CVE-2023-36047
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Authentication Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36047
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
39. CVE-2023-36050
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: Microsoft Exchange Server Spoofing Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36050
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
40. CVE-2023-36052
Base Score: 8.6
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.0
Description: Azure CLI REST Command Information Disclosure Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36052
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
41. CVE-2023-36392
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: DHCP Server Service Denial of Service Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36392
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
42. CVE-2023-36393
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows User Interface Application Core Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36393
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
43. CVE-2023-36394
Base Score: 7.0
Base Severity: HIGH
Exploitability Score: 1.0
Impact Score: 5.9
Description: Windows Search Service Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36394
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
44. CVE-2023-36395
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Windows Deployment Services Denial of Service Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36395
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
45. CVE-2023-36396
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Compressed Folder Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36396
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
46. CVE-2023-36397
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36397
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
47. CVE-2023-36399
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.2
Description: Windows Storage Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36399
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
48. CVE-2023-36400
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.0
Impact Score: 6.0
Description: Windows HMAC Key Derivation Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36400
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
49. CVE-2023-36401
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: Microsoft Remote Registry Service Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36401
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
50. CVE-2023-36402
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36402
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
51. CVE-2023-36403
Base Score: 7.0
Base Severity: HIGH
Exploitability Score: 1.0
Impact Score: 5.9
Description: Windows Kernel Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36403
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
52. CVE-2023-36405
Base Score: 7.0
Base Severity: HIGH
Exploitability Score: 1.0
Impact Score: 5.9
Description: Windows Kernel Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36405
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
53. CVE-2023-36407
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Hyper-V Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36407
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
54. CVE-2023-36408
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Hyper-V Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36408
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
55. CVE-2023-36410
Base Score: 7.6
Base Severity: HIGH
Exploitability Score: 2.3
Impact Score: 4.7
Description: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36410
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
56. CVE-2023-36422
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Microsoft Windows Defender Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36422
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
57. CVE-2023-36423
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: Microsoft Remote Registry Service Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36423
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
58. CVE-2023-36424
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Common Log File System Driver Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36424
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
59. CVE-2023-36425
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 1.3
Impact Score: 6.0
Description: Windows Distributed File System (DFS) Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36425
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
60. CVE-2023-36427
Base Score: 7.0
Base Severity: HIGH
Exploitability Score: 1.0
Impact Score: 5.9
Description: Windows Hyper-V Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36427
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
61. CVE-2023-36439
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: Microsoft Exchange Server Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36439
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
62. CVE-2023-36553
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 and 5.0.0 through 5.0.1 and 4.10.0 and 4.9.0 and 4.7.2 allows attacker to execute unauthorized code or commands via crafted API requests.
References: https://fortiguard.com/psirt/FG-IR-23-135
CWE-ID: CWE-78
Common Platform Enumerations (CPE): Not Found
63. CVE-2023-36560
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: ASP.NET Security Feature Bypass Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36560
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
64. CVE-2023-36705
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Installer Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36705
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
65. CVE-2023-36719
Base Score: 8.4
Base Severity: HIGH
Exploitability Score: 2.5
Impact Score: 5.9
Description: Microsoft Speech Application Programming Interface (SAPI) Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36719
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
66. CVE-2023-38151
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Microsoft Host Integration Server 2020 Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38151
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
67. CVE-2023-41840
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: A untrusted search path vulnerability in Fortinet FortiClientWindows 7.0.9 allows an attacker to perform a DLL Hijack attack via a malicious OpenSSL engine library in the search path.
References: https://fortiguard.com/psirt/FG-IR-23-274
CWE-ID: CWE-426
Common Platform Enumerations (CPE): Not Found
68. CVE-2023-42783
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.2 through 8.4.0 and 8.3.2 through 8.3.0 and 8.2.2 allows attacker to read arbitrary files via crafted http requests.
References: https://fortiguard.com/psirt/FG-IR-23-143
CWE-ID: CWE-23
Common Platform Enumerations (CPE): Not Found
69. CVE-2022-24379
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: Improper input validation in some Intel(R) Server System M70KLP Family BIOS firmware before version 01.04.0029 may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
70. CVE-2022-29262
Base Score: 7.9
Base Severity: HIGH
Exploitability Score: 1.5
Impact Score: 5.8
Description: Improper buffer restrictions in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html
CWE-ID: CWE-92
Common Platform Enumerations (CPE): Not Found
71. CVE-2022-29510
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: Improper buffer restrictions in some Intel(R) Server Board M10JNP2SB BIOS firmware before version 7.219 may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html
CWE-ID: CWE-92
Common Platform Enumerations (CPE): Not Found
72. CVE-2022-33945
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 1.5
Impact Score: 6.0
Description: Improper input validation in some Intel(R) Server board and Intel(R) Server System BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
73. CVE-2022-36374
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools before version iDmi Windows 5.27.03.0003 may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
74. CVE-2022-36396
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 1.5
Impact Score: 6.0
Description: Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools before version iDmiEdit-Linux-5.27.06.0017 may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
75. CVE-2022-40681
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.2
Description: A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to cause denial of service via sending a crafted request to a specific named pipe.
References: https://fortiguard.com/psirt/FG-IR-22-299
CWE-ID: CWE-863
Common Platform Enumerations (CPE): Not Found
76. CVE-2022-41689
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 1.3
Impact Score: 5.9
Description: Improper access control in some Intel In-Band Manageability software before version 3.0.14 may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00968.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
77. CVE-2023-22285
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Improper access control for some Intel Unison software may allow an unauthenticated user to potentially enable denial of service via network access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
78. CVE-2023-22292
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.5
Description: Uncaught exception for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html
CWE-ID: CWE-248
Common Platform Enumerations (CPE): Not Found
79. CVE-2023-22337
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Improper input validation for some Intel Unison software may allow an unauthenticated user to potentially enable denial of service via network access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
80. CVE-2023-23583
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.0
Impact Score: 6.0
Description: Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
References: http://www.openwall.com/lists/oss-security/2023/11/14/4
http://www.openwall.com/lists/oss-security/2023/11/14/5
http://www.openwall.com/lists/oss-security/2023/11/14/6
http://www.openwall.com/lists/oss-security/2023/11/14/7
http://www.openwall.com/lists/oss-security/2023/11/14/8
http://www.openwall.com/lists/oss-security/2023/11/14/9
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html
CWE-ID: CWE-1281
Common Platform Enumerations (CPE): Not Found
81. CVE-2023-24592
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 1.3
Impact Score: 5.9
Description: Path traversal in the some Intel(R) oneAPI Toolkits and Component software before version 2023.1 may allow authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html
CWE-ID: CWE-22
Common Platform Enumerations (CPE): Not Found
82. CVE-2023-28397
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated to potentially enable escalation of privileges via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
83. CVE-2023-28737
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.0
Impact Score: 6.0
Description: Improper initialization in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html
CWE-ID: CWE-665
Common Platform Enumerations (CPE): Not Found
84. CVE-2023-28741
Base Score: 7.9
Base Severity: HIGH
Exploitability Score: 1.5
Impact Score: 5.8
Description: Buffer overflow in some Intel(R) QAT drivers for Windows - HW Version 1.0 before version 1.10 may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00861.html
CWE-ID: CWE-120
Common Platform Enumerations (CPE): Not Found
85. CVE-2023-29157
Base Score: 8.4
Base Severity: HIGH
Exploitability Score: 2.0
Impact Score: 5.8
Description: Improper access control in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00900.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
86. CVE-2023-31273
Base Score: 10.0
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 6.0
Description: Protection mechanism failure in some Intel DCM software before version 5.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00902.html
CWE-ID: CWE-693
Common Platform Enumerations (CPE): Not Found
87. CVE-2023-32204
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.0
Impact Score: 6.0
Description: Improper access control in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00900.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
88. CVE-2023-32279
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Improper access control in user mode driver for some Intel(R) Connectivity Performance Suite before version 2.1123.214.2 may allow unauthenticated user to potentially enable information disclosure via network access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00944.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
89. CVE-2023-32641
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 0.9
Impact Score: 5.8
Description: Improper input validation in firmware for Intel(R) QAT before version QAT20.L.1.0.40-00004 may allow escalation of privilege and denial of service via adjacent access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00945.html
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
90. CVE-2023-32701
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.2
Description: Improper Input Validation in the Networking Stack of QNX SDP version(s) 6.6, 7.0, and 7.1 could allow an attacker to potentially cause Information Disclosure or a Denial-of-Service condition.
References: https://support.blackberry.com/kb/articleDetail?articleNumber=000112401
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
91. CVE-2023-34431
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 1.5
Impact Score: 6.0
Description: Improper input validation in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
92. CVE-2023-36860
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 4.2
Description: Improper input validation for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via network access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
93. CVE-2023-26222
Base Score: 8.7
Base Severity: HIGH
Exploitability Score: 2.3
Impact Score: 5.8
Description: The Web Application component of TIBCO Software Inc.'s TIBCO EBX and TIBCO Product and Service Catalog powered by TIBCO EBX contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a stored XSS on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO EBX: versions 5.9.22 and below, versions 6.0.13 and below and TIBCO Product and Service Catalog powered by TIBCO EBX: versions 5.0.0 and below.
References: https://www.tibco.com/services/support/advisories
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
94. CVE-2023-47550
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Cross-Site Request Forgery (CSRF) vulnerability in RedNao Donations Made Easy – Smart Donations allows Stored XSS.This issue affects Donations Made Easy – Smart Donations: from n/a through 4.0.12.
References: https://patchstack.com/database/vulnerability/smart-donations/wordpress-donations-made-easy-smart-donations-plugin-4-0-12-cross-site-scripting-xss-vulnerability-2?_s_id=cve
CWE-ID: CWE-352
Common Platform Enumerations (CPE): Not Found
95. CVE-2023-36007
Base Score: 7.6
Base Severity: HIGH
Exploitability Score: 2.3
Impact Score: 4.7
Description: Microsoft Send Customer Voice survey from Dynamics 365 Spoofing Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36007
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
96. CVE-2023-36049
Base Score: 7.6
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 4.7
Description: .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36049
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
97. CVE-2023-36437
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Azure DevOps Server Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36437
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
98. CVE-2023-46132
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 4.2
Description: Hyperledger Fabric is an open source permissioned distributed ledger framework. Combining two molecules to one another, called "cross-linking" results in a molecule with a chemical formula that is composed of all atoms of the original two molecules. In Fabric, one can take a block of transactions and cross-link the transactions in a way that alters the way the peers parse the transactions. If a first peer receives a block B and a second peer receives a block identical to B but with the transactions being cross-linked, the second peer will parse transactions in a different way and thus its world state will deviate from the first peer. Orderers or peers cannot detect that a block has its transactions cross-linked, because there is a vulnerability in the way Fabric hashes the transactions of blocks. It simply and naively concatenates them, which is insecure and lets an adversary craft a "cross-linked block" (block with cross-linked transactions) which alters the way peers process transactions. For example, it is possible to select a transaction and manipulate a peer to completely avoid processing it, without changing the computed hash of the block. Additional validations have been added in v2.2.14 and v2.5.5 to detect potential cross-linking issues before processing blocks. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References: https://github.com/hyperledger/fabric/security/advisories/GHSA-v9w2-543f-h69m
CWE-ID: CWE-362
Common Platform Enumerations (CPE): Not Found
99. CVE-2023-47130
Base Score: 8.1
Base Severity: HIGH
Exploitability Score: 2.2
Impact Score: 5.9
Description: Yii is an open source PHP web framework. yiisoft/yii before version 1.1.29 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. An attacker may leverage this vulnerability to compromise the host system. A fix has been developed for the 1.1.29 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References: https://github.com/yiisoft/yii/commit/37142be4dc5831114a375392e86d6450d4951c06
https://github.com/yiisoft/yii/security/advisories/GHSA-mw2w-2hj2-fg8q
https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection
CWE-ID: CWE-502
Common Platform Enumerations (CPE): Not Found
100. CVE-2023-47544
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Atarim Visual Website Collaboration, Feedback & Project Management – Atarim plugin <= 3.12 versions.
References: https://patchstack.com/database/vulnerability/atarim-visual-collaboration/wordpress-atarim-plugin-3-11-unauthenticated-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
101. CVE-2023-47547
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPFactory Products, Order & Customers Export for WooCommerce plugin <= 2.0.7 versions.
References: https://patchstack.com/database/vulnerability/export-woocommerce/wordpress-products-order-customers-export-for-woocommerce-plugin-2-0-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
102. CVE-2023-47630
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: Kyverno is a policy engine designed for Kubernetes. An issue was found in Kyverno that allowed an attacker to control the digest of images used by Kyverno users. The issue would require the attacker to compromise the registry that the Kyverno users fetch their images from. The attacker could then return an vulnerable image to the the user and leverage that to further escalate their position. As such, the attacker would need to know which images the Kyverno user consumes and know of one of multiple exploitable vulnerabilities in previous digests of the images. Alternatively, if the attacker has compromised the registry, they could craft a malicious image with a different digest with intentionally placed vulnerabilities and deliver the image to the user. Users pulling their images by digests and from trusted registries are not impacted by this vulnerability. There is no evidence of this being exploited in the wild. The issue has been patched in 1.10.5. All users are advised to upgrade. There are no known workarounds for this vulnerability.
References: https://github.com/kyverno/kyverno/security/advisories/GHSA-3hfq-cx9j-923w
CWE-ID: CWE-345
Common Platform Enumerations (CPE): Not Found
103. CVE-2023-47631
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: vantage6 is a framework to manage and deploy privacy enhancing technologies like Federated Learning (FL) and Multi-Party Computation (MPC). In affected versions a node does not check if an image is allowed to run if a `parent_id` is set. A malicious party that breaches the server may modify it to set a fake `parent_id` and send a task of a non-whitelisted algorithm. The node will then execute it because the `parent_id` that is set prevents checks from being run. This impacts all servers that are breached by an expert user. This vulnerability has been patched in version 4.1.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.
References: https://github.com/vantage6/vantage6/blob/version/4.1.1/vantage6-node/vantage6/node/docker/docker_manager.py#L265-L268
https://github.com/vantage6/vantage6/commit/bf83521eb12fa80aa5fc92ef1692010a9a7f8243
https://github.com/vantage6/vantage6/security/advisories/GHSA-vc3v-ppc7-v486
CWE-ID: CWE-345
Common Platform Enumerations (CPE): Not Found
104. CVE-2023-5528
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.
References: https://github.com/kubernetes/kubernetes/issues/121879
https://groups.google.com/g/kubernetes-security-announce/c/SL_d4NR8pzA
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
105. CVE-2023-36038
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.2
Description: ASP.NET Core Denial of Service Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36038
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
106. CVE-2023-39535
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
References: https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023008.pdf
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
107. CVE-2023-39536
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
References: https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023008.pdf
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
108. CVE-2023-39537
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
References: https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023008.pdf
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
109. CVE-2023-47520
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Michael Uno (miunosoft) Responsive Column Widgets plugin <= 1.2.7 versions.
References: https://patchstack.com/database/vulnerability/responsive-column-widgets/wordpress-responsive-column-widgets-plugin-1-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
110. CVE-2023-47522
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Photo Feed plugin <= 2.2.1 versions.
References: https://patchstack.com/database/vulnerability/photo-feed/wordpress-photo-feed-plugin-2-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
111. CVE-2023-48217
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Statamic is a flat-first, Laravel + Git powered CMS designed for building websites. In affected versions certain additional PHP files crafted to look like images may be uploaded regardless of mime type validation rules. This affects front-end forms using the "Forms" feature, and asset upload fields in the control panel. Malicious users could leverage this vulnerability to upload and execute code. This issue has been patched in versions 3.4.14 and 4.34.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References: https://github.com/statamic/cms/commit/4c6fe041e2203a8033e5949ce4a5d9d6c0ad2411
https://github.com/statamic/cms/security/advisories/GHSA-2r53-9295-3m86
CWE-ID: CWE-94
Common Platform Enumerations (CPE): Not Found
112. CVE-2023-45614
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
113. CVE-2023-45615
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
114. CVE-2023-45616
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: There is a buffer overflow vulnerability in the underlying AirWave client service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
115. CVE-2023-45617
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.2
Description: There are arbitrary file deletion vulnerabilities in the CLI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
116. CVE-2023-45618
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.2
Description: There are arbitrary file deletion vulnerabilities in the AirWave client service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
117. CVE-2023-45619
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.2
Description: There is an arbitrary file deletion vulnerability in the RSSI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
118. CVE-2023-45620
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
119. CVE-2023-45621
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
120. CVE-2023-45622
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the BLE daemon service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
121. CVE-2023-45623
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Wi-Fi Uplink service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
122. CVE-2023-45624
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: An unauthenticated Denial-of-Service (DoS) vulnerability exists in the soft ap daemon accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
123. CVE-2023-45625
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: Multiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
124. CVE-2023-47517
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in SendPress Newsletters plugin <= 1.23.11.6 versions.
References: https://patchstack.com/database/vulnerability/sendpress/wordpress-sendpress-newsletters-plugin-1-22-3-31-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
125. CVE-2023-47518
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Matthew Muro Restrict Categories plugin <= 2.6.4 versions.
References: https://patchstack.com/database/vulnerability/restrict-categories/wordpress-restrict-categories-plugin-2-6-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
This edition of the AppSecWorld's CVE Daily Digest provides a snapshot of the vulnerabilities published in National Vulnerability Database between November 14-15, 2023.
During this period, The National Vulnerability Database published 343, and these new Common Vulnerabilities and Exposures (CVEs) are classified as follows:
Critical: 18
High: 107
Medium: 128
Low: 23
Severity Not Assigned: 67
Identifying and understanding these vulnerabilities are pivotal steps towards enhancing security measures and creating a safer digital environment.
Now, let's delve deeper into AppSecWorld's CVE Daily Digest, spotlighting the Critical and High Severity vulnerabilities that demand immediate attention.
1. CVE-2023-47665
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in edward_plainview Plainview Protect Passwords plugin <= 1.4 versions.
References: https://patchstack.com/database/vulnerability/plainview-protect-passwords/wordpress-plainview-protect-passwords-plugin-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
2. CVE-2023-47673
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Stefano Ottolenghi Post Pay Counter plugin <= 2.789 versions.
References: https://patchstack.com/database/vulnerability/post-pay-counter/wordpress-post-pay-counter-plugin-2-789-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
3. CVE-2023-47684
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ThemePunch OHG Essential Grid plugin <= 3.1.0 versions.
References: https://patchstack.com/database/vulnerability/essential-grid/wordpress-essential-grid-plugin-3-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
4. CVE-2023-31403
Base Score: 9.6
Base Severity: CRITICAL
Exploitability Score: 2.8
Impact Score: 6.0
Description: SAP Business One installation - version 10.0, does not perform proper authentication and authorization checks for SMB shared folder. As a result, any malicious user can read and write to the SMB shared folder. Additionally, the files in the folder can be executed or be used by the installation process leading to considerable impact on confidentiality, integrity and availability.
References: https://me.sap.com/notes/3355658
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
5. CVE-2023-47629
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: DataHub is an open-source metadata platform. In affected versions sign-up through an invite link does not properly restrict users from signing up as privileged accounts. If a user is given an email sign-up link they can potentially create an admin account given certain preconditions. If the default datahub user has been removed, then the user can sign up for an account that leverages the default policies giving admin privileges to the datahub user. All DataHub instances prior to the patch that have removed the datahub user, but not the default policies applying to that user are affected. Users are advised to update to version 0.12.1 which addresses the issue. There are no known workarounds for this vulnerability.
References: https://github.com/datahub-project/datahub/security/advisories/GHSA-vj59-23ww-p6c8
CWE-ID: CWE-269
Common Platform Enumerations (CPE): Not Found
6. CVE-2023-24585
Base Score: 7.7
Base Severity: HIGH
Exploitability Score: 2.2
Impact Score: 5.5
Description: An out-of-bounds write vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1725
CWE-ID: CWE-119
Common Platform Enumerations (CPE): Not Found
7. CVE-2023-25181
Base Score: 9.0
Base Severity: CRITICAL
Exploitability Score: 2.2
Impact Score: 6.0
Description: A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted set of network packets can lead to arbitrary code execution. An attacker can send a malicious packet to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1726
CWE-ID: CWE-122
Common Platform Enumerations (CPE): Not Found
8. CVE-2023-27882
Base Score: 9.0
Base Severity: CRITICAL
Exploitability Score: 2.2
Impact Score: 6.0
Description: A heap-based buffer overflow vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1733
CWE-ID: CWE-122
Common Platform Enumerations (CPE): Not Found
9. CVE-2023-28379
Base Score: 9.0
Base Severity: CRITICAL
Exploitability Score: 2.2
Impact Score: 6.0
Description: A memory corruption vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1738
CWE-ID: CWE-119
Common Platform Enumerations (CPE): Not Found
10. CVE-2023-28391
Base Score: 9.0
Base Severity: CRITICAL
Exploitability Score: 2.2
Impact Score: 6.0
Description: A memory corruption vulnerability exists in the HTTP Server header parsing functionality of Weston Embedded uC-HTTP v3.01.01. Specially crafted network packets can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1732
CWE-ID: CWE-119
Common Platform Enumerations (CPE): Not Found
11. CVE-2023-31247
Base Score: 9.0
Base Severity: CRITICAL
Exploitability Score: 2.2
Impact Score: 6.0
Description: A memory corruption vulnerability exists in the HTTP Server Host header parsing functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1746
CWE-ID: CWE-119
Common Platform Enumerations (CPE): Not Found
12. CVE-2023-43504
Base Score: 9.6
Base Severity: CRITICAL
Exploitability Score: 2.8
Impact Score: 6.0
Description: A vulnerability has been identified in COMOS (All versions < V10.4.4). Ptmcast executable used for testing cache validation service in affected application is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf
CWE-ID: CWE-120
Common Platform Enumerations (CPE): Not Found
13. CVE-2023-43505
Base Score: 9.6
Base Severity: CRITICAL
Exploitability Score: 3.1
Impact Score: 5.8
Description: A vulnerability has been identified in COMOS (All versions). The affected application lacks proper access controls in SMB shares. This could allow an attacker to access files that the user should not have access to.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
14. CVE-2023-44317
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected products do not properly validate the content of uploaded X509 certificates which could allow an attacker with administrative privileges to execute arbitrary code on the device.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf
CWE-ID: CWE-349
Common Platform Enumerations (CPE): Not Found
15. CVE-2023-44373
Base Score: 9.1
Base Severity: CRITICAL
Exploitability Score: 2.3
Impact Score: 6.0
Description: A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf
CWE-ID: CWE-74
Common Platform Enumerations (CPE): Not Found
16. CVE-2023-46098
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: A vulnerability has been identified in SIMATIC PCS neo (All versions < V4.1). When accessing the Information Server from affected products, the products use an overly permissive CORS policy. This could allow an attacker to trick a legitimate user to trigger unwanted behavior.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-456933.pdf
CWE-ID: CWE-942
Common Platform Enumerations (CPE): Not Found
17. CVE-2023-46590
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: A vulnerability has been identified in Siemens OPC UA Modelling Editor (SiOME) (All versions < V2.8). Affected products suffer from a XML external entity (XXE) injection vulnerability. This vulnerability could allow an attacker to interfere with an application's processing of XML data and read arbitrary files in the system.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-197270.pdf
CWE-ID: CWE-611
Common Platform Enumerations (CPE): Not Found
18. CVE-2023-46601
Base Score: 9.6
Base Severity: CRITICAL
Exploitability Score: 3.1
Impact Score: 5.8
Description: A vulnerability has been identified in COMOS (All versions). The affected application lacks proper access controls in making the SQLServer connection. This could allow an attacker to query the database directly to access information that the user should not have access to.
References: https://cert-portal.siemens.com/productcert/pdf/ssa-137900.pdf
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
19. CVE-2023-6111
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.
The function nft_trans_gc_catchall did not remove the catchall set element from the catchall_list when the argument sync is true, making it possible to free a catchall set element many times.
We recommend upgrading past commit 93995bf4af2c5a99e2a87f0cd5ce547d31eb7630.
References: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93995bf4af2c5a99e2a87f0cd5ce547d31eb7630
https://kernel.dance/93995bf4af2c5a99e2a87f0cd5ce547d31eb7630
CWE-ID: CWE-416
Common Platform Enumerations (CPE): Not Found
20. CVE-2023-6130
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 1.6
Impact Score: 5.9
Description: Path Traversal: '\..\filename' in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.
References: https://github.com/salesagility/suitecrm/commit/54bc56c3bd9f1db75408db1c1d7d652c3f5f71e9
https://huntr.com/bounties/22a27be9-f016-4daf-9887-c77eb3e1dc74
CWE-ID: CWE-29
Common Platform Enumerations (CPE): Not Found
21. CVE-2023-6131
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: Code Injection in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.
References: https://github.com/salesagility/suitecrm/commit/54bc56c3bd9f1db75408db1c1d7d652c3f5f71e9
https://huntr.com/bounties/5fa50b25-f6b1-408c-99df-4442c86c563f
CWE-ID: CWE-94
Common Platform Enumerations (CPE): Not Found
22. CVE-2023-26205
Base Score: 8.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.2
Description: An improper access control vulnerability [CWE-284] in FortiADC automation feature 7.1.0 through 7.1.2, 7.0 all versions, 6.2 all versions, 6.1 all versions may allow an authenticated low-privileged attacker to escalate their privileges to super_admin via a specific crafted configuration of fabric automation CLI script.
References: https://fortiguard.com/psirt/FG-IR-22-292
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
23. CVE-2023-34991
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.0 through 8.4.2 and 8.3.0 through 8.3.2 and 8.2.2 allows attacker to execute unauthorized code or commands via a crafted http request.
References: https://fortiguard.com/psirt/FG-IR-23-142
CWE-ID: CWE-89
Common Platform Enumerations (CPE): Not Found
24. CVE-2023-36017
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Windows Scripting Engine Memory Corruption Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36017
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
25. CVE-2023-36018
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Visual Studio Code Jupyter Extension Spoofing Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36018
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
26. CVE-2023-36021
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: Microsoft On-Prem Data Gateway Security Feature Bypass Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36021
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
27. CVE-2023-36025
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Windows SmartScreen Security Feature Bypass Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36025
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
28. CVE-2023-36028
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36028
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
29. CVE-2023-36031
Base Score: 7.6
Base Severity: HIGH
Exploitability Score: 2.3
Impact Score: 4.7
Description: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36031
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
30. CVE-2023-36033
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows DWM Core Library Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36033
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
31. CVE-2023-36035
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: Microsoft Exchange Server Spoofing Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36035
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
32. CVE-2023-36036
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36036
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
33. CVE-2023-36037
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Microsoft Excel Security Feature Bypass Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36037
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
34. CVE-2023-36039
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: Microsoft Exchange Server Spoofing Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36039
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
35. CVE-2023-36041
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Microsoft Excel Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36041
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
36. CVE-2023-36045
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Microsoft Office Graphics Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36045
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
37. CVE-2023-36046
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.2
Description: Windows Authentication Denial of Service Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36046
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
38. CVE-2023-36047
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Authentication Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36047
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
39. CVE-2023-36050
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: Microsoft Exchange Server Spoofing Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36050
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
40. CVE-2023-36052
Base Score: 8.6
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.0
Description: Azure CLI REST Command Information Disclosure Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36052
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
41. CVE-2023-36392
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: DHCP Server Service Denial of Service Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36392
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
42. CVE-2023-36393
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows User Interface Application Core Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36393
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
43. CVE-2023-36394
Base Score: 7.0
Base Severity: HIGH
Exploitability Score: 1.0
Impact Score: 5.9
Description: Windows Search Service Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36394
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
44. CVE-2023-36395
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Windows Deployment Services Denial of Service Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36395
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
45. CVE-2023-36396
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Compressed Folder Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36396
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
46. CVE-2023-36397
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36397
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
47. CVE-2023-36399
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.2
Description: Windows Storage Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36399
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
48. CVE-2023-36400
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.0
Impact Score: 6.0
Description: Windows HMAC Key Derivation Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36400
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
49. CVE-2023-36401
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: Microsoft Remote Registry Service Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36401
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
50. CVE-2023-36402
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36402
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
51. CVE-2023-36403
Base Score: 7.0
Base Severity: HIGH
Exploitability Score: 1.0
Impact Score: 5.9
Description: Windows Kernel Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36403
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
52. CVE-2023-36405
Base Score: 7.0
Base Severity: HIGH
Exploitability Score: 1.0
Impact Score: 5.9
Description: Windows Kernel Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36405
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
53. CVE-2023-36407
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Hyper-V Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36407
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
54. CVE-2023-36408
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Hyper-V Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36408
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
55. CVE-2023-36410
Base Score: 7.6
Base Severity: HIGH
Exploitability Score: 2.3
Impact Score: 4.7
Description: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36410
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
56. CVE-2023-36422
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Microsoft Windows Defender Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36422
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
57. CVE-2023-36423
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: Microsoft Remote Registry Service Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36423
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
58. CVE-2023-36424
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Common Log File System Driver Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36424
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
59. CVE-2023-36425
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 1.3
Impact Score: 6.0
Description: Windows Distributed File System (DFS) Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36425
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
60. CVE-2023-36427
Base Score: 7.0
Base Severity: HIGH
Exploitability Score: 1.0
Impact Score: 5.9
Description: Windows Hyper-V Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36427
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
61. CVE-2023-36439
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 2.1
Impact Score: 5.9
Description: Microsoft Exchange Server Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36439
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
62. CVE-2023-36553
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 and 5.0.0 through 5.0.1 and 4.10.0 and 4.9.0 and 4.7.2 allows attacker to execute unauthorized code or commands via crafted API requests.
References: https://fortiguard.com/psirt/FG-IR-23-135
CWE-ID: CWE-78
Common Platform Enumerations (CPE): Not Found
63. CVE-2023-36560
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: ASP.NET Security Feature Bypass Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36560
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
64. CVE-2023-36705
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Windows Installer Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36705
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
65. CVE-2023-36719
Base Score: 8.4
Base Severity: HIGH
Exploitability Score: 2.5
Impact Score: 5.9
Description: Microsoft Speech Application Programming Interface (SAPI) Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36719
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
66. CVE-2023-38151
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Microsoft Host Integration Server 2020 Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38151
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
67. CVE-2023-41840
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: A untrusted search path vulnerability in Fortinet FortiClientWindows 7.0.9 allows an attacker to perform a DLL Hijack attack via a malicious OpenSSL engine library in the search path.
References: https://fortiguard.com/psirt/FG-IR-23-274
CWE-ID: CWE-426
Common Platform Enumerations (CPE): Not Found
68. CVE-2023-42783
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.2 through 8.4.0 and 8.3.2 through 8.3.0 and 8.2.2 allows attacker to read arbitrary files via crafted http requests.
References: https://fortiguard.com/psirt/FG-IR-23-143
CWE-ID: CWE-23
Common Platform Enumerations (CPE): Not Found
69. CVE-2022-24379
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: Improper input validation in some Intel(R) Server System M70KLP Family BIOS firmware before version 01.04.0029 may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
70. CVE-2022-29262
Base Score: 7.9
Base Severity: HIGH
Exploitability Score: 1.5
Impact Score: 5.8
Description: Improper buffer restrictions in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html
CWE-ID: CWE-92
Common Platform Enumerations (CPE): Not Found
71. CVE-2022-29510
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: Improper buffer restrictions in some Intel(R) Server Board M10JNP2SB BIOS firmware before version 7.219 may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html
CWE-ID: CWE-92
Common Platform Enumerations (CPE): Not Found
72. CVE-2022-33945
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 1.5
Impact Score: 6.0
Description: Improper input validation in some Intel(R) Server board and Intel(R) Server System BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
73. CVE-2022-36374
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools before version iDmi Windows 5.27.03.0003 may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
74. CVE-2022-36396
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 1.5
Impact Score: 6.0
Description: Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools before version iDmiEdit-Linux-5.27.06.0017 may allow a privileged user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
75. CVE-2022-40681
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.2
Description: A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to cause denial of service via sending a crafted request to a specific named pipe.
References: https://fortiguard.com/psirt/FG-IR-22-299
CWE-ID: CWE-863
Common Platform Enumerations (CPE): Not Found
76. CVE-2022-41689
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 1.3
Impact Score: 5.9
Description: Improper access control in some Intel In-Band Manageability software before version 3.0.14 may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00968.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
77. CVE-2023-22285
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Improper access control for some Intel Unison software may allow an unauthenticated user to potentially enable denial of service via network access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
78. CVE-2023-22292
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.5
Description: Uncaught exception for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html
CWE-ID: CWE-248
Common Platform Enumerations (CPE): Not Found
79. CVE-2023-22337
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Improper input validation for some Intel Unison software may allow an unauthenticated user to potentially enable denial of service via network access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
80. CVE-2023-23583
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.0
Impact Score: 6.0
Description: Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
References: http://www.openwall.com/lists/oss-security/2023/11/14/4
http://www.openwall.com/lists/oss-security/2023/11/14/5
http://www.openwall.com/lists/oss-security/2023/11/14/6
http://www.openwall.com/lists/oss-security/2023/11/14/7
http://www.openwall.com/lists/oss-security/2023/11/14/8
http://www.openwall.com/lists/oss-security/2023/11/14/9
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html
CWE-ID: CWE-1281
Common Platform Enumerations (CPE): Not Found
81. CVE-2023-24592
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 1.3
Impact Score: 5.9
Description: Path traversal in the some Intel(R) oneAPI Toolkits and Component software before version 2023.1 may allow authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html
CWE-ID: CWE-22
Common Platform Enumerations (CPE): Not Found
82. CVE-2023-28397
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated to potentially enable escalation of privileges via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
83. CVE-2023-28737
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.0
Impact Score: 6.0
Description: Improper initialization in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html
CWE-ID: CWE-665
Common Platform Enumerations (CPE): Not Found
84. CVE-2023-28741
Base Score: 7.9
Base Severity: HIGH
Exploitability Score: 1.5
Impact Score: 5.8
Description: Buffer overflow in some Intel(R) QAT drivers for Windows - HW Version 1.0 before version 1.10 may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00861.html
CWE-ID: CWE-120
Common Platform Enumerations (CPE): Not Found
85. CVE-2023-29157
Base Score: 8.4
Base Severity: HIGH
Exploitability Score: 2.0
Impact Score: 5.8
Description: Improper access control in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00900.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
86. CVE-2023-31273
Base Score: 10.0
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 6.0
Description: Protection mechanism failure in some Intel DCM software before version 5.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00902.html
CWE-ID: CWE-693
Common Platform Enumerations (CPE): Not Found
87. CVE-2023-32204
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.0
Impact Score: 6.0
Description: Improper access control in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00900.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
88. CVE-2023-32279
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Improper access control in user mode driver for some Intel(R) Connectivity Performance Suite before version 2.1123.214.2 may allow unauthenticated user to potentially enable information disclosure via network access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00944.html
CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found
89. CVE-2023-32641
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 0.9
Impact Score: 5.8
Description: Improper input validation in firmware for Intel(R) QAT before version QAT20.L.1.0.40-00004 may allow escalation of privilege and denial of service via adjacent access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00945.html
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
90. CVE-2023-32701
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.2
Description: Improper Input Validation in the Networking Stack of QNX SDP version(s) 6.6, 7.0, and 7.1 could allow an attacker to potentially cause Information Disclosure or a Denial-of-Service condition.
References: https://support.blackberry.com/kb/articleDetail?articleNumber=000112401
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
91. CVE-2023-34431
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 1.5
Impact Score: 6.0
Description: Improper input validation in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
92. CVE-2023-36860
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 4.2
Description: Improper input validation for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via network access.
References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00963.html
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
93. CVE-2023-26222
Base Score: 8.7
Base Severity: HIGH
Exploitability Score: 2.3
Impact Score: 5.8
Description: The Web Application component of TIBCO Software Inc.'s TIBCO EBX and TIBCO Product and Service Catalog powered by TIBCO EBX contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a stored XSS on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO EBX: versions 5.9.22 and below, versions 6.0.13 and below and TIBCO Product and Service Catalog powered by TIBCO EBX: versions 5.0.0 and below.
References: https://www.tibco.com/services/support/advisories
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
94. CVE-2023-47550
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Cross-Site Request Forgery (CSRF) vulnerability in RedNao Donations Made Easy – Smart Donations allows Stored XSS.This issue affects Donations Made Easy – Smart Donations: from n/a through 4.0.12.
References: https://patchstack.com/database/vulnerability/smart-donations/wordpress-donations-made-easy-smart-donations-plugin-4-0-12-cross-site-scripting-xss-vulnerability-2?_s_id=cve
CWE-ID: CWE-352
Common Platform Enumerations (CPE): Not Found
95. CVE-2023-36007
Base Score: 7.6
Base Severity: HIGH
Exploitability Score: 2.3
Impact Score: 4.7
Description: Microsoft Send Customer Voice survey from Dynamics 365 Spoofing Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36007
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
96. CVE-2023-36049
Base Score: 7.6
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 4.7
Description: .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36049
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
97. CVE-2023-36437
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Azure DevOps Server Remote Code Execution Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36437
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
98. CVE-2023-46132
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 4.2
Description: Hyperledger Fabric is an open source permissioned distributed ledger framework. Combining two molecules to one another, called "cross-linking" results in a molecule with a chemical formula that is composed of all atoms of the original two molecules. In Fabric, one can take a block of transactions and cross-link the transactions in a way that alters the way the peers parse the transactions. If a first peer receives a block B and a second peer receives a block identical to B but with the transactions being cross-linked, the second peer will parse transactions in a different way and thus its world state will deviate from the first peer. Orderers or peers cannot detect that a block has its transactions cross-linked, because there is a vulnerability in the way Fabric hashes the transactions of blocks. It simply and naively concatenates them, which is insecure and lets an adversary craft a "cross-linked block" (block with cross-linked transactions) which alters the way peers process transactions. For example, it is possible to select a transaction and manipulate a peer to completely avoid processing it, without changing the computed hash of the block. Additional validations have been added in v2.2.14 and v2.5.5 to detect potential cross-linking issues before processing blocks. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References: https://github.com/hyperledger/fabric/security/advisories/GHSA-v9w2-543f-h69m
CWE-ID: CWE-362
Common Platform Enumerations (CPE): Not Found
99. CVE-2023-47130
Base Score: 8.1
Base Severity: HIGH
Exploitability Score: 2.2
Impact Score: 5.9
Description: Yii is an open source PHP web framework. yiisoft/yii before version 1.1.29 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. An attacker may leverage this vulnerability to compromise the host system. A fix has been developed for the 1.1.29 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References: https://github.com/yiisoft/yii/commit/37142be4dc5831114a375392e86d6450d4951c06
https://github.com/yiisoft/yii/security/advisories/GHSA-mw2w-2hj2-fg8q
https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection
CWE-ID: CWE-502
Common Platform Enumerations (CPE): Not Found
100. CVE-2023-47544
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Atarim Visual Website Collaboration, Feedback & Project Management – Atarim plugin <= 3.12 versions.
References: https://patchstack.com/database/vulnerability/atarim-visual-collaboration/wordpress-atarim-plugin-3-11-unauthenticated-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
101. CVE-2023-47547
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPFactory Products, Order & Customers Export for WooCommerce plugin <= 2.0.7 versions.
References: https://patchstack.com/database/vulnerability/export-woocommerce/wordpress-products-order-customers-export-for-woocommerce-plugin-2-0-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
102. CVE-2023-47630
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: Kyverno is a policy engine designed for Kubernetes. An issue was found in Kyverno that allowed an attacker to control the digest of images used by Kyverno users. The issue would require the attacker to compromise the registry that the Kyverno users fetch their images from. The attacker could then return an vulnerable image to the the user and leverage that to further escalate their position. As such, the attacker would need to know which images the Kyverno user consumes and know of one of multiple exploitable vulnerabilities in previous digests of the images. Alternatively, if the attacker has compromised the registry, they could craft a malicious image with a different digest with intentionally placed vulnerabilities and deliver the image to the user. Users pulling their images by digests and from trusted registries are not impacted by this vulnerability. There is no evidence of this being exploited in the wild. The issue has been patched in 1.10.5. All users are advised to upgrade. There are no known workarounds for this vulnerability.
References: https://github.com/kyverno/kyverno/security/advisories/GHSA-3hfq-cx9j-923w
CWE-ID: CWE-345
Common Platform Enumerations (CPE): Not Found
103. CVE-2023-47631
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: vantage6 is a framework to manage and deploy privacy enhancing technologies like Federated Learning (FL) and Multi-Party Computation (MPC). In affected versions a node does not check if an image is allowed to run if a `parent_id` is set. A malicious party that breaches the server may modify it to set a fake `parent_id` and send a task of a non-whitelisted algorithm. The node will then execute it because the `parent_id` that is set prevents checks from being run. This impacts all servers that are breached by an expert user. This vulnerability has been patched in version 4.1.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.
References: https://github.com/vantage6/vantage6/blob/version/4.1.1/vantage6-node/vantage6/node/docker/docker_manager.py#L265-L268
https://github.com/vantage6/vantage6/commit/bf83521eb12fa80aa5fc92ef1692010a9a7f8243
https://github.com/vantage6/vantage6/security/advisories/GHSA-vc3v-ppc7-v486
CWE-ID: CWE-345
Common Platform Enumerations (CPE): Not Found
104. CVE-2023-5528
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.
References: https://github.com/kubernetes/kubernetes/issues/121879
https://groups.google.com/g/kubernetes-security-announce/c/SL_d4NR8pzA
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
105. CVE-2023-36038
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.2
Description: ASP.NET Core Denial of Service Vulnerability
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36038
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
106. CVE-2023-39535
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
References: https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023008.pdf
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
107. CVE-2023-39536
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
References: https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023008.pdf
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
108. CVE-2023-39537
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description: AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
References: https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023008.pdf
CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found
109. CVE-2023-47520
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Michael Uno (miunosoft) Responsive Column Widgets plugin <= 1.2.7 versions.
References: https://patchstack.com/database/vulnerability/responsive-column-widgets/wordpress-responsive-column-widgets-plugin-1-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
110. CVE-2023-47522
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Photo Feed plugin <= 2.2.1 versions.
References: https://patchstack.com/database/vulnerability/photo-feed/wordpress-photo-feed-plugin-2-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
111. CVE-2023-48217
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: Statamic is a flat-first, Laravel + Git powered CMS designed for building websites. In affected versions certain additional PHP files crafted to look like images may be uploaded regardless of mime type validation rules. This affects front-end forms using the "Forms" feature, and asset upload fields in the control panel. Malicious users could leverage this vulnerability to upload and execute code. This issue has been patched in versions 3.4.14 and 4.34.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References: https://github.com/statamic/cms/commit/4c6fe041e2203a8033e5949ce4a5d9d6c0ad2411
https://github.com/statamic/cms/security/advisories/GHSA-2r53-9295-3m86
CWE-ID: CWE-94
Common Platform Enumerations (CPE): Not Found
112. CVE-2023-45614
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
113. CVE-2023-45615
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
114. CVE-2023-45616
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: There is a buffer overflow vulnerability in the underlying AirWave client service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
115. CVE-2023-45617
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.2
Description: There are arbitrary file deletion vulnerabilities in the CLI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
116. CVE-2023-45618
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.2
Description: There are arbitrary file deletion vulnerabilities in the AirWave client service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
117. CVE-2023-45619
Base Score: 8.2
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.2
Description: There is an arbitrary file deletion vulnerability in the RSSI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
118. CVE-2023-45620
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
119. CVE-2023-45621
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
120. CVE-2023-45622
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the BLE daemon service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
121. CVE-2023-45623
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Wi-Fi Uplink service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
122. CVE-2023-45624
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: An unauthenticated Denial-of-Service (DoS) vulnerability exists in the soft ap daemon accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected access point.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
123. CVE-2023-45625
Base Score: 7.2
Base Severity: HIGH
Exploitability Score: 1.2
Impact Score: 5.9
Description: Multiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
References: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found
124. CVE-2023-47517
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in SendPress Newsletters plugin <= 1.23.11.6 versions.
References: https://patchstack.com/database/vulnerability/sendpress/wordpress-sendpress-newsletters-plugin-1-22-3-31-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found
125. CVE-2023-47518
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Matthew Muro Restrict Categories plugin <= 2.6.4 versions.
References: https://patchstack.com/database/vulnerability/restrict-categories/wordpress-restrict-categories-plugin-2-6-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found