Latest Vulnerabilities Updates: AppSecWorld's CVE Daily Digest for November 16-17, 2023

In the dynamic realm of cybersecurity, staying updated on the latest vulnerabilities is imperative.
This edition of the AppSecWorld's CVE Daily Digest provides a snapshot of the vulnerabilities published in National Vulnerability Database between November 16-17, 2023.
During this period, The National Vulnerability Database published 123, and these new Common Vulnerabilities and Exposures (CVEs) are classified as follows:

Critical: 9
High: 42
Medium: 32
Low: 19
Severity Not Assigned: 21

Identifying and understanding these vulnerabilities are pivotal steps towards enhancing security measures and creating a safer digital environment.
Now, let's delve deeper into AppSecWorld's CVE Daily Digest, spotlighting the Critical and High Severity vulnerabilities that demand immediate attention.

1. CVE-2023-44296
Base Score: 8.4
Base Severity: HIGH
Exploitability Score: 2.5
Impact Score: 5.9
Description:
Dell ELab-Navigator, version 3.1.9 contains a hard-coded credential vulnerability. A local attacker could potentially exploit this vulnerability, leading to unauthorized access to sensitive data. Successful exploitation may result in the compromise of confidential user information.


References: https://www.dell.com/support/kbdoc/en-us/000219558/dsa-2023-419-security-update-for-mobility-e-lab-navigator-vulnerabilities

CWE-ID: CWE-798
Common Platform Enumerations (CPE): Not Found

2. CVE-2023-32469
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 0.8
Impact Score: 6.0
Description:
Dell Precision Tower BIOS contains an Improper Input Validation vulnerability. A locally authenticated malicious user with admin privileges could potentially exploit this vulnerability to perform arbitrary code execution.


References: https://www.dell.com/support/kbdoc/en-us/000216242/dsa-2023-223-security-update-for-a-dell-precision-tower-bios-vulnerability

CWE-ID: CWE-20
Common Platform Enumerations (CPE): Not Found

3. CVE-2023-39259
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 1.3
Impact Score: 5.9
Description:
Dell OS Recovery Tool, versions 2.2.4013, 2.3.7012.0, and 2.3.7515.0 contain an Improper Access Control Vulnerability. A local authenticated non-administrator user could potentially exploit this vulnerability, leading to the elevation of privilege on the system.


References: https://www.dell.com/support/kbdoc/en-us/000217078/dsa-2023-319dsa-2023-319

CWE-ID: CWE-284
Common Platform Enumerations (CPE): Not Found

4. CVE-2023-44336
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm

CWE-ID: CWE-416
Common Platform Enumerations (CPE): Not Found

5. CVE-2023-44337
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm

CWE-ID: CWE-125
Common Platform Enumerations (CPE): Not Found

6. CVE-2023-44338
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm

CWE-ID: CWE-125
Common Platform Enumerations (CPE): Not Found

7. CVE-2023-44359
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm

CWE-ID: CWE-416
Common Platform Enumerations (CPE): Not Found

8. CVE-2023-44365
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm

CWE-ID: CWE-824
Common Platform Enumerations (CPE): Not Found

9. CVE-2023-44366
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm

CWE-ID: CWE-787
Common Platform Enumerations (CPE): Not Found

10. CVE-2023-44367
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm

CWE-ID: CWE-416
Common Platform Enumerations (CPE): Not Found

11. CVE-2023-44371
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm

CWE-ID: CWE-416
Common Platform Enumerations (CPE): Not Found

12. CVE-2023-44372
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm

CWE-ID: CWE-416
Common Platform Enumerations (CPE): Not Found

13. CVE-2023-44330
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Photoshop versions 24.7.1 (and earlier) and 25.0 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/photoshop/apsb23-56.html

CWE-ID: CWE-787
Common Platform Enumerations (CPE): Not Found

14. CVE-2023-47040
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Media Encoder version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/media-encoder/apsb23-63.html

CWE-ID: CWE-125
Common Platform Enumerations (CPE): Not Found

15. CVE-2023-47041
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Media Encoder version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/media-encoder/apsb23-63.html

CWE-ID: CWE-787
Common Platform Enumerations (CPE): Not Found

16. CVE-2023-47042
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Media Encoder version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/media-encoder/apsb23-63.html

CWE-ID: CWE-122
Common Platform Enumerations (CPE): Not Found

17. CVE-2023-47043
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Media Encoder version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/media-encoder/apsb23-63.html

CWE-ID: CWE-125
Common Platform Enumerations (CPE): Not Found

18. CVE-2023-26368
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe InCopy versions 18.5 (and earlier) and 17.4.2 (and earlier) are affected by are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/incopy/apsb23-60.html

CWE-ID: CWE-125
Common Platform Enumerations (CPE): Not Found

19. CVE-2023-47046
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Audition version 24.0 (and earlier) and 23.6.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/audition/apsb23-64.html

CWE-ID: CWE-787
Common Platform Enumerations (CPE): Not Found

20. CVE-2023-47047
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Audition version 24.0 (and earlier) and 23.6.1 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/audition/apsb23-64.html

CWE-ID: CWE-824
Common Platform Enumerations (CPE): Not Found

21. CVE-2023-47048
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Audition version 24.0 (and earlier) and 23.6.1 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/audition/apsb23-64.html

CWE-ID: CWE-125
Common Platform Enumerations (CPE): Not Found

22. CVE-2023-47049
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Audition version 24.0 (and earlier) and 23.6.1 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/audition/apsb23-64.html

CWE-ID: CWE-125
Common Platform Enumerations (CPE): Not Found

23. CVE-2023-47050
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Audition version 24.0 (and earlier) and 23.6.1 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/audition/apsb23-64.html

CWE-ID: CWE-125
Common Platform Enumerations (CPE): Not Found

24. CVE-2023-47051
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Audition version 24.0 (and earlier) and 23.6.1 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/audition/apsb23-64.html

CWE-ID: CWE-122
Common Platform Enumerations (CPE): Not Found

25. CVE-2023-6015
Base Score: 10.0
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.8
Description: MLflow allowed arbitrary files to be PUT onto the server.
References: https://huntr.com/bounties/43e6fb72-676e-4670-a225-15d6836f65d3

CWE-ID: CWE-22
Common Platform Enumerations (CPE): Not Found

26. CVE-2023-6016
Base Score: 10.0
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 6.0
Description: An attacker is able to gain remote code execution on a server hosting the H2O dashboard through it's POJO model import feature.
References: https://huntr.com/bounties/83dd17ec-053e-453c-befb-7d6736bf1836

CWE-ID: CWE-94
Common Platform Enumerations (CPE): Not Found

27. CVE-2023-6018
Base Score: 10.0
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 6.0
Description: An attacker can overwrite any file on the server hosting MLflow without any authentication.
References: https://huntr.com/bounties/7cf918b5-43f4-48c0-a371-4d963ce69b30

CWE-ID: CWE-78
Common Platform Enumerations (CPE): Not Found

28. CVE-2023-6023
Base Score: 8.6
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.0
Description: An attacker can read any file on the filesystem on the server hosting ModelDB through an LFI in the artifact_path URL parameter.
References: https://huntr.com/bounties/644ab868-db6d-4685-ab35-1a897632d2ca

CWE-ID: CWE-29
Common Platform Enumerations (CPE): Not Found

29. CVE-2023-47055
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html

CWE-ID: CWE-416
Common Platform Enumerations (CPE): Not Found

30. CVE-2023-47056
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html

CWE-ID: CWE-122
Common Platform Enumerations (CPE): Not Found

31. CVE-2023-47057
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html

CWE-ID: CWE-787
Common Platform Enumerations (CPE): Not Found

32. CVE-2023-47058
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html

CWE-ID: CWE-125
Common Platform Enumerations (CPE): Not Found

33. CVE-2023-47059
Base Score: 7.8
Base Severity: HIGH
Exploitability Score: 1.8
Impact Score: 5.9
Description: Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References: https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html

CWE-ID: CWE-125
Common Platform Enumerations (CPE): Not Found

34. CVE-2023-6013
Base Score: 9.3
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 4.7
Description: H2O is vulnerable to stored XSS vulnerability which can lead to a Local File Include attack.
References: https://huntr.com/bounties/9881569f-dc2a-437e-86b0-20d4b70ae7af

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

35. CVE-2023-6017
Base Score: 8.7
Base Severity: HIGH
Exploitability Score: 2.3
Impact Score: 5.8
Description: H2O included a reference to an S3 bucket that no longer existed allowing an attacker to take over the S3 bucket URL.
References: https://huntr.com/bounties/6a69952f-a1ba-4dee-9d8c-e87f52508b58

CWE-ID: CWE-840
Common Platform Enumerations (CPE): Not Found

36. CVE-2023-6019
Base Score: 10.0
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 6.0
Description: A command injection exists in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication.
References: https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe

CWE-ID: CWE-78
Common Platform Enumerations (CPE): Not Found

37. CVE-2023-6021
Base Score: 9.3
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 4.7
Description: LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication.
References: https://huntr.com/bounties/5039c045-f986-4cbc-81ac-370fe4b0d3f8

CWE-ID: CWE-29
Common Platform Enumerations (CPE): Not Found

38. CVE-2023-6022
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: An attacker is able to steal secrets and potentially gain remote code execution via CSRF using the Prefect API.
References: https://huntr.com/bounties/dab47d99-551c-4355-9ab1-c99cb90235af

CWE-ID: CWE-352
Common Platform Enumerations (CPE): Not Found

39. CVE-2023-6038
Base Score: 9.3
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 4.7
Description: An attacker is able to read any file on the server hosting the H2O dashboard without any authentication.
References: https://huntr.com/bounties/380fce33-fec5-49d9-a101-12c972125d8c

CWE-ID: CWE-29
Common Platform Enumerations (CPE): Not Found

40. CVE-2023-47514
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in lawrenceowen, gcubero, acunnningham, fmahmood Star CloudPRNT for WooCommerce plugin <= 2.0.3 versions.
References: https://patchstack.com/database/vulnerability/star-cloudprnt-for-woocommerce/wordpress-star-cloudprnt-for-woocommerce-plugin-2-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

41. CVE-2023-47508
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Averta Master Slider Pro plugin <= 3.6.5 versions.
References: https://patchstack.com/database/vulnerability/masterslider/wordpress-master-slider-pro-plugin-3-6-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

42. CVE-2023-47509
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ioannup Edit WooCommerce Templates plugin <= 1.1.1 versions.
References: https://patchstack.com/database/vulnerability/woo-edit-templates/wordpress-edit-woocommerce-templates-plugin-1-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

43. CVE-2023-47512
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Gravity Master Product Enquiry for WooCommerce plugin <= 3.0 versions.
References: https://patchstack.com/database/vulnerability/gm-woocommerce-quote-popup/wordpress-product-enquiry-for-woocommerce-plugin-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

44. CVE-2023-28621
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wishfulthemes Raise Mag, Wishfulthemes Wishful Blog themes allows Reflected XSS.This issue affects Raise Mag: from n/a through 1.0.7; Wishful Blog: from n/a through 2.0.1.


References: https://patchstack.com/database/vulnerability/raise-mag/wordpress-raise-mag-theme-1-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve
https://patchstack.com/database/vulnerability/wishful-blog/wordpress-wishful-blog-theme-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

45. CVE-2023-32796
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Stored Cross-Site Scripting (XSS) vulnerability in MingoCommerce WooCommerce Product Enquiry plugin <= 2.3.4 versions.
References: https://patchstack.com/database/vulnerability/woo-product-enquiry/wordpress-woocommerce-product-enquiry-plugin-2-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

46. CVE-2023-34375
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in 10Web SEO by 10Web plugin <= 1.2.9 versions.
References: https://patchstack.com/database/vulnerability/seo-by-10web/wordpress-seo-by-10web-plugin-1-2-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

47. CVE-2023-39926
Base Score: 7.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 3.7
Description: Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Acurax Under Construction / Maintenance Mode from Acurax plugin <= 2.6 versions.
References: https://patchstack.com/database/vulnerability/coming-soon-maintenance-mode-from-acurax/wordpress-under-construction-maintenance-mode-from-acurax-plugin-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve

CWE-ID: CWE-79
Common Platform Enumerations (CPE): Not Found

48. CVE-2023-46214
Base Score: 8.0
Base Severity: HIGH
Exploitability Score: 1.3
Impact Score: 6.0
Description: In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance.
References: https://advisory.splunk.com/advisories/SVD-2023-1104

CWE-ID: CWE-91
Common Platform Enumerations (CPE): Not Found

49. CVE-2023-6014
Base Score: 9.1
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.2
Description: An attacker is able to arbitrarily create an account in MLflow bypassing any authentication requirment.
References: https://huntr.com/bounties/3e64df69-ddc2-463e-9809-d07c24dc1de4

CWE-ID: CWE-598
Common Platform Enumerations (CPE): Not Found

50. CVE-2023-6020
Base Score: 9.3
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 4.7
Description: LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication.
References: https://huntr.com/bounties/83dd8619-6dc3-4c98-8f1b-e620fedcd1f6

CWE-ID: CWE-598
Common Platform Enumerations (CPE): Not Found

51. CVE-2023-48222
Base Score: 8.1
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.2
Description: Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In affected versions access to two URLs used in both Rundeck Open Source and Process Automation products could allow authenticated users to access the URL path, which would allow access to view or delete jobs, without the necessary authorization checks. This issue has been addressed in version 4.17.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.


References: https://github.com/rundeck/rundeck/security/advisories/GHSA-phmw-jx86-x666

CWE-ID: CWE-862
Common Platform Enumerations (CPE): Not Found

Previous Post Next Post

Contact Form