Report Name: Linux Patch Wednesday December 2023
Generated: 2024-01-30 02:51:11

Vulristics Vulnerability Scores
Basic Vulnerability Scores
Products

Product NamePrevalenceUCHMLAComment
Kibana0.911Data visualization dashboard software
Linux Kernel0.941216The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
Chromium0.8121518Chromium is a free and open-source web browser project, mainly developed and maintained by Google
GNU C Library0.811The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library
Mozilla Firefox0.81010Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
OpenSSH0.811OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture
OpenSSL0.8112A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end
Safari0.82125Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
Kubernetes0.711Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management
Eclipse Mosquitto0.6112Eclipse Mosquitto provides a lightweight server implementation of the MQTT protocol that is suitable for all situations from full power machines to embedded and low power machines
Redis0.611Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability
Wireshark0.6112Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education
libxml20.611libxml2 is an XML toolkit implemented in C, originally developed for the GNOME Project
AFFLIB0.511Product detected by a:afflib_project:afflib (exists in CPE dict)
ActiveMQ0.511Product detected by a:apache:activemq (exists in CPE dict)
Amanda0.511Product detected by a:zmanda:amanda (exists in CPE dict)
Avro0.511Product detected by a:apache:avro (exists in CPE dict)
Crypto-js0.511Product detected by a:crypto-js_project:crypto-js (exists in CPE dict)
Curl0.5112Product detected by a:haxx:curl (exists in CPE dict)
FRRouting0.5314Free Range Routing or FRRouting or FRR is a network routing software suite running on Unix-like platforms, particularly Linux, Solaris, OpenBSD, FreeBSD and NetBSD
Fast DDS0.511Product detected by a:eprosima:fast_dds (exists in CPE dict)
Freeimage0.5123Product detected by a:freeimage_project:freeimage (exists in CPE dict)
Glusterfs0.511Product detected by a:gluster:glusterfs (exists in CPE dict)
GnuTLS0.511Product detected by a:gnu:gnutls (exists in CPE dict)
Guava0.511Product detected by a:google:guava (exists in CPE dict)
HID0.511HID
HTTP Server0.511Product detected by a:apache:http_server (exists in CPE dict)
Horizon0.511Product detected by a:openstack:horizon (exists in CPE dict)
InsydeH2O0.511Product detected by a:insyde:insydeh2o (exists in CPE dict)
OpenDKIM0.511Product detected by a:opendkim:opendkim (exists in CPE dict)
Opensc0.533Product detected by a:opensc_project:opensc (exists in CPE dict)
Pydantic0.511Product detected by a:pydantic_project:pydantic (exists in CPE dict)
RabbitMQ0.511Product detected by a:vmware:rabbitmq (exists in CPE dict)
SSHD0.511Product detected by a:apache:sshd (exists in CPE dict)
Squid0.522Product detected by a:squid-cache:squid (exists in CPE dict)
Symfony0.511Product detected by a:sensiolabs:symfony (exists in CPE dict)
Tracker Miners0.511Product detected by a:gnome:tracker_miners (exists in CPE dict)
X Server0.5112Product detected by a:x.org:x_server (exists in CPE dict)
ZBar0.522Product detected by a:zbar_project:zbar (exists in CPE dict)
avahi0.555Product detected by a:avahi:avahi (exists in CPE dict)
budgie_extras0.566Product detected by a:ubuntubudgie:budgie_extras (does NOT exist in CPE dict)
cryptography0.511Product detected by a:cryptography_project:cryptography (exists in CPE dict)
gevent0.511Product detected by a:gevent:gevent (does NOT exist in CPE dict)
grafana0.5112Product detected by a:grafana:grafana (exists in CPE dict)
haproxy0.511Product detected by a:haproxy:haproxy (exists in CPE dict)
iniparser0.511Product detected by a:iniparser_project:iniparser (does NOT exist in CPE dict)
keycloak0.5112Product detected by a:redhat:keycloak (exists in CPE dict)
libde2650.5213Product detected by a:struktur:libde265 (exists in CPE dict)
libreoffice0.522Product detected by a:libreoffice:libreoffice (exists in CPE dict)
libtiff0.5123Product detected by a:libtiff:libtiff (exists in CPE dict)
linux_kernel0.522Product detected by o:linux:linux_kernel (exists in CPE dict)
lwIP0.511Product detected by a:lwip_project:lwip (exists in CPE dict)
openvswitch0.511Product detected by a:openvswitch:openvswitch (exists in CPE dict)
openzfs0.511Product detected by a:openzfs:openzfs (exists in CPE dict)
perl0.5112Product detected by a:perl:perl (exists in CPE dict)
single_sign-on0.511Product detected by a:redhat:single_sign-on (exists in CPE dict)
smarty0.511Product detected by a:smarty:smarty (exists in CPE dict)
strongswan0.511Product detected by a:strongswan:strongswan (exists in CPE dict)
vim0.5279Product detected by a:vim:vim (exists in CPE dict)
wordpress0.5112Product detected by a:wordpress:wordpress (exists in CPE dict)
GPAC0.411GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity)
Artifex Ghostscript0.311Artifex Ghostscript is an interpreter for the PostScript® language and PDF files
Visual Studio Code0.3156Integrated development environment
Unknown Product011011Unknown Product


Vulnerability Types

Vulnerability TypeCriticalityUCHMLA
Remote Code Execution1.048416
Code Injection0.9711
Authentication Bypass0.951236
Security Feature Bypass0.9113914
Elevation of Privilege0.851337
Arbitrary File Reading0.8311
Information Disclosure0.8321012
Cross Site Scripting0.822
Open Redirect0.7511
Denial of Service0.7112435
Path Traversal0.722
Incorrect Calculation0.5111012
Memory Corruption0.572835
Spoofing0.433
Unknown Vulnerability Type061218


Comments

SourceUCHMLA
debian19309011141
ubuntu72161998
oraclelinux2629340
almalinux2426335
redhat4935452
redos2911


Vulnerabilities

Urgent (1)

1. Security Feature Bypass - ActiveMQ (CVE-2023-46604) - Urgent [898]

Description: The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV websites
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] Apache ActiveMQ Unauthenticated Remote Code Execution Exploit, [githubexploit] Exploit for Deserialization of Untrusted Data in Apache Activemq, [githubexploit] Exploit for Deserialization of Untrusted Data in Apache Activemq, [githubexploit] Exploit for Deserialization of Untrusted Data in Apache Activemq, [githubexploit] Exploit for Deserialization of Untrusted Data in Apache Activemq, [githubexploit] Exploit for Deserialization of Untrusted Data in Apache Activemq, [githubexploit] Exploit for Deserialization of Untrusted Data in Apache Activemq, [githubexploit] Exploit for Deserialization of Untrusted Data in Apache Activemq, [githubexploit] Exploit for Deserialization of Untrusted Data in Apache Activemq, [githubexploit] Exploit for Deserialization of Untrusted Data in Apache Activemq, [githubexploit] Exploit for Deserialization of Untrusted Data in Apache Activemq, [githubexploit] Exploit for Deserialization of Untrusted Data in Apache Activemq, [githubexploit] Exploit for Deserialization of Untrusted Data in Apache Activemq, [githubexploit] Exploit for Deserialization of Untrusted Data in Apache Activemq, [metasploit] Apache ActiveMQ Unauthenticated Remote Code Execution, [packetstorm] Apache ActiveMQ Unauthenticated Remote Code Execution)
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:apache:activemq (exists in CPE dict)
CVSS Base Score1.010CVSS Base Score is 10.0. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.97147, EPSS Percentile is 0.99762

debian: CVE-2023-46604 was patched at 2023-11-21, unknown date

Critical (10)

2. Information Disclosure - wordpress (CVE-2023-39999) - Critical [779]

Description: Exposure of Sensitive Information to an Unauthorized Actor in WordPress from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object), AttackerKB websites
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:patchstack.com website
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:wordpress:wordpress (exists in CPE dict)
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.710EPSS Probability is 0.00322, EPSS Percentile is 0.67643

debian: CVE-2023-39999 was patched at 2023-11-21, unknown date

3. Remote Code Execution - Safari (CVE-2023-42917) - Critical [692]

Description: A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV websites
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00137, EPSS Percentile is 0.49051

debian: CVE-2023-42917 was patched at 2023-12-11, unknown date

ubuntu: CVE-2023-42917 was patched at 2023-12-11

oraclelinux: CVE-2023-42917 was patched at 2023-12-13

almalinux: CVE-2023-42917 was patched at 2023-12-11

redhat: CVE-2023-42917 was patched at 2023-12-11

4. Security Feature Bypass - OpenSSH (CVE-2023-48795) - Critical [686]

Description: The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:www.terrapin-attack.com website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture
CVSS Base Score0.610CVSS Base Score is 5.9. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.69435, EPSS Percentile is 0.97721

debian: CVE-2023-48795 was patched at 2023-12-22, 2023-12-24, 2023-12-26, 2023-12-28, 2024-01-12, unknown date

ubuntu: CVE-2023-48795 was patched at 2023-12-19, 2024-01-11, 2024-01-15, 2024-01-18, 2024-01-25

redhat: CVE-2023-48795 was patched at 2024-01-25, 2024-01-29

5. Remote Code Execution - perl (CVE-2022-48522) - Critical [666]

Description: In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Product detected by a:perl:perl (exists in CPE dict)
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.710EPSS Probability is 0.00285, EPSS Percentile is 0.65472

debian: CVE-2022-48522 was patched at unknown date

ubuntu: CVE-2022-48522 was patched at 2023-11-27

6. Incorrect Calculation - Chromium (CVE-2023-6345) - Critical [663]

Description: Integer overflow in Skia in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), NVD:CISAKEV websites
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score1.010CVSS Base Score is 9.6. According to NVD data source
EPSS Percentile0.910EPSS Probability is 0.04266, EPSS Percentile is 0.91449

debian: CVE-2023-6345 was patched at 2023-11-30, unknown date

7. Remote Code Execution - Redis (CVE-2022-24834) - Critical [647]

Description: Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Integer Overflow to Buffer Overflow in Redis)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability
CVSS Base Score0.710CVSS Base Score is 7.0. According to NVD data source
EPSS Percentile0.710EPSS Probability is 0.00329, EPSS Percentile is 0.68011

debian: CVE-2022-24834 was patched at unknown date

ubuntu: CVE-2022-24834 was patched at 2023-12-05

8. Remote Code Execution - Tracker Miners (CVE-2023-5557) - Critical [642]

Description: A flaw was found in the tracker-miners package. A weakness in the sandbox allows a maliciously-crafted file to execute code outside the sandbox if the tracker-extract process has first been compromised by a separate vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:bugzilla.redhat.com website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Product detected by a:gnome:tracker_miners (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.710EPSS Probability is 0.0053, EPSS Percentile is 0.74627

debian: CVE-2023-5557 was patched at unknown date

ubuntu: CVE-2023-5557 was patched at 2023-11-22

oraclelinux: CVE-2023-5557 was patched at 2023-12-12, 2023-12-13

almalinux: CVE-2023-5557 was patched at 2023-12-11, 2023-12-12

redhat: CVE-2023-5557 was patched at 2023-12-11, 2023-12-12

9. Information Disclosure - Safari (CVE-2023-42916) - Critical [638]

Description: An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV websites
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.0013, EPSS Percentile is 0.47742

debian: CVE-2023-42916 was patched at 2023-12-11, unknown date

ubuntu: CVE-2023-42916 was patched at 2023-12-11

10. Elevation of Privilege - gevent (CVE-2023-41419) - Critical [627]

Description: An issue in Gevent before version 23.9.0 allows a remote attacker to escalate privileges via a crafted script to the WSGIServer component.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.514Product detected by a:gevent:gevent (does NOT exist in CPE dict)
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00178, EPSS Percentile is 0.55121

redhat: CVE-2023-41419 was patched at 2023-11-21

11. Authentication Bypass - openzfs (CVE-2013-20001) - Critical [622]

Description: An issue was discovered in OpenZFS through 2.0.3. When an NFS share is exported to IPv6 addresses via the sharenfs feature, there is a silent failure to parse the IPv6 address data, and access is allowed to everyone. IPv6 restrictions from the configuration are not applied.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.514Product detected by a:openzfs:openzfs (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00195, EPSS Percentile is 0.57447

debian: CVE-2013-20001 was patched at unknown date

ubuntu: CVE-2013-20001 was patched at 2023-11-23

High (35)

12. Elevation of Privilege - Linux Kernel (CVE-2023-46813) - High [599]

Description: An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for CVE-2023-46813)
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.710CVSS Base Score is 7.0. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-46813 was patched at 2024-01-02, 2024-01-11, unknown date

ubuntu: CVE-2023-46813 was patched at 2023-12-05

oraclelinux: CVE-2023-46813 was patched at 2024-01-26

redhat: CVE-2023-46813 was patched at 2024-01-25

13. Authentication Bypass - HID (CVE-2023-45866) - High [574]

Description: Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. An example affected package is bluez 5.64-0ubuntu1 in Ubuntu 22.04LTS. NOTE: in some cases, a CVE-2020-0556 mitigation would have already addressed this Bluetooth HID Hosts issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Improper Authentication in Google Android, [githubexploit] Exploit for Improper Authentication in Google Android, [githubexploit] Exploit for Improper Authentication in Google Android)
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.514HID
CVSS Base Score0.610CVSS Base Score is 6.3. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00085, EPSS Percentile is 0.35345

debian: CVE-2023-45866 was patched at 2023-12-15, 2023-12-21, unknown date

ubuntu: CVE-2023-45866 was patched at 2023-12-07

14. Remote Code Execution - smarty (CVE-2023-28447) - High [571]

Description: Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user's browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application's behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Cross-site Scripting in Smarty)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Product detected by a:smarty:smarty (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 7.1. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.17651

debian: CVE-2023-28447 was patched at unknown date

ubuntu: CVE-2023-28447 was patched at 2023-12-12

15. Denial of Service - Eclipse Mosquitto (CVE-2021-41039) - High [558]

Description: In versions 1.6 to 2.0.11 of Eclipse Mosquitto, an MQTT v5 client connecting with a large number of user-property properties could cause excessive CPU usage, leading to a loss of performance and possible denial of service.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:bugs.eclipse.org website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614Eclipse Mosquitto provides a lightweight server implementation of the MQTT protocol that is suitable for all situations from full power machines to embedded and low power machines
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00075, EPSS Percentile is 0.31025

debian: CVE-2021-41039 was patched at unknown date

ubuntu: CVE-2021-41039 was patched at 2023-11-21

16. Remote Code Execution - Linux Kernel (CVE-2023-5178) - High [554]

Description: A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation problem.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.910EPSS Probability is 0.01495, EPSS Percentile is 0.85541

debian: CVE-2023-5178 was patched at 2024-01-02, 2024-01-11, unknown date

ubuntu: CVE-2023-5178 was patched at 2023-11-21, 2023-12-05, 2023-12-06, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10

oraclelinux: CVE-2023-5178 was patched at 2023-12-01, 2023-12-13, 2023-12-14, 2024-01-26

almalinux: CVE-2023-5178 was patched at 2023-11-28, 2024-01-23

redhat: CVE-2023-5178 was patched at 2023-11-21, 2023-11-28, 2024-01-23, 2024-01-24, 2024-01-25

17. Denial of Service - keycloak (CVE-2023-6563) - High [553]

Description: An unconstrained memory consumption vulnerability was discovered in Keycloak. It can be triggered in environments which have millions of offline tokens (> 500,000 users with each having at least 2 saved sessions). If an attacker creates two or more user sessions and then open the "consents" tab of the admin User Interface, the UI attempts to load a huge number of offline client sessions leading to excessive memory and CPU consumption which could potentially crash the entire system.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:access.redhat.com website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:redhat:keycloak (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.7. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00092, EPSS Percentile is 0.38734

redhat: CVE-2023-6563 was patched at 2023-12-14

18. Denial of Service - HTTP Server (CVE-2023-45802) - High [541]

Description: When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that. This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out. Users are recommended to upgrade to version 2.4.58, which fixes the issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Uncontrolled Resource Consumption in Ietf Http, [githubexploit] Exploit for Uncontrolled Resource Consumption in Ietf Http, [githubexploit] Exploit for Uncontrolled Resource Consumption in Ietf Http, [githubexploit] Exploit for Uncontrolled Resource Consumption in Ietf Http, [githubexploit] Exploit for Uncontrolled Resource Consumption in Ietf Http)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:apache:http_server (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 5.9. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00177, EPSS Percentile is 0.5494

debian: CVE-2023-45802 was patched at unknown date

ubuntu: CVE-2023-45802 was patched at 2023-11-22

19. Denial of Service - Wireshark (CVE-2023-2906) - High [534]

Description: Due to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:takeonme.org website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00055, EPSS Percentile is 0.20421

debian: CVE-2023-2906 was patched at 2023-11-19, unknown date

20. Memory Corruption - libde265 (CVE-2023-27103) - High [529]

Description: Libde265 v1.0.11 was discovered to contain a heap buffer overflow via the function derive_collocated_motion_vectors at motion.cc.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:struktur:libde265 (exists in CPE dict)
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00087, EPSS Percentile is 0.36563

debian: CVE-2023-27103 was patched at 2023-11-30, unknown date

21. Security Feature Bypass - Curl (CVE-2023-46219) - High [529]

Description: When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:hackerone.com website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:haxx:curl (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 5.3. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.17651

debian: CVE-2023-46219 was patched at unknown date

ubuntu: CVE-2023-46219 was patched at 2023-12-06

22. Authentication Bypass - grafana (CVE-2023-2183) - High [526]

Description: Grafana is an open-source platform for monitoring and observability. The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function. This might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server. Users may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.514Product detected by a:grafana:grafana (exists in CPE dict)
CVSS Base Score0.410CVSS Base Score is 4.1. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00051, EPSS Percentile is 0.17089

redhat: CVE-2023-2183 was patched at 2023-12-12

23. Denial of Service - libxml2 (CVE-2023-39615) - High [522]

Description: Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:gitlab.gnome.org website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614libxml2 is an XML toolkit implemented in C, originally developed for the GNOME Project
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00046, EPSS Percentile is 0.1372

debian: CVE-2023-39615 was patched at unknown date

oraclelinux: CVE-2023-39615 was patched at 2023-12-13, 2024-01-10

almalinux: CVE-2023-39615 was patched at 2023-12-12, 2024-01-10

redhat: CVE-2023-39615 was patched at 2023-11-28, 2023-12-12, 2024-01-10, 2024-01-25

24. Denial of Service - Freeimage (CVE-2020-22524) - High [517]

Description: Buffer Overflow vulnerability in FreeImage_Load function in FreeImage Library 3.19.0(r1828) allows attackers to cuase a denial of service via crafted PFM file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:sourceforge.net website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:freeimage_project:freeimage (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00055, EPSS Percentile is 0.20421

debian: CVE-2020-22524 was patched at 2023-11-26, 2023-12-17, unknown date

ubuntu: CVE-2020-22524 was patched at 2024-01-16

25. Denial of Service - cryptography (CVE-2023-49083) - High [505]

Description: cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Calling `load_pem_pkcs7_certificates` or `load_der_pkcs7_certificates` could lead to a NULL-pointer dereference and segfault. Exploitation of this vulnerability poses a serious risk of Denial of Service (DoS) for any application attempting to deserialize a PKCS7 blob/certificate. The consequences extend to potential disruptions in system availability and stability. This vulnerability has been patched in version 41.0.6.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:cryptography_project:cryptography (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 5.9. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00053, EPSS Percentile is 0.1868

debian: CVE-2023-49083 was patched at unknown date

ubuntu: CVE-2023-49083 was patched at 2023-12-06

oraclelinux: CVE-2023-49083 was patched at 2024-01-18

26. Denial of Service - libtiff (CVE-2022-40090) - High [505]

Description: An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:gitlab.com website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:libtiff:libtiff (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00046, EPSS Percentile is 0.1372

debian: CVE-2022-40090 was patched at unknown date

ubuntu: CVE-2022-40090 was patched at 2023-11-23

27. Memory Corruption - Fast DDS (CVE-2023-42459) - High [505]

Description: Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). In affected versions specific DATA submessages can be sent to a discovery locator which may trigger a free error. This can remotely crash any Fast-DDS process. The call to free() could potentially leave the pointer in the attackers control which could lead to a double free. This issue has been addressed in versions 2.12.0, 2.11.3, 2.10.3, and 2.6.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:eprosima:fast_dds (exists in CPE dict)
CVSS Base Score0.910CVSS Base Score is 8.6. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00056, EPSS Percentile is 0.20812

debian: CVE-2023-42459 was patched at 2023-11-27, unknown date

28. Security Feature Bypass - OpenSSL (CVE-2023-46724) - High [496]

Description: Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end
CVSS Base Score0.910CVSS Base Score is 8.6. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.0061, EPSS Percentile is 0.76386

debian: CVE-2023-46724 was patched at unknown date

ubuntu: CVE-2023-46724 was patched at 2023-11-21

oraclelinux: CVE-2023-46724 was patched at 2024-01-04, 2024-01-10

almalinux: CVE-2023-46724 was patched at 2024-01-03, 2024-01-08

redhat: CVE-2023-46724 was patched at 2024-01-03, 2024-01-08, 2024-01-24

29. Memory Corruption - Glusterfs (CVE-2022-48340) - High [494]

Description: In Gluster GlusterFS 11.0, there is an xlators/cluster/dht/src/dht-common.c dht_setxattr_mds_cbk use-after-free.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:gluster:glusterfs (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00053, EPSS Percentile is 0.18538

debian: CVE-2022-48340 was patched at unknown date

ubuntu: CVE-2022-48340 was patched at 2023-11-22

30. Memory Corruption - libde265 (CVE-2023-43887) - High [494]

Description: Libde265 v1.0.12 was discovered to contain multiple buffer overflows via the num_tile_columns and num_tile_row parameters in the function pic_parameter_set::dump.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:struktur:libde265 (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 8.1. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.23847

debian: CVE-2023-43887 was patched at 2023-11-30, unknown date

31. Denial of Service - vim (CVE-2023-48706) - High [482]

Description: Vim is a UNIX editor that, prior to version 9.0.2121, has a heap-use-after-free vulnerability. When executing a `:s` command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive `:s` call causes free-ing of memory which may later then be accessed by the initial `:s` command. The user must intentionally execute the payload and the whole process is a bit tricky to do since it seems to work only reliably for the very first :s command. It may also cause a crash of Vim. Version 9.0.2121 contains a fix for this issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:vim:vim (exists in CPE dict)
CVSS Base Score0.410CVSS Base Score is 3.6. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00049, EPSS Percentile is 0.1582

debian: CVE-2023-48706 was patched at unknown date

ubuntu: CVE-2023-48706 was patched at 2023-12-14

32. Remote Code Execution - Safari (CVE-2023-42852) - High [478]

Description: A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00147, EPSS Percentile is 0.50616

debian: CVE-2023-42852 was patched at 2023-11-17, unknown date

ubuntu: CVE-2023-42852 was patched at 2023-11-20

33. Denial of Service - GPAC (CVE-2023-46001) - High [477]

Description: Buffer Overflow vulnerability in gpac MP4Box v.2.3-DEV-rev573-g201320819-master allows a local attacker to cause a denial of service via the gpac/src/isomedia/isom_read.c:2807:51 function in gf_isom_get_user_data.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.414GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity)
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.08097

debian: CVE-2023-46001 was patched at unknown date

redos: CVE-2023-46001 was patched at 2023-11-20

34. Remote Code Execution - X Server (CVE-2023-6377) - High [476]

Description: A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Product detected by a:x.org:x_server (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.20996, EPSS Percentile is 0.95992

debian: CVE-2023-6377 was patched at 2023-12-13, 2023-12-17, unknown date

ubuntu: CVE-2023-6377 was patched at 2023-12-13

oraclelinux: CVE-2023-6377 was patched at 2024-01-02, 2024-01-03, 2024-01-04

almalinux: CVE-2023-6377 was patched at 2024-01-02

redhat: CVE-2023-6377 was patched at 2023-12-20, 2024-01-02

35. Memory Corruption - iniparser (CVE-2023-33461) - High [458]

Description: iniparser v4.1 is vulnerable to NULL Pointer Dereference in function iniparser_getlongint which misses check NULL for function iniparser_getstring's return.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:iniparser_project:iniparser (does NOT exist in CPE dict)
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.08097

debian: CVE-2023-33461 was patched at unknown date

ubuntu: CVE-2023-33461 was patched at 2023-11-20

36. Remote Code Execution - strongswan (CVE-2023-41913) - High [452]

Description: strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Product detected by a:strongswan:strongswan (exists in CPE dict)
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00233, EPSS Percentile is 0.61415

debian: CVE-2023-41913 was patched at 2023-11-20, 2023-11-24, unknown date

ubuntu: CVE-2023-41913 was patched at 2023-11-20, 2023-12-14

37. Remote Code Execution - ZBar (CVE-2023-40889) - High [440]

Description: A heap-based buffer overflow exists in the qr_reader_match_centers function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or arbitrary code execution. To trigger this vulnerability, an attacker can digitally input the malicious QR code, or prepare it to be physically scanned by the vulnerable scanner.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Product detected by a:zbar_project:zbar (exists in CPE dict)
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00116, EPSS Percentile is 0.45288

debian: CVE-2023-40889 was patched at 2023-12-01, unknown date

38. Remote Code Execution - ZBar (CVE-2023-40890) - High [440]

Description: A stack-based buffer overflow vulnerability exists in the lookup_sequence function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or arbitrary code execution. To trigger this vulnerability, an attacker can digitally input the malicious QR code, or prepare it to be physically scanned by the vulnerable scanner.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Product detected by a:zbar_project:zbar (exists in CPE dict)
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00116, EPSS Percentile is 0.45288

debian: CVE-2023-40890 was patched at 2023-12-01, unknown date

39. Incorrect Calculation - vim (CVE-2023-46246) - High [434]

Description: Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `src/alloc.c` at line 748, which is freed in the file `src/ex_docmd.c` in the function `do_cmdline` at line 1010 and then used again in `src/cmdhist.c` at line 759. When using the `:history` command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514Product detected by a:vim:vim (exists in CPE dict)
CVSS Base Score0.410CVSS Base Score is 4.0. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-46246 was patched at unknown date

ubuntu: CVE-2023-46246 was patched at 2023-12-14

40. Security Feature Bypass - Avro (CVE-2023-39410) - High [410]

Description: When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:apache:avro (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00254, EPSS Percentile is 0.63258

redhat: CVE-2023-39410 was patched at 2023-12-04

41. Elevation of Privilege - Linux Kernel (CVE-2023-39198) - High [408]

Description: A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.06784

debian: CVE-2023-39198 was patched at unknown date

ubuntu: CVE-2023-39198 was patched at 2023-12-05, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-10

42. Elevation of Privilege - Linux Kernel (CVE-2023-5717) - High [408]

Description: A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer. We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-5717 was patched at 2024-01-02, 2024-01-11, unknown date

ubuntu: CVE-2023-5717 was patched at 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10

redhat: CVE-2023-5717 was patched at 2024-01-25

43. Remote Code Execution - Visual Studio Code (CVE-2022-41034) - High [407]

Description: Visual Studio Code Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.314Integrated development environment
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.710EPSS Probability is 0.00434, EPSS Percentile is 0.71983

redos: CVE-2022-41034 was patched at 2023-11-21

44. Denial of Service - GNU C Library (CVE-2023-5156) - High [401]

Description: A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00093, EPSS Percentile is 0.39178

ubuntu: CVE-2023-5156 was patched at 2023-12-07

45. Memory Corruption - Chromium (CVE-2023-6346) - High [401]

Description: Use after free in WebAudio in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00208, EPSS Percentile is 0.58779

debian: CVE-2023-6346 was patched at 2023-11-30, unknown date

46. Memory Corruption - Chromium (CVE-2023-6348) - High [401]

Description: Type Confusion in Spellcheck in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00229, EPSS Percentile is 0.61106

debian: CVE-2023-6348 was patched at 2023-11-30, unknown date

Medium (107)

47. Denial of Service - Squid (CVE-2023-5824) - Medium [398]

Description: Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:squid-cache:squid (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.00991, EPSS Percentile is 0.81938

debian: CVE-2023-5824 was patched at unknown date

oraclelinux: CVE-2023-5824 was patched at 2023-11-28, 2023-12-11

almalinux: CVE-2023-5824 was patched at 2023-11-22, 2023-12-06

redhat: CVE-2023-5824 was patched at 2023-11-22, 2023-12-06, 2024-01-08, 2024-01-24

redos: CVE-2023-5824 was patched at 2023-11-21

48. Security Feature Bypass - Kubernetes (CVE-2023-5528) - Medium [396]

Description: A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.714Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management
CVSS Base Score0.710CVSS Base Score is 7.2. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00082, EPSS Percentile is 0.34096

redos: CVE-2023-5528 was patched at 2023-11-22

49. Information Disclosure - Linux Kernel (CVE-2023-39192) - Medium [393]

Description: A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.710CVSS Base Score is 6.7. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00045, EPSS Percentile is 0.12483

debian: CVE-2023-39192 was patched at 2024-01-11, unknown date

ubuntu: CVE-2023-39192 was patched at 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10

oraclelinux: CVE-2023-39192 was patched at 2023-12-06

50. Remote Code Execution - libreoffice (CVE-2023-6185) - Medium [392]

Description: Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins. In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Product detected by a:libreoffice:libreoffice (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 8.3. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00065, EPSS Percentile is 0.26878

debian: CVE-2023-6185 was patched at 2023-12-11, 2023-12-31, unknown date

ubuntu: CVE-2023-6185 was patched at 2023-12-11, 2023-12-14

51. Unknown Vulnerability Type - Amanda (CVE-2023-30577) - Medium [392]

Description: {'nvd_cve_data_all': 'AMANDA (Advanced Maryland Automatic Network Disk Archiver) before tag-community-3.5.4 mishandles argument checking for runtar.c, a different vulnerability than CVE-2022-37705.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'AMANDA (Advanced Maryland Automatic Network Disk Archiver) before tag-community-3.5.4 mishandles argument checking for runtar.c, a different vulnerability than CVE-2022-37705.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.514Product detected by a:zmanda:amanda (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-30577 was patched at 2023-12-03, unknown date

52. Unknown Vulnerability Type - Curl (CVE-2023-46218) - Medium [392]

Description: {'nvd_cve_data_all': 'This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain. ', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This flaw allows a malicious HTTP server to set "super cookies" in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl's function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.\n', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:hackerone.com website
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.514Product detected by a:haxx:curl (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00057, EPSS Percentile is 0.21539

debian: CVE-2023-46218 was patched at 2023-12-22, 2023-12-23, unknown date

ubuntu: CVE-2023-46218 was patched at 2023-12-06

redhat: CVE-2023-46218 was patched at 2024-01-25

53. Unknown Vulnerability Type - wordpress (CVE-2023-5561) - Medium [392]

Description: {'nvd_cve_data_all': 'WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:wpscan.com website
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.514Product detected by a:wordpress:wordpress (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 5.3. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00089, EPSS Percentile is 0.37374

debian: CVE-2023-5561 was patched at 2023-11-21, unknown date

54. Code Injection - Chromium (CVE-2023-39956) - Medium [389]

Description: Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.06784

redos: CVE-2023-39956 was patched at 2023-11-21

55. Memory Corruption - Chromium (CVE-2023-6347) - Medium [389]

Description: Use after free in Mojo in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00175, EPSS Percentile is 0.54717

debian: CVE-2023-6347 was patched at 2023-11-30, unknown date

56. Memory Corruption - Chromium (CVE-2023-6350) - Medium [389]

Description: Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00175, EPSS Percentile is 0.54757

debian: CVE-2023-6350 was patched at 2023-11-30, unknown date

57. Memory Corruption - Chromium (CVE-2023-6351) - Medium [389]

Description: Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00175, EPSS Percentile is 0.54757

debian: CVE-2023-6351 was patched at 2023-11-30, unknown date

58. Memory Corruption - Chromium (CVE-2023-6508) - Medium [389]

Description: Use after free in Media Stream in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00127, EPSS Percentile is 0.4729

debian: CVE-2023-6508 was patched at 2023-12-09, unknown date

59. Memory Corruption - Chromium (CVE-2023-6509) - Medium [389]

Description: Use after free in Side Panel Search in Google Chrome prior to 120.0.6099.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00127, EPSS Percentile is 0.4729

debian: CVE-2023-6509 was patched at 2023-12-09, unknown date

60. Memory Corruption - Chromium (CVE-2023-6510) - Medium [389]

Description: Use after free in Media Capture in Google Chrome prior to 120.0.6099.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00127, EPSS Percentile is 0.4729

debian: CVE-2023-6510 was patched at 2023-12-09, unknown date

61. Memory Corruption - Chromium (CVE-2023-6705) - Medium [389]

Description: Use after free in WebRTC in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00123, EPSS Percentile is 0.46499

debian: CVE-2023-6705 was patched at 2023-12-13, unknown date

62. Security Feature Bypass - Chromium (CVE-2023-6511) - Medium [389]

Description: Inappropriate implementation in Autofill in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00108, EPSS Percentile is 0.43446

debian: CVE-2023-6511 was patched at 2023-12-09, unknown date

63. Denial of Service - Squid (CVE-2023-46728) - Medium [386]

Description: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:squid-cache:squid (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.710EPSS Probability is 0.00374, EPSS Percentile is 0.69924

debian: CVE-2023-46728 was patched at 2024-01-09, unknown date

ubuntu: CVE-2023-46728 was patched at 2023-11-21, 2023-12-11

oraclelinux: CVE-2023-46728 was patched at 2024-01-04, 2024-01-10

almalinux: CVE-2023-46728 was patched at 2024-01-03, 2024-01-08

redhat: CVE-2023-46728 was patched at 2024-01-03, 2024-01-08, 2024-01-24

64. Security Feature Bypass - AFFLIB (CVE-2018-8050) - Medium [386]

Description: The af_get_page() function in lib/afflib_pages.cpp in AFFLIB (aka AFFLIBv3) through 3.7.16 allows remote attackers to cause a denial of service (segmentation fault) via a corrupt AFF image that triggers an unexpected pagesize value.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:afflib_project:afflib (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00166, EPSS Percentile is 0.53248

debian: CVE-2018-8050 was patched at unknown date

ubuntu: CVE-2018-8050 was patched at 2023-11-28

65. Security Feature Bypass - Crypto-js (CVE-2023-46233) - Medium [386]

Description: crypto-js is a JavaScript library of crypto standards. Prior to version 4.2.0, crypto-js PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. If used to generate signatures, the impact is high. Version 4.2.0 contains a patch for this issue. As a workaround, configure crypto-js to use SHA256 with at least 250,000 iterations.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:crypto-js_project:crypto-js (exists in CPE dict)
CVSS Base Score0.910CVSS Base Score is 9.1. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00067, EPSS Percentile is 0.27741

debian: CVE-2023-46233 was patched at 2023-11-27, unknown date

66. Remote Code Execution - Visual Studio Code (CVE-2023-24893) - Medium [383]

Description: Visual Studio Code Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.314Integrated development environment
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00125, EPSS Percentile is 0.46844

redos: CVE-2023-24893 was patched at 2023-11-21

67. Denial of Service - Linux Kernel (CVE-2023-1192) - Medium [382]

Description: A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.16032

debian: CVE-2023-1192 was patched at unknown date

oraclelinux: CVE-2023-1192 was patched at 2023-12-01, 2023-12-14, 2023-12-22

almalinux: CVE-2023-1192 was patched at 2023-11-28

redhat: CVE-2023-1192 was patched at 2023-11-28, 2024-01-25

68. Security Feature Bypass - Kibana (CVE-2023-45807) - Medium [382]

Description: OpenSearch is a community-driven, open source fork of Elasticsearch and Kibana following the license change in early 2021. There is an issue with the implementation of tenant permissions in OpenSearch Dashboards where authenticated users with read-only access to a tenant can perform create, edit and delete operations on index metadata of dashboards and visualizations in that tenant, potentially rendering them unavailable. This issue does not affect index data, only metadata. Dashboards correctly enforces read-only permissions when indexing and updating documents. This issue does not provide additional read access to data users don’t already have. This issue can be mitigated by disabling the tenants functionality for the cluster. Versions 1.3.14 and 2.11.0 contain a fix for this issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.914Data visualization dashboard software
CVSS Base Score0.510CVSS Base Score is 5.4. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10871

redos: CVE-2023-45807 was patched at 2023-11-21

69. Information Disclosure - Linux Kernel (CVE-2023-39193) - Medium [381]

Description: A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00045, EPSS Percentile is 0.12483

debian: CVE-2023-39193 was patched at 2024-01-11, unknown date

ubuntu: CVE-2023-39193 was patched at 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10

oraclelinux: CVE-2023-39193 was patched at 2023-12-06

70. Denial of Service - Safari (CVE-2023-41983) - Medium [377]

Description: The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, Safari 17.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing web content may lead to a denial-of-service.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00063, EPSS Percentile is 0.25739

debian: CVE-2023-41983 was patched at 2023-11-17, unknown date

ubuntu: CVE-2023-41983 was patched at 2023-11-20

71. Memory Corruption - Mozilla Firefox (CVE-2023-6207) - Medium [377]

Description: Ownership mismanagement led to a use-after-free in ReadableByteStreams This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00089, EPSS Percentile is 0.37268

debian: CVE-2023-6207 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date

ubuntu: CVE-2023-6207 was patched at 2023-11-23, 2023-11-27

oraclelinux: CVE-2023-6207 was patched at 2023-11-27, 2023-11-28

almalinux: CVE-2023-6207 was patched at 2023-11-27

redhat: CVE-2023-6207 was patched at 2023-11-27, 2023-11-28, 2023-11-29

72. Memory Corruption - Mozilla Firefox (CVE-2023-6212) - Medium [377]

Description: Memory safety bugs present in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00089, EPSS Percentile is 0.37268

debian: CVE-2023-6212 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date

ubuntu: CVE-2023-6212 was patched at 2023-11-23, 2023-11-27

oraclelinux: CVE-2023-6212 was patched at 2023-11-27, 2023-11-28

almalinux: CVE-2023-6212 was patched at 2023-11-27

redhat: CVE-2023-6212 was patched at 2023-11-27, 2023-11-28, 2023-11-29

73. Path Traversal - Mozilla Firefox (CVE-2023-6209) - Medium [377]

Description: Relative URLs starting with three slashes were incorrectly parsed, and a path-traversal "/../" part in the path could be used to override the specified host. This could contribute to security problems in web sites. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Path Traversal
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00079, EPSS Percentile is 0.32904

debian: CVE-2023-6209 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date

ubuntu: CVE-2023-6209 was patched at 2023-11-23, 2023-11-27

oraclelinux: CVE-2023-6209 was patched at 2023-11-27, 2023-11-28

almalinux: CVE-2023-6209 was patched at 2023-11-27

redhat: CVE-2023-6209 was patched at 2023-11-27, 2023-11-28, 2023-11-29

74. Security Feature Bypass - libreoffice (CVE-2023-6186) - Medium [375]

Description: Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning. In affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:libreoffice:libreoffice (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 8.3. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00065, EPSS Percentile is 0.26878

debian: CVE-2023-6186 was patched at 2023-12-11, 2023-12-31, unknown date

ubuntu: CVE-2023-6186 was patched at 2023-12-11, 2023-12-14

75. Information Disclosure - haproxy (CVE-2023-45539) - Medium [374]

Description: HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:haproxy:haproxy (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 8.2. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00112, EPSS Percentile is 0.44362

debian: CVE-2023-45539 was patched at 2023-12-14, 2023-12-28, unknown date

ubuntu: CVE-2023-45539 was patched at 2023-12-05

76. Authentication Bypass - keycloak (CVE-2023-0105) - Medium [372]

Description: A flaw was found in Keycloak. This flaw allows impersonation and lockout due to the email trust not being handled correctly in Keycloak. An attacker can shadow other users with the same email and lockout or impersonate them.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.514Product detected by a:redhat:keycloak (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28757

redhat: CVE-2023-0105 was patched at 2023-11-24

77. Remote Code Execution - Visual Studio Code (CVE-2023-21779) - Medium [371]

Description: Visual Studio Code Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.314Integrated development environment
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00113, EPSS Percentile is 0.44739

redos: CVE-2023-21779 was patched at 2023-11-21

78. Remote Code Execution - Visual Studio Code (CVE-2023-36742) - Medium [371]

Description: Visual Studio Code Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.314Integrated development environment
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00113, EPSS Percentile is 0.44739

redos: CVE-2023-36742 was patched at 2023-11-21

79. Denial of Service - Linux Kernel (CVE-2023-5158) - Medium [370]

Description: A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.06784

debian: CVE-2023-5158 was patched at unknown date

ubuntu: CVE-2023-5158 was patched at 2023-12-05, 2023-12-06, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10

80. Denial of Service - Mozilla Firefox (CVE-2023-6206) - Medium [365]

Description: The black fade animation when exiting fullscreen is roughly the length of the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.510CVSS Base Score is 5.4. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00093, EPSS Percentile is 0.39078

debian: CVE-2023-6206 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date

ubuntu: CVE-2023-6206 was patched at 2023-11-23, 2023-11-27

oraclelinux: CVE-2023-6206 was patched at 2023-11-27, 2023-11-28

almalinux: CVE-2023-6206 was patched at 2023-11-27

redhat: CVE-2023-6206 was patched at 2023-11-27, 2023-11-28, 2023-11-29

81. Denial of Service - Mozilla Firefox (CVE-2023-6211) - Medium [365]

Description: If an attacker needed a user to load an insecure http: page and knew that user had enabled HTTPS-only mode, the attacker could have tricked the user into clicking to grant an HTTPS-only exception if they could get the user to participate in a clicking game. This vulnerability affects Firefox < 120.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00054, EPSS Percentile is 0.19514

ubuntu: CVE-2023-6211 was patched at 2023-11-23

82. Memory Corruption - Chromium (CVE-2023-6702) - Medium [365]

Description: Type confusion in V8 in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00076, EPSS Percentile is 0.31359

debian: CVE-2023-6702 was patched at 2023-12-13, unknown date

83. Memory Corruption - Chromium (CVE-2023-6703) - Medium [365]

Description: Use after free in Blink in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00083, EPSS Percentile is 0.34333

debian: CVE-2023-6703 was patched at 2023-12-13, unknown date

84. Memory Corruption - Chromium (CVE-2023-6704) - Medium [365]

Description: Use after free in libavif in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted image file. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00083, EPSS Percentile is 0.34333

debian: CVE-2023-6704 was patched at 2023-12-13, unknown date

85. Memory Corruption - Chromium (CVE-2023-6706) - Medium [365]

Description: Use after free in FedCM in Google Chrome prior to 120.0.6099.109 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00083, EPSS Percentile is 0.34333

debian: CVE-2023-6706 was patched at 2023-12-13, unknown date

86. Memory Corruption - Chromium (CVE-2023-6707) - Medium [365]

Description: Use after free in CSS in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00083, EPSS Percentile is 0.34333

debian: CVE-2023-6707 was patched at 2023-12-13, unknown date

87. Memory Corruption - Mozilla Firefox (CVE-2023-6213) - Medium [365]

Description: Memory safety bugs present in Firefox 119. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 120.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00068, EPSS Percentile is 0.28196

ubuntu: CVE-2023-6213 was patched at 2023-11-23

88. Elevation of Privilege - Linux Kernel (CVE-2023-6176) - Medium [361]

Description: A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.410CVSS Base Score is 4.4. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-6176 was patched at unknown date

ubuntu: CVE-2023-6176 was patched at 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-09, 2024-01-10

89. Authentication Bypass - Opensc (CVE-2023-40660) - Medium [360]

Description: A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.514Product detected by a:opensc_project:opensc (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.6. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00057, EPSS Percentile is 0.2132

debian: CVE-2023-40660 was patched at 2023-11-27, unknown date

oraclelinux: CVE-2023-40660 was patched at 2023-12-18, 2023-12-19

almalinux: CVE-2023-40660 was patched at 2023-12-19

redhat: CVE-2023-40660 was patched at 2023-12-19

90. Denial of Service - Linux Kernel (CVE-2023-45862) - Medium [358]

Description: An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-45862 was patched at unknown date

ubuntu: CVE-2023-45862 was patched at 2023-11-21, 2023-11-30, 2023-12-05

oraclelinux: CVE-2023-45862 was patched at 2023-12-06

91. Incorrect Calculation - Linux Kernel (CVE-2023-45871) - Medium [358]

Description: An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.16754

debian: CVE-2023-45871 was patched at 2024-01-11, unknown date

ubuntu: CVE-2023-45871 was patched at 2023-11-21, 2023-11-27, 2023-11-28, 2023-11-30, 2023-12-05

oraclelinux: CVE-2023-45871 was patched at 2023-12-13, 2023-12-14, 2023-12-22

almalinux: CVE-2023-45871 was patched at 2023-12-12

redhat: CVE-2023-45871 was patched at 2023-12-12, 2024-01-23, 2024-01-24, 2024-01-25

92. Denial of Service - OpenSSL (CVE-2023-5678) - Medium [353]

Description: Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn't make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn't check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the "-pubcheck" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end
CVSS Base Score0.510CVSS Base Score is 5.3. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00079, EPSS Percentile is 0.32937

debian: CVE-2023-5678 was patched at unknown date

oraclelinux: CVE-2023-5678 was patched at 2023-12-18, 2024-01-10

almalinux: CVE-2023-5678 was patched at 2023-12-19

redhat: CVE-2023-5678 was patched at 2023-12-19, 2024-01-10, 2024-01-11

93. Denial of Service - Safari (CVE-2023-42883) - Medium [353]

Description: The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, macOS Sonoma 14.2, iOS 17.2 and iPadOS 17.2, watchOS 10.2, tvOS 17.2, iOS 16.7.3 and iPadOS 16.7.3. Processing an image may lead to a denial-of-service.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00055, EPSS Percentile is 0.20424

debian: CVE-2023-42883 was patched at 2023-12-18, unknown date

ubuntu: CVE-2023-42883 was patched at 2024-01-15

94. Authentication Bypass - Opensc (CVE-2023-4535) - Medium [348]

Description: An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.514Product detected by a:opensc_project:opensc (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00072, EPSS Percentile is 0.29849

debian: CVE-2023-4535 was patched at unknown date

oraclelinux: CVE-2023-4535 was patched at 2023-12-19

almalinux: CVE-2023-4535 was patched at 2023-12-19

redhat: CVE-2023-4535 was patched at 2023-12-19

95. Memory Corruption - Linux Kernel (CVE-2023-45898) - Medium [346]

Description: The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

ubuntu: CVE-2023-45898 was patched at 2023-12-06, 2024-01-09

96. Information Disclosure - Linux Kernel (CVE-2023-39194) - Medium [345]

Description: A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.310CVSS Base Score is 3.2. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00045, EPSS Percentile is 0.12483

debian: CVE-2023-39194 was patched at 2024-01-11, unknown date

ubuntu: CVE-2023-39194 was patched at 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10

97. Denial of Service - Eclipse Mosquitto (CVE-2021-34431) - Medium [344]

Description: In Eclipse Mosquitto version 1.6 to 2.0.10, if an authenticated client that had connected with MQTT v5 sent a crafted CONNECT message to the broker a memory leak would occur, which could be used to provide a DoS attack against the broker.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614Eclipse Mosquitto provides a lightweight server implementation of the MQTT protocol that is suitable for all situations from full power machines to embedded and low power machines
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00063, EPSS Percentile is 0.25588

debian: CVE-2021-34431 was patched at unknown date

ubuntu: CVE-2021-34431 was patched at 2023-11-21

98. Elevation of Privilege - InsydeH2O (CVE-2023-39283) - Medium [342]

Description: An SMM memory corruption vulnerability in the SMM driver (SMRAM write) in CsmInt10HookSmm in Insyde InsydeH2O with kernel 5.0 through 5.5 allows attackers to send arbitrary data to SMM which could lead to privilege escalation.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.514Product detected by a:insyde:insydeh2o (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.06784

debian: CVE-2023-39283 was patched at 2023-11-17

99. Elevation of Privilege - linux_kernel (CVE-2023-5633) - Medium [342]

Description: The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.514Product detected by o:linux:linux_kernel (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-5633 was patched at unknown date

ubuntu: CVE-2023-5633 was patched at 2023-11-21, 2023-12-06, 2024-01-09

almalinux: CVE-2023-5633 was patched at 2024-01-10

redhat: CVE-2023-5633 was patched at 2024-01-10

100. Memory Corruption - Mozilla Firefox (CVE-2023-6204) - Medium [341]

Description: On some systems—depending on the graphics settings and drivers—it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00075, EPSS Percentile is 0.3081

debian: CVE-2023-6204 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date

ubuntu: CVE-2023-6204 was patched at 2023-11-23, 2023-11-27

oraclelinux: CVE-2023-6204 was patched at 2023-11-27, 2023-11-28

almalinux: CVE-2023-6204 was patched at 2023-11-27

redhat: CVE-2023-6204 was patched at 2023-11-27, 2023-11-28, 2023-11-29

101. Memory Corruption - Mozilla Firefox (CVE-2023-6205) - Medium [341]

Description: It was possible to cause the use of a MessagePort after it had already been freed, which could potentially have led to an exploitable crash. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00066, EPSS Percentile is 0.27219

debian: CVE-2023-6205 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date

ubuntu: CVE-2023-6205 was patched at 2023-11-23, 2023-11-27

oraclelinux: CVE-2023-6205 was patched at 2023-11-27, 2023-11-28

almalinux: CVE-2023-6205 was patched at 2023-11-27

redhat: CVE-2023-6205 was patched at 2023-11-27, 2023-11-28, 2023-11-29

102. Security Feature Bypass - openvswitch (CVE-2023-5366) - Medium [339]

Description: A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:openvswitch:openvswitch (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 7.1. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-5366 was patched at unknown date

ubuntu: CVE-2023-5366 was patched at 2023-11-26

103. Information Disclosure - GnuTLS (CVE-2023-5981) - Medium [338]

Description: A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:gnu:gnutls (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 5.9. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00071, EPSS Percentile is 0.29137

debian: CVE-2023-5981 was patched at 2023-11-22, unknown date

ubuntu: CVE-2023-5981 was patched at 2023-11-21, 2024-01-08

oraclelinux: CVE-2023-5981 was patched at 2024-01-11

almalinux: CVE-2023-5981 was patched at 2024-01-10

redhat: CVE-2023-5981 was patched at 2024-01-10, 2024-01-22, 2024-01-24, 2024-01-25, 2024-01-29

104. Spoofing - Chromium (CVE-2023-6512) - Medium [335]

Description: Inappropriate implementation in Web Browser UI in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to potentially spoof the contents of an iframe dialog context menu via a crafted HTML page. (Chromium security severity: Low)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00086, EPSS Percentile is 0.35825

debian: CVE-2023-6512 was patched at 2023-12-09, unknown date

105. Cross Site Scripting - single_sign-on (CVE-2023-6134) - Medium [333]

Description: A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.514Product detected by a:redhat:single_sign-on (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.6. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.001, EPSS Percentile is 0.40852

redhat: CVE-2023-6134 was patched at 2023-12-14

106. Denial of Service - RabbitMQ (CVE-2023-46118) - Medium [327]

Description: RabbitMQ is a multi-protocol messaging and streaming broker. HTTP API did not enforce an HTTP request body limit, making it vulnerable for denial of service (DoS) attacks with very large messages. An authenticated user with sufficient credentials can publish a very large messages over the HTTP API and cause target node to be terminated by an "out-of-memory killer"-like mechanism. This vulnerability has been patched in versions 3.11.24 and 3.12.7.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:vmware:rabbitmq (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00138, EPSS Percentile is 0.49311

debian: CVE-2023-46118 was patched at 2023-12-01, 2023-12-14, unknown date

ubuntu: CVE-2023-46118 was patched at 2023-11-21

redhat: CVE-2023-46118 was patched at 2024-01-16

107. Denial of Service - libtiff (CVE-2023-40745) - Medium [327]

Description: LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:libtiff:libtiff (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00081, EPSS Percentile is 0.33733

debian: CVE-2023-40745 was patched at 2023-11-27, unknown date

108. Incorrect Calculation - FRRouting (CVE-2023-38406) - Medium [327]

Description: bgpd/bgp_flowspec.c in FRRouting (FRR) before 8.4.3 mishandles an nlri length of zero, aka a "flowspec overflow."

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514Free Range Routing or FRRouting or FRR is a network routing software suite running on Unix-like platforms, particularly Linux, Solaris, OpenBSD, FreeBSD and NetBSD
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00084, EPSS Percentile is 0.3463

debian: CVE-2023-38406 was patched at unknown date

ubuntu: CVE-2023-38406 was patched at 2023-11-21

oraclelinux: CVE-2023-38406 was patched at 2024-01-12, 2024-01-26

almalinux: CVE-2023-38406 was patched at 2024-01-10, 2024-01-25

redhat: CVE-2023-38406 was patched at 2024-01-10, 2024-01-25

109. Incorrect Calculation - X Server (CVE-2023-6478) - Medium [327]

Description: A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514Product detected by a:x.org:x_server (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.6. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00176, EPSS Percentile is 0.54806

debian: CVE-2023-6478 was patched at 2023-12-13, unknown date

ubuntu: CVE-2023-6478 was patched at 2023-12-13

oraclelinux: CVE-2023-6478 was patched at 2024-01-02, 2024-01-03, 2024-01-04

almalinux: CVE-2023-6478 was patched at 2024-01-02

redhat: CVE-2023-6478 was patched at 2023-12-20, 2024-01-02

110. Memory Corruption - Freeimage (CVE-2020-21427) - Medium [327]

Description: Buffer Overflow vulnerability in function LoadPixelDataRLE8 in PluginBMP.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:freeimage_project:freeimage (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00115, EPSS Percentile is 0.45172

debian: CVE-2020-21427 was patched at 2023-11-26, 2023-12-17, unknown date

ubuntu: CVE-2020-21427 was patched at 2024-01-16

111. Memory Corruption - Freeimage (CVE-2020-21428) - Medium [327]

Description: Buffer Overflow vulnerability in function LoadRGB in PluginDDS.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:freeimage_project:freeimage (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00115, EPSS Percentile is 0.45172

debian: CVE-2020-21428 was patched at 2023-11-26, 2023-12-17, unknown date

ubuntu: CVE-2020-21428 was patched at 2024-01-16

112. Memory Corruption - lwIP (CVE-2020-22283) - Medium [327]

Description: A buffer overflow vulnerability in the icmp6_send_response_with_addrs_and_netif() function of Free Software Foundation lwIP version git head allows attackers to access sensitive information via a crafted ICMPv6 packet.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:lwip_project:lwip (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00158, EPSS Percentile is 0.52312

debian: CVE-2020-22283 was patched at 2023-11-19, unknown date

113. Security Feature Bypass - budgie_extras (CVE-2023-49343) - Medium [327]

Description: Temporary data passed between application components by Budgie Extras Dropby applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:ubuntubudgie:budgie_extras (does NOT exist in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.0. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-49343 was patched at unknown date

ubuntu: CVE-2023-49343 was patched at 2023-12-14

114. Memory Corruption - Linux Kernel (CVE-2023-6039) - Medium [322]

Description: A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-6039 was patched at unknown date

ubuntu: CVE-2023-6039 was patched at 2023-12-05, 2023-12-12, 2023-12-13

115. Cross Site Scripting - Symfony (CVE-2023-46734) - Medium [321]

Description: Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in versions 2.0.0, 5.0.0, and 6.0.0 and prior to versions 4.4.51, 5.4.31, and 6.3.8, some Twig filters in CodeExtension use `is_safe=html` but don't actually ensure their input is safe. As of versions 4.4.51, 5.4.31, and 6.3.8, Symfony now escapes the output of the affected filters.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.514Product detected by a:sensiolabs:symfony (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.17651

debian: CVE-2023-46734 was patched at 2023-11-24, unknown date

116. Denial of Service - FRRouting (CVE-2023-47234) - Medium [315]

Description: An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Free Range Routing or FRRouting or FRR is a network routing software suite running on Unix-like platforms, particularly Linux, Solaris, OpenBSD, FreeBSD and NetBSD
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00046, EPSS Percentile is 0.1372

debian: CVE-2023-47234 was patched at unknown date

ubuntu: CVE-2023-47234 was patched at 2023-11-21

oraclelinux: CVE-2023-47234 was patched at 2024-01-12, 2024-01-26

almalinux: CVE-2023-47234 was patched at 2024-01-10, 2024-01-25

redhat: CVE-2023-47234 was patched at 2024-01-10, 2024-01-25

117. Denial of Service - FRRouting (CVE-2023-47235) - Medium [315]

Description: An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when a malformed BGP UPDATE message with an EOR is processed, because the presence of EOR does not lead to a treat-as-withdraw outcome.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Free Range Routing or FRRouting or FRR is a network routing software suite running on Unix-like platforms, particularly Linux, Solaris, OpenBSD, FreeBSD and NetBSD
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00046, EPSS Percentile is 0.1372

debian: CVE-2023-47235 was patched at unknown date

ubuntu: CVE-2023-47235 was patched at 2023-11-21

oraclelinux: CVE-2023-47235 was patched at 2024-01-12, 2024-01-26

almalinux: CVE-2023-47235 was patched at 2024-01-10, 2024-01-25

redhat: CVE-2023-47235 was patched at 2024-01-10, 2024-01-25

118. Denial of Service - libde265 (CVE-2023-47471) - Medium [315]

Description: Buffer Overflow vulnerability in strukturag libde265 v1.10.12 allows a local attacker to cause a denial of service via the slice_segment_header function in the slice.cc component.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:struktur:libde265 (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.17553

debian: CVE-2023-47471 was patched at 2023-11-30, unknown date

119. Denial of Service - libtiff (CVE-2023-41175) - Medium [315]

Description: A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:libtiff:libtiff (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00058, EPSS Percentile is 0.21975

debian: CVE-2023-41175 was patched at 2023-11-27, unknown date

120. Arbitrary File Reading - Guava (CVE-2023-2976) - Medium [314]

Description: Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class. Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Arbitrary File Reading
Vulnerable Product is Common0.514Product detected by a:google:guava (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.06784

debian: CVE-2023-2976 was patched at unknown date

redhat: CVE-2023-2976 was patched at 2023-12-04

121. Information Disclosure - budgie_extras (CVE-2023-49342) - Medium [314]

Description: Temporary data passed between application components by Budgie Extras Clockworks applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:ubuntubudgie:budgie_extras (does NOT exist in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.0. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-49342 was patched at unknown date

ubuntu: CVE-2023-49342 was patched at 2023-12-14

122. Information Disclosure - budgie_extras (CVE-2023-49344) - Medium [314]

Description: Temporary data passed between application components by Budgie Extras Window Shuffler applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:ubuntubudgie:budgie_extras (does NOT exist in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.0. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-49344 was patched at unknown date

ubuntu: CVE-2023-49344 was patched at 2023-12-14

123. Information Disclosure - budgie_extras (CVE-2023-49345) - Medium [314]

Description: Temporary data passed between application components by Budgie Extras Takeabreak applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:ubuntubudgie:budgie_extras (does NOT exist in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.0. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-49345 was patched at unknown date

ubuntu: CVE-2023-49345 was patched at 2023-12-14

124. Information Disclosure - budgie_extras (CVE-2023-49346) - Medium [314]

Description: Temporary data passed between application components by Budgie Extras WeatherShow applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:ubuntubudgie:budgie_extras (does NOT exist in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.0. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-49346 was patched at unknown date

ubuntu: CVE-2023-49346 was patched at 2023-12-14

125. Information Disclosure - budgie_extras (CVE-2023-49347) - Medium [314]

Description: Temporary data passed between application components by Budgie Extras Windows Previews could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may read private information from windows, present false information to users, or deny access to the application.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:ubuntubudgie:budgie_extras (does NOT exist in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.0. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-49347 was patched at unknown date

ubuntu: CVE-2023-49347 was patched at 2023-12-14

126. Open Redirect - Horizon (CVE-2022-45582) - Medium [312]

Description: Open Redirect vulnerability in Horizon Web Dashboard 19.4.0 thru 20.1.4 via the success_url parameter.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.7515Open Redirect
Vulnerable Product is Common0.514Product detected by a:openstack:horizon (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.17651

debian: CVE-2022-45582 was patched at 2023-12-01, unknown date

127. Memory Corruption - Linux Kernel (CVE-2023-46862) - Medium [310]

Description: An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.510CVSS Base Score is 4.7. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-46862 was patched at 2024-01-02, 2024-01-11, unknown date

ubuntu: CVE-2023-46862 was patched at 2023-12-05

128. Denial of Service - Wireshark (CVE-2023-6174) - Medium [308]

Description: SSH dissector crash in Wireshark 4.0.0 to 4.0.10 allows denial of service via packet injection or crafted capture file

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education
CVSS Base Score0.610CVSS Base Score is 6.3. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00047, EPSS Percentile is 0.14184

debian: CVE-2023-6174 was patched at 2023-11-19, unknown date

129. Denial of Service - Pydantic (CVE-2021-29510) - Medium [303]

Description: Pydantic is a data validation and settings management using Python type hinting. In affected versions passing either `'infinity'`, `'inf'` or `float('inf')` (or their negatives) to `datetime` or `date` fields causes validation to run forever with 100% CPU usage (on one CPU). Pydantic has been patched with fixes available in the following versions: v1.8.2, v1.7.4, v1.6.2. All these versions are available on pypi(https://pypi.org/project/pydantic/#history), and will be available on conda-forge(https://anaconda.org/conda-forge/pydantic) soon. See the changelog(https://pydantic-docs.helpmanual.io/) for details. If you absolutely can't upgrade, you can work around this risk using a validator(https://pydantic-docs.helpmanual.io/usage/validators/) to catch these values. This is not an ideal solution (in particular you'll need a slightly different function for datetimes), instead of a hack like this you should upgrade pydantic. If you are not using v1.8.x, v1.7.x or v1.6.x and are unable to upgrade to a fixed version of pydantic, please create an issue at https://github.com/samuelcolvin/pydantic/issues requesting a back-port, and we will endeavour to release a patch for earlier versions of pydantic.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:pydantic_project:pydantic (exists in CPE dict)
CVSS Base Score0.310CVSS Base Score is 3.3. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00176, EPSS Percentile is 0.54804

debian: CVE-2021-29510 was patched at unknown date

ubuntu: CVE-2021-29510 was patched at 2023-12-12

130. Denial of Service - avahi (CVE-2023-38469) - Medium [291]

Description: A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:avahi:avahi (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.2. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.06784

debian: CVE-2023-38469 was patched at unknown date

ubuntu: CVE-2023-38469 was patched at 2023-11-20

oraclelinux: CVE-2023-38469 was patched at 2023-12-15

almalinux: CVE-2023-38469 was patched at 2023-12-14

redhat: CVE-2023-38469 was patched at 2023-12-14, 2024-01-25

131. Denial of Service - avahi (CVE-2023-38470) - Medium [291]

Description: A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:avahi:avahi (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.2. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.06784

debian: CVE-2023-38470 was patched at unknown date

ubuntu: CVE-2023-38470 was patched at 2023-11-20

oraclelinux: CVE-2023-38470 was patched at 2023-12-15

almalinux: CVE-2023-38470 was patched at 2023-12-14

redhat: CVE-2023-38470 was patched at 2023-12-14, 2024-01-25

132. Denial of Service - avahi (CVE-2023-38471) - Medium [291]

Description: A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:avahi:avahi (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.2. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.06784

debian: CVE-2023-38471 was patched at unknown date

ubuntu: CVE-2023-38471 was patched at 2023-11-20

oraclelinux: CVE-2023-38471 was patched at 2023-12-15

almalinux: CVE-2023-38471 was patched at 2023-12-14

redhat: CVE-2023-38471 was patched at 2023-12-14, 2024-01-25

133. Denial of Service - avahi (CVE-2023-38472) - Medium [291]

Description: A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:avahi:avahi (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.2. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.06784

debian: CVE-2023-38472 was patched at unknown date

ubuntu: CVE-2023-38472 was patched at 2023-11-20

oraclelinux: CVE-2023-38472 was patched at 2023-12-15

almalinux: CVE-2023-38472 was patched at 2023-12-14

redhat: CVE-2023-38472 was patched at 2023-12-14, 2024-01-25

134. Denial of Service - avahi (CVE-2023-38473) - Medium [291]

Description: A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:avahi:avahi (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.2. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.06784

debian: CVE-2023-38473 was patched at unknown date

ubuntu: CVE-2023-38473 was patched at 2023-11-20

oraclelinux: CVE-2023-38473 was patched at 2023-12-15

almalinux: CVE-2023-38473 was patched at 2023-12-14

redhat: CVE-2023-38473 was patched at 2023-12-14, 2024-01-25

135. Memory Corruption - vim (CVE-2023-48231) - Medium [289]

Description: Vim is an open source command line text editor. When closing a window, vim may try to access already freed window structure. Exploitation beyond crashing the application has not been shown to be viable. This issue has been addressed in commit `25aabc2b` which has been included in release version 9.0.2106. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score0.410CVSS Base Score is 3.9. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00071, EPSS Percentile is 0.29407

debian: CVE-2023-48231 was patched at unknown date

ubuntu: CVE-2023-48231 was patched at 2023-12-14

136. Memory Corruption - Artifex Ghostscript (CVE-2023-46751) - Medium [282]

Description: An issue was discovered in the function gdev_prn_open_printer_seekable() in Artifex Ghostscript through 10.02.0 allows remote attackers to crash the application via a dangling pointer.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.314Artifex Ghostscript is an interpreter for the PostScript® language and PDF files
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.0009, EPSS Percentile is 0.38048

debian: CVE-2023-46751 was patched at 2023-12-15, unknown date

ubuntu: CVE-2023-46751 was patched at 2023-12-12

137. Incorrect Calculation - grafana (CVE-2023-2801) - Medium [279]

Description: Grafana is an open-source platform for monitoring and observability. Using public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance. The only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly. This might enable malicious users to crash Grafana instances through that endpoint. Users may upgrade to version 9.4.12 and 9.5.3 to receive a fix.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514Product detected by a:grafana:grafana (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10871

redhat: CVE-2023-2801 was patched at 2023-12-12

138. Path Traversal - SSHD (CVE-2023-35887) - Medium [279]

Description: Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA. In SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover "exists/does not exist" information about items outside the rooted tree via paths including parent navigation ("..") beyond the root, or involving symlinks. This issue affects Apache MINA: from 1.0 before 2.10. Users are recommended to upgrade to 2.10

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Path Traversal
Vulnerable Product is Common0.514Product detected by a:apache:sshd (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 5.0. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10376

redhat: CVE-2023-35887 was patched at 2023-12-04

139. Unknown Vulnerability Type - Mozilla Firefox (CVE-2023-6208) - Medium [276]

Description: {'nvd_cve_data_all': 'When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard. *This bug only affects Firefox on X11. Other systems are unaffected.* This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard.\n*This bug only affects Firefox on X11. Other systems are unaffected.* This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.0008, EPSS Percentile is 0.33431

debian: CVE-2023-6208 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date

ubuntu: CVE-2023-6208 was patched at 2023-11-23, 2023-11-27

oraclelinux: CVE-2023-6208 was patched at 2023-11-27, 2023-11-28

almalinux: CVE-2023-6208 was patched at 2023-11-27

redhat: CVE-2023-6208 was patched at 2023-11-27, 2023-11-28, 2023-11-29

140. Incorrect Calculation - vim (CVE-2023-48232) - Medium [267]

Description: Vim is an open source command line text editor. A floating point exception may occur when calculating the line offset for overlong lines and smooth scrolling is enabled and the cpo-settings include the 'n' flag. This may happen when a window border is present and when the wrapped line continues on the next physical line directly in the window border because the 'cpo' setting includes the 'n' flag. Only users with non-default settings are affected and the exception should only result in a crash. This issue has been addressed in commit `cb0b99f0` which has been included in release version 9.0.2107. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514Product detected by a:vim:vim (exists in CPE dict)
CVSS Base Score0.410CVSS Base Score is 3.9. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00101, EPSS Percentile is 0.41171

debian: CVE-2023-48232 was patched at unknown date

ubuntu: CVE-2023-48232 was patched at 2023-12-14

141. Incorrect Calculation - vim (CVE-2023-48235) - Medium [267]

Description: Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an overflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `060623e` which has been included in release version 9.0.2110. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514Product detected by a:vim:vim (exists in CPE dict)
CVSS Base Score0.310CVSS Base Score is 2.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00164, EPSS Percentile is 0.53045

debian: CVE-2023-48235 was patched at unknown date

ubuntu: CVE-2023-48235 was patched at 2023-12-14

142. Memory Corruption - perl (CVE-2023-47038) - Medium [267]

Description: A vulnerability was found in perl. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:perl:perl (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 7.0. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-47038 was patched at unknown date

ubuntu: CVE-2023-47038 was patched at 2023-11-27

143. Incorrect Calculation - vim (CVE-2023-48233) - Medium [255]

Description: Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `ac6378773` which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514Product detected by a:vim:vim (exists in CPE dict)
CVSS Base Score0.310CVSS Base Score is 2.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00101, EPSS Percentile is 0.41171

debian: CVE-2023-48233 was patched at unknown date

ubuntu: CVE-2023-48233 was patched at 2023-12-14

144. Incorrect Calculation - vim (CVE-2023-48234) - Medium [255]

Description: Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `58f9befca1` which has been included in release version 9.0.2109. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514Product detected by a:vim:vim (exists in CPE dict)
CVSS Base Score0.310CVSS Base Score is 2.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00101, EPSS Percentile is 0.41171

debian: CVE-2023-48234 was patched at unknown date

ubuntu: CVE-2023-48234 was patched at 2023-12-14

145. Incorrect Calculation - vim (CVE-2023-48236) - Medium [255]

Description: Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514Product detected by a:vim:vim (exists in CPE dict)
CVSS Base Score0.310CVSS Base Score is 2.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00101, EPSS Percentile is 0.41171

debian: CVE-2023-48236 was patched at unknown date

ubuntu: CVE-2023-48236 was patched at 2023-12-14

146. Incorrect Calculation - vim (CVE-2023-48237) - Medium [255]

Description: Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it may be possible to overflow the size of integer. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `6bf131888` which has been included in version 9.0.2112. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514Product detected by a:vim:vim (exists in CPE dict)
CVSS Base Score0.310CVSS Base Score is 2.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00101, EPSS Percentile is 0.41171

debian: CVE-2023-48237 was patched at unknown date

ubuntu: CVE-2023-48237 was patched at 2023-12-14

147. Memory Corruption - linux_kernel (CVE-2023-3006) - Medium [255]

Description: A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim's hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by o:linux:linux_kernel (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.06784

debian: CVE-2023-3006 was patched at unknown date

ubuntu: CVE-2023-3006 was patched at 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-09, 2024-01-10

148. Memory Corruption - Opensc (CVE-2023-40661) - Medium [244]

Description: Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:opensc_project:opensc (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 5.4. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-40661 was patched at 2023-11-27, unknown date

oraclelinux: CVE-2023-40661 was patched at 2023-12-18, 2023-12-19

almalinux: CVE-2023-40661 was patched at 2023-12-19

redhat: CVE-2023-40661 was patched at 2023-12-19

149. Security Feature Bypass - Unknown Product (CVE-2023-6291) - Medium [244]

Description: {'nvd_cve_data_all': 'A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.710CVSS Base Score is 7.1. According to NVD data source
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

redhat: CVE-2023-6291 was patched at 2023-12-14

150. Spoofing - Visual Studio Code (CVE-2023-33144) - Medium [240]

Description: Visual Studio Code Spoofing Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.314Integrated development environment
CVSS Base Score0.710CVSS Base Score is 6.6. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00066, EPSS Percentile is 0.27147

redos: CVE-2023-33144 was patched at 2023-11-21

151. Unknown Vulnerability Type - Mozilla Firefox (CVE-2023-6210) - Medium [240]

Description: {'nvd_cve_data_all': 'When an https: web page created a pop-up from a "javascript:" URL, that pop-up was incorrectly allowed to load blockable content such as iframes from insecure http: URLs This vulnerability affects Firefox < 120.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'When an https: web page created a pop-up from a "javascript:" URL, that pop-up was incorrectly allowed to load blockable content such as iframes from insecure http: URLs This vulnerability affects Firefox < 120.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00054, EPSS Percentile is 0.19514

ubuntu: CVE-2023-6210 was patched at 2023-11-23

152. Unknown Vulnerability Type - Linux Kernel (CVE-2023-38409) - Medium [233]

Description: {'nvd_cve_data_all': 'An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info).', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info).', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.06784

debian: CVE-2023-38409 was patched at unknown date

oraclelinux: CVE-2023-38409 was patched at 2024-01-26

redhat: CVE-2023-38409 was patched at 2023-11-28, 2024-01-25

153. Spoofing - Visual Studio Code (CVE-2023-29338) - Medium [228]

Description: Visual Studio Code Spoofing Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.314Integrated development environment
CVSS Base Score0.710CVSS Base Score is 6.6. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00062, EPSS Percentile is 0.24841

redos: CVE-2023-29338 was patched at 2023-11-21

Low (12)

154. Unknown Vulnerability Type - FRRouting (CVE-2023-38407) - Low [190]

Description: {'nvd_cve_data_all': 'bgpd/bgp_label.c in FRRouting (FRR) before 8.5 attempts to read beyond the end of the stream during labeled unicast parsing.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'bgpd/bgp_label.c in FRRouting (FRR) before 8.5 attempts to read beyond the end of the stream during labeled unicast parsing.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.514Free Range Routing or FRRouting or FRR is a network routing software suite running on Unix-like platforms, particularly Linux, Solaris, OpenBSD, FreeBSD and NetBSD
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00047, EPSS Percentile is 0.14184

debian: CVE-2023-38407 was patched at unknown date

ubuntu: CVE-2023-38407 was patched at 2023-11-21

oraclelinux: CVE-2023-38407 was patched at 2024-01-12, 2024-01-26

almalinux: CVE-2023-38407 was patched at 2024-01-10, 2024-01-25

redhat: CVE-2023-38407 was patched at 2024-01-10, 2024-01-25

155. Unknown Vulnerability Type - OpenDKIM (CVE-2022-48521) - Low [178]

Description: {'nvd_cve_data_all': 'An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers when removing fake Authentication-Results header fields, which allows a remote attacker to craft an e-mail message with a fake sender address such that programs that rely on Authentication-Results from OpenDKIM will treat the message as having a valid DKIM signature when in fact it has none.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers when removing fake Authentication-Results header fields, which allows a remote attacker to craft an e-mail message with a fake sender address such that programs that rely on Authentication-Results from OpenDKIM will treat the message as having a valid DKIM signature when in fact it has none.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.514Product detected by a:opendkim:opendkim (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 5.3. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00073, EPSS Percentile is 0.29994

debian: CVE-2022-48521 was patched at 2023-12-03, unknown date

156. Unknown Vulnerability Type - Unknown Product (CVE-2023-39804) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-39804 was patched at unknown date

ubuntu: CVE-2023-39804 was patched at 2023-12-11

157. Unknown Vulnerability Type - Unknown Product (CVE-2023-44429) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-44429 was patched at 2023-11-25, unknown date

ubuntu: CVE-2023-44429 was patched at 2023-11-29

oraclelinux: CVE-2023-44429 was patched at 2023-12-15

almalinux: CVE-2023-44429 was patched at 2023-12-13

redhat: CVE-2023-44429 was patched at 2023-12-13, 2023-12-19

158. Unknown Vulnerability Type - Unknown Product (CVE-2023-44441) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-44441 was patched at 2023-11-24, 2023-11-30, unknown date

ubuntu: CVE-2023-44441 was patched at 2023-11-29

159. Unknown Vulnerability Type - Unknown Product (CVE-2023-44442) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-44442 was patched at 2023-11-21, 2023-11-24, unknown date

ubuntu: CVE-2023-44442 was patched at 2023-11-29

160. Unknown Vulnerability Type - Unknown Product (CVE-2023-44443) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-44443 was patched at 2023-11-24, unknown date

ubuntu: CVE-2023-44443 was patched at 2023-11-29

161. Unknown Vulnerability Type - Unknown Product (CVE-2023-44444) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-44444 was patched at 2023-11-21, 2023-11-24, unknown date

ubuntu: CVE-2023-44444 was patched at 2023-11-29

162. Unknown Vulnerability Type - Unknown Product (CVE-2023-44446) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-44446 was patched at 2023-11-25, 2023-11-29, unknown date

ubuntu: CVE-2023-44446 was patched at 2023-11-29

oraclelinux: CVE-2023-44446 was patched at 2023-12-15, 2023-12-19, 2024-01-02, 2024-01-18

almalinux: CVE-2023-44446 was patched at 2023-12-13, 2023-12-14

redhat: CVE-2023-44446 was patched at 2023-12-13, 2023-12-14, 2023-12-19, 2024-01-02, 2024-01-17

163. Unknown Vulnerability Type - Unknown Product (CVE-2023-4503) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

redhat: CVE-2023-4503 was patched at 2023-12-04

164. Unknown Vulnerability Type - Unknown Product (CVE-2023-5616) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-5616 was patched at unknown date

ubuntu: CVE-2023-5616 was patched at 2023-12-13

165. Unknown Vulnerability Type - Unknown Product (CVE-2023-6175) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-6175 was patched at 2023-11-19, unknown date

Exploitation in the wild detected (5)

Security Feature Bypass (1)

Information Disclosure (2)

Remote Code Execution (1)

Incorrect Calculation (1)

Public exploit exists, but exploitation in the wild is NOT detected (30)

Security Feature Bypass (2)

Remote Code Execution (4)

Elevation of Privilege (2)

Authentication Bypass (3)

Denial of Service (10)

Memory Corruption (5)

Incorrect Calculation (1)

Unknown Vulnerability Type (3)

Other Vulnerabilities (130)

Remote Code Execution (11)

Security Feature Bypass (11)

Elevation of Privilege (5)

Denial of Service (25)

Memory Corruption (30)

Information Disclosure (10)

Code Injection (1)

Path Traversal (2)

Authentication Bypass (3)

Incorrect Calculation (10)

Spoofing (3)

Cross Site Scripting (2)

Arbitrary File Reading (1)

Open Redirect (1)

Unknown Vulnerability Type (15)