Report Name: Linux Patch Wednesday November 2023
Generated: 2024-01-30 02:38:05

Vulristics Vulnerability Scores
Basic Vulnerability Scores
Products

Product NamePrevalenceUCHMLAComment
Kerberos1112Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet
Apache HTTP Server0.922Apache HTTP Server is a free and open-source web server that delivers web content through the internet
Intel(R) Processor0.911Intel's processors from the pioneering 4-bit 4004 (1971) to the present high-end offerings
Linux Kernel0.941216The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
Chromium0.814115Chromium is a free and open-source web browser project, mainly developed and maintained by Google
GNOME desktop0.8112GNOME originally an acronym for GNU Network Object Model Environment, is a free and open-source desktop environment for Linux and other Unix-like operating systems
Mozilla Firefox0.81910Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
Node.js0.8112Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more
OpenSSL0.811A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end
FFmpeg0.711FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
QEMU0.711QEMU is a generic and open source machine & userspace emulator and virtualizer
VMware Tools0.711VMware Tools is a set of services and modules that enable several features in VMware products for better management of, and seamless user interactions with, guests operating systems
vim0.71010Vim is a free and open-source, screen-based text editor program
ImageMagick0.611ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images
Jetty0.611Jetty is a Java based web server and servlet engine
Python0.6112Python is a high-level, general-purpose programming language
Redis0.622Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability
Roundcube0.611Roundcube is a web-based IMAP email client
tiffcrop0.611Tiffcrop processes one or more files created according to the Tag Image File Format, Revision 6.0, specification into one or more TIFF file(s)
Audio File Library0.522Product detected by a:audio_file_library_project:audio_file_library (exists in CPE dict)
Barbican0.511Product detected by a:openstack:barbican (exists in CPE dict)
Cacti0.5448Cacti is an open source operational monitoring and fault management framework
Calendar0.511Product detected by a:nextcloud:calendar (exists in CPE dict)
Cobbler0.524410Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS
Create Agent0.511Product detected by a:arduino:create_agent (exists in CPE dict)
GLPI0.599Product detected by a:glpi-project:glpi (exists in CPE dict)
Ghostscript0.511Product detected by a:artifex:ghostscript (exists in CPE dict)
Go0.5145Product detected by a:golang:go (exists in CPE dict)
MySQL0.51414Product detected by a:oracle:mysql (exists in CPE dict)
NSS0.511Product detected by a:mozilla:nss (exists in CPE dict)
Networking0.511Product detected by a:golang:networking (exists in CPE dict)
Open VM Tools0.511Product detected by a:vmware:open_vm_tools (exists in CPE dict)
Open Virtual Network0.511Product detected by a:ovn:open_virtual_network (exists in CPE dict)
Procps0.511Product detected by a:procps_project:procps (exists in CPE dict)
Rabbitmq-c0.511Product detected by a:rabbitmq-c_project:rabbitmq-c (exists in CPE dict)
Request Tracker0.533Product detected by a:bestpractical:request_tracker (exists in CPE dict)
Sanitize0.511Product detected by a:sanitize_project:sanitize (exists in CPE dict)
Slurm0.511Product detected by a:schedmd:slurm (exists in CPE dict)
Squid0.533Product detected by a:squid-cache:squid (exists in CPE dict)
TPM2 Software Stack0.511Product detected by a:tpm2_software_stack_project:tpm2_software_stack (exists in CPE dict)
Tang0.511Product detected by a:tang_project:tang (exists in CPE dict)
Traceroute0.511Product detected by a:buc:traceroute (exists in CPE dict)
Traffic Server0.511Product detected by a:apache:traffic_server (exists in CPE dict)
VLC Media Player0.522Product detected by a:videolan:vlc_media_player (exists in CPE dict)
X Server0.522Product detected by a:x.org:x_server (exists in CPE dict)
Xrdp0.533xrdp is an open source remote desktop protocol server
ZooKeeper0.511Product detected by a:apache:zookeeper (exists in CPE dict)
browserify-sign0.511Product detected by a:browserify:browserify-sign (exists in CPE dict)
certifi0.511Product detected by a:kennethreitz:certifi (exists in CPE dict)
ffmpeg0.566Product detected by a:ffmpeg:ffmpeg (exists in CPE dict)
goproxy0.511Product detected by a:goproxy_project:goproxy (exists in CPE dict)
grafana0.577Product detected by a:grafana:grafana (exists in CPE dict)
http::tiny0.511Product detected by a:httptiny_project:httptiny (does NOT exist in CPE dict)
insights-client0.511Product detected by a:redhat:insights-client (exists in CPE dict)
libsndfile0.511Product detected by a:libsndfile_project:libsndfile (exists in CPE dict)
memcached0.522Product detected by a:memcached:memcached (exists in CPE dict)
nextcloud_server0.511Product detected by a:nextcloud:nextcloud_server (exists in CPE dict)
plexus-archiver0.511Product detected by a:codehaus-plexus:plexus-archiver (exists in CPE dict)
postgresql0.5123Product detected by a:postgresql:postgresql (exists in CPE dict)
qt0.511Product detected by a:qt:qt (exists in CPE dict)
shadow-utils0.511Product detected by a:shadow-maint:shadow-utils (does NOT exist in CPE dict)
urllib30.522Product detected by a:python:urllib3 (exists in CPE dict)
zchunk0.511Product detected by a:zchunk:zchunk (exists in CPE dict)
zlib0.511Product detected by a:zlib:zlib (exists in CPE dict)
GPAC0.4123GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity)
Unknown Product077Unknown Product


Vulnerability Types

Vulnerability TypeCriticalityUCHMLA
Remote Code Execution1.066113
Code Injection0.97123
Command Injection0.9722
Arbitrary File Writing0.9511
Authentication Bypass0.95178
Security Feature Bypass0.914923
Elevation of Privilege0.851258
Arbitrary File Reading0.8311
Information Disclosure0.8311718
Cross Site Scripting0.81269
Open Redirect0.75112
Denial of Service0.7153045
Path Traversal0.7134
Incorrect Calculation0.54610
Memory Corruption0.5201333
Spoofing0.433
Unknown Vulnerability Type099


Comments

SourceUCHMLA
debian1564558133
ubuntu340516100
oraclelinux31544163
almalinux11440156
redhat21645164
redos11120234


Vulnerabilities

Urgent (1)

1. Cross Site Scripting - Roundcube (CVE-2023-5631) - Urgent [826]

Description: Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), NVD:CISAKEV websites
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.614Roundcube is a web-based IMAP email client
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.0068, EPSS Percentile is 0.77872

debian: CVE-2023-5631 was patched at 2023-10-23, 2023-10-25, unknown date

redos: CVE-2023-5631 was patched at 2023-10-26

Critical (9)

2. Remote Code Execution - Cacti (CVE-2023-39361) - Critical [702]

Description: Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there could be the potential for significant damage. Attackers may exploit this vulnerability, and there may be possibilities for actions such as the usurpation of administrative privileges or remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Cacti is an open source operational monitoring and fault management framework
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.13486, EPSS Percentile is 0.95109

debian: CVE-2023-39361 was patched at 2023-11-08, unknown date

3. Remote Code Execution - Cobbler (CVE-2017-1000469) - Critical [678]

Description: Cobbler version up to 2.8.2 is vulnerable to a command injection vulnerability in the "add repo" component resulting in arbitrary code execution as root user.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.0115, EPSS Percentile is 0.83298

ubuntu: CVE-2017-1000469 was patched at 2023-11-13

4. Remote Code Execution - Cacti (CVE-2023-39362) - Critical [654]

Description: Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, under certain conditions, an authenticated privileged user, can use a malicious string in the SNMP options of a Device, performing command injection and obtaining remote code execution on the underlying server. The `lib/snmp.php` file has a set of functions, with similar behavior, that accept in input some variables and place them into an `exec` call without a proper escape or validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Cacti is an open source operational monitoring and fault management framework
CVSS Base Score0.710CVSS Base Score is 7.2. According to NVD data source
EPSS Percentile0.910EPSS Probability is 0.01493, EPSS Percentile is 0.85527

debian: CVE-2023-39362 was patched at 2023-11-08, unknown date

5. Arbitrary File Writing - Python (CVE-2007-4559) - Critical [650]

Description: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:mail.python.org website
Criticality of Vulnerability Type0.9515Arbitrary File Writing
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score0.710CVSS Base Score is 6.8. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.00947, EPSS Percentile is 0.81465

oraclelinux: CVE-2007-4559 was patched at 2023-11-11, 2023-11-17, 2023-11-18

almalinux: CVE-2007-4559 was patched at 2023-11-07, 2023-11-14

redhat: CVE-2007-4559 was patched at 2023-11-07, 2023-11-08, 2023-11-14, 2024-01-23, 2024-01-25

6. Remote Code Execution - Cacti (CVE-2023-39357) - Critical [642]

Description: Cacti is an open source operational monitoring and fault management framework. A defect in the sql_save function was discovered. When the column type is numeric, the sql_save function directly utilizes user input. Many files and functions calling the sql_save function do not perform prior validation of user input, leading to the existence of multiple SQL injection vulnerabilities in Cacti. This allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation and remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Cacti is an open source operational monitoring and fault management framework
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00215, EPSS Percentile is 0.59568

debian: CVE-2023-39357 was patched at 2023-11-08, unknown date

7. Remote Code Execution - plexus-archiver (CVE-2023-37460) - Critical [642]

Description: Plexis Archiver is a collection of Plexus components to create archives or extract archives to a directory with a unified `Archiver`/`UnArchiver` API. Prior to version 4.8.0, using AbstractUnArchiver for extracting an archive might lead to an arbitrary file creation and possibly remote code execution. When extracting an archive with an entry that already exists in the destination directory as a symbolic link whose target does not exist - the `resolveFile()` function will return the symlink's source instead of its target, which will pass the verification that ensures the file will not be extracted outside of the destination directory. Later `Files.newOutputStream()`, that follows symlinks by default, will actually write the entry's content to the symlink's target. Whoever uses plexus archiver to extract an untrusted archive is vulnerable to an arbitrary file creation and possibly remote code execution. Version 4.8.0 contains a patch for this issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Product detected by a:codehaus-plexus:plexus-archiver (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 8.1. According to NVD data source
EPSS Percentile0.710EPSS Probability is 0.00404, EPSS Percentile is 0.71027

oraclelinux: CVE-2023-37460 was patched at 2023-11-13

redhat: CVE-2023-37460 was patched at 2023-11-13

8. Remote Code Execution - Cacti (CVE-2023-39359) - Critical [630]

Description: Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability was discovered which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `graphs.php` file. When dealing with the cases of ajax_hosts and ajax_hosts_noany, if the `site_id` parameter is greater than 0, it is directly reflected in the WHERE clause of the SQL statement. This creates an SQL injection vulnerability. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Cacti is an open source operational monitoring and fault management framework
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00168, EPSS Percentile is 0.53563

debian: CVE-2023-39359 was patched at 2023-11-08, unknown date

9. Elevation of Privilege - Intel(R) Processor (CVE-2023-23583) - Critical [623]

Description: Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Vulnerability in Intel Core I3-10100Y Firmware)
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914Intel's processors from the pioneering 4-bit 4004 (1971) to the present high-end offerings
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-23583 was patched at 2023-11-23, 2023-12-16, unknown date

ubuntu: CVE-2023-23583 was patched at 2023-11-17

oraclelinux: CVE-2023-23583 was patched at 2023-11-13, 2023-11-16

10. Authentication Bypass - Cobbler (CVE-2022-0860) - Critical [622]

Description: Improper Authorization in GitHub repository cobbler/cobbler prior to 3.3.2.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.514Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS
CVSS Base Score0.910CVSS Base Score is 9.1. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00149, EPSS Percentile is 0.50899

ubuntu: CVE-2022-0860 was patched at 2023-11-13

High (70)

11. Denial of Service - Jetty (CVE-2023-36478) - High [594]

Description: Eclipse Jetty provides a web server and servlet container. In versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52, an integer overflow in `MetaDataBuilder.checkSize` allows for HTTP/2 HPACK header values to exceed their size limit. `MetaDataBuilder.java` determines if a header name or value exceeds the size limit, and throws an exception if the limit is exceeded. However, when length is very large and huffman is true, the multiplication by 4 in line 295 will overflow, and length will become negative. `(_size+length)` will now be negative, and the check on line 296 will not be triggered. Furthermore, `MetaDataBuilder.checkSize` allows for user-entered HPACK header value sizes to be negative, potentially leading to a very large buffer allocation later on when the user-entered size is multiplied by 2. This means that if a user provides a negative length value (or, more precisely, a length value which, when multiplied by the 4/3 fudge factor, is negative), and this length value is a very large positive number when multiplied by 2, then the user can cause a very large buffer to be allocated on the server. Users of HTTP/2 can be impacted by a remote denial of service attack. The issue has been fixed in versions 11.0.16, 10.0.16, and 9.4.53. There are no known workarounds.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614Jetty is a Java based web server and servlet engine
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.0025, EPSS Percentile is 0.6295

debian: CVE-2023-36478 was patched at 2023-10-30, unknown date

12. Code Injection - Cacti (CVE-2023-39365) - High [589]

Description: Cacti is an open source operational monitoring and fault management framework. Issues with Cacti Regular Expression validation combined with the external links feature can lead to limited SQL Injections and subsequent data leakage. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.514Cacti is an open source operational monitoring and fault management framework
CVSS Base Score0.510CVSS Base Score is 4.6. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00184, EPSS Percentile is 0.55825

debian: CVE-2023-39365 was patched at 2023-11-08, unknown date

13. Command Injection - Cobbler (CVE-2021-45082) - High [589]

Description: An issue was discovered in Cobbler before 3.3.1. In the templar.py file, the function check_for_invalid_imports can allow Cheetah code to import Python modules via the "#from MODULE import" substring. (Only lines beginning with #import are blocked.)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:bugzilla.suse.com website
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common0.514Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28604

ubuntu: CVE-2021-45082 was patched at 2023-11-13

14. Arbitrary File Reading - Cobbler (CVE-2014-3225) - High [588]

Description: Absolute path traversal vulnerability in the web interface in Cobbler 2.4.x through 2.6.x allows remote authenticated users to read arbitrary files via the Kickstart field in a profile.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:www.youtube.com website
Criticality of Vulnerability Type0.8315Arbitrary File Reading
Vulnerable Product is Common0.514Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS
CVSS Base Score0.410CVSS Base Score is 4.0. According to NVD data source
EPSS Percentile0.910EPSS Probability is 0.02927, EPSS Percentile is 0.89819

ubuntu: CVE-2014-3225 was patched at 2023-11-13

15. Security Feature Bypass - Python (CVE-2023-41105) - High [582]

Description: An issue was discovered in Python 3.11 through 3.11.4. If a path containing '\0' bytes is passed to os.path.normpath(), the path will be truncated unexpectedly at the first '\0' byte. There are plausible cases in which an application would have rejected a filename for security reasons in Python 3.10.x or earlier, but that filename is no longer rejected in Python 3.11.x.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Untrusted Search Path in Python, [githubexploit] Exploit for Untrusted Search Path in Python)
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00055, EPSS Percentile is 0.20473

debian: CVE-2023-41105 was patched at unknown date

ubuntu: CVE-2023-41105 was patched at 2023-12-11

oraclelinux: CVE-2023-41105 was patched at 2023-11-11, 2023-11-17

almalinux: CVE-2023-41105 was patched at 2023-11-07, 2023-11-14

redhat: CVE-2023-41105 was patched at 2023-11-07, 2023-11-14

16. Denial of Service - ffmpeg (CVE-2020-20898) - High [577]

Description: Integer Overflow vulnerability in function filter16_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:trac.ffmpeg.org website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:ffmpeg:ffmpeg (exists in CPE dict)
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00155, EPSS Percentile is 0.51757

debian: CVE-2020-20898 was patched at unknown date

ubuntu: CVE-2020-20898 was patched at 2023-10-24

17. Denial of Service - ffmpeg (CVE-2021-38090) - High [577]

Description: Integer Overflow vulnerability in function filter16_roberts in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:trac.ffmpeg.org website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:ffmpeg:ffmpeg (exists in CPE dict)
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00155, EPSS Percentile is 0.51757

debian: CVE-2021-38090 was patched at unknown date

ubuntu: CVE-2021-38090 was patched at 2023-10-24

18. Denial of Service - ffmpeg (CVE-2021-38091) - High [577]

Description: Integer Overflow vulnerability in function filter16_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:trac.ffmpeg.org website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:ffmpeg:ffmpeg (exists in CPE dict)
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00155, EPSS Percentile is 0.51757

debian: CVE-2021-38091 was patched at unknown date

ubuntu: CVE-2021-38091 was patched at 2023-10-24

19. Denial of Service - ffmpeg (CVE-2021-38092) - High [577]

Description: Integer Overflow vulnerability in function filter_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:trac.ffmpeg.org website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:ffmpeg:ffmpeg (exists in CPE dict)
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00155, EPSS Percentile is 0.51757

debian: CVE-2021-38092 was patched at unknown date

ubuntu: CVE-2021-38092 was patched at 2023-10-24

20. Denial of Service - ffmpeg (CVE-2021-38093) - High [577]

Description: Integer Overflow vulnerability in function filter_robert in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:trac.ffmpeg.org website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:ffmpeg:ffmpeg (exists in CPE dict)
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00155, EPSS Percentile is 0.51757

debian: CVE-2021-38093 was patched at unknown date

ubuntu: CVE-2021-38093 was patched at 2023-10-24

21. Denial of Service - ffmpeg (CVE-2021-38094) - High [577]

Description: Integer Overflow vulnerability in function filter_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:trac.ffmpeg.org website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:ffmpeg:ffmpeg (exists in CPE dict)
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00155, EPSS Percentile is 0.51757

debian: CVE-2021-38094 was patched at unknown date

ubuntu: CVE-2021-38094 was patched at 2023-10-24

22. Denial of Service - FFmpeg (CVE-2020-22038) - High [575]

Description: A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the ff_v4l2_m2m_create_context function in v4l2_m2m.c.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:trac.ffmpeg.org website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00088, EPSS Percentile is 0.3684

debian: CVE-2020-22038 was patched at unknown date

ubuntu: CVE-2020-22038 was patched at 2023-10-24

23. Memory Corruption - vim (CVE-2023-5344) - High [575]

Description: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00182, EPSS Percentile is 0.55585

debian: CVE-2023-5344 was patched at unknown date

ubuntu: CVE-2023-5344 was patched at 2023-10-25

24. Denial of Service - Audio File Library (CVE-2019-13147) - High [553]

Description: In Audio File Library (aka audiofile) 0.3.6, there exists one NULL pointer dereference bug in ulaw2linear_buf in G711.cpp in libmodules.a that allows an attacker to cause a denial of service via a crafted file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:audio_file_library_project:audio_file_library (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00146, EPSS Percentile is 0.50553

debian: CVE-2019-13147 was patched at 2023-11-13, unknown date

ubuntu: CVE-2019-13147 was patched at 2023-12-14

25. Remote Code Execution - TPM2 Software Stack (CVE-2023-22745) - High [547]

Description: tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Product detected by a:tpm2_software_stack_project:tpm2_software_stack (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.4. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-22745 was patched at unknown date

oraclelinux: CVE-2023-22745 was patched at 2023-11-11, 2023-11-17

almalinux: CVE-2023-22745 was patched at 2023-11-07, 2023-11-14

redhat: CVE-2023-22745 was patched at 2023-11-07, 2023-11-14

26. Memory Corruption - VLC Media Player (CVE-2023-47359) - High [541]

Description: Videolan VLC prior to version 3.0.20 contains an incorrect offset read that leads to a Heap-Based Buffer Overflow in function GetPacket() and results in a memory corruption.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:0xariana.github.io website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:videolan:vlc_media_player (exists in CPE dict)
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00087, EPSS Percentile is 0.36563

debian: CVE-2023-47359 was patched at 2023-11-02, 2023-12-01, unknown date

redos: CVE-2023-47359 was patched at 2023-11-21

27. Denial of Service - libsndfile (CVE-2022-33065) - High [529]

Description: Multiple signed integers overflow in function au_read_header in src/au.c and in functions mat4_open and mat4_read_header in src/mat4.c in Libsndfile, allows an attacker to cause Denial of Service or other unspecified impacts.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:libsndfile_project:libsndfile (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00053, EPSS Percentile is 0.19018

debian: CVE-2022-33065 was patched at unknown date

ubuntu: CVE-2022-33065 was patched at 2023-11-02

28. Memory Corruption - Audio File Library (CVE-2022-24599) - High [529]

Description: In autofile Audio File Library 0.3.6, there exists one memory leak vulnerability in printfileinfo, in printinfo.c, which allows an attacker to leak sensitive information via a crafted file. The printfileinfo function calls the copyrightstring function to get data, however, it dosn't use zero bytes to truncate the data.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:audio_file_library_project:audio_file_library (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00263, EPSS Percentile is 0.64022

debian: CVE-2022-24599 was patched at 2023-11-13, unknown date

ubuntu: CVE-2022-24599 was patched at 2023-12-14

29. Security Feature Bypass - Traceroute (CVE-2023-46316) - High [529]

Description: In buc Traceroute 2.0.12 through 2.1.2 before 2.1.3, the wrapper scripts do not properly parse command lines.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Traceroute 2.1.2 Privilege Escalation, [zdt] Traceroute 2.1.2 Privilege Escalation Vulnerability)
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:buc:traceroute (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-46316 was patched at unknown date

ubuntu: CVE-2023-46316 was patched at 2023-11-14

redos: CVE-2023-46316 was patched at 2023-11-02

30. Incorrect Calculation - vim (CVE-2023-3896) - High [527]

Description: Divide By Zero in vim/vim from 9.0.1367-1 to 9.0.1367-3

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.16754

debian: CVE-2023-3896 was patched at unknown date

ubuntu: CVE-2023-3896 was patched at 2023-10-25

31. Incorrect Calculation - vim (CVE-2023-4734) - High [527]

Description: Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1846.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.16754

debian: CVE-2023-4734 was patched at unknown date

ubuntu: CVE-2023-4734 was patched at 2023-10-25

32. Memory Corruption - vim (CVE-2023-4733) - High [527]

Description: Use After Free in GitHub repository vim/vim prior to 9.0.1840.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00056, EPSS Percentile is 0.21045

debian: CVE-2023-4733 was patched at unknown date

ubuntu: CVE-2023-4733 was patched at 2023-10-25

33. Memory Corruption - vim (CVE-2023-4735) - High [527]

Description: Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.16754

debian: CVE-2023-4735 was patched at unknown date

debian: CVE-2023-47359 was patched at 2023-11-02, 2023-12-01, unknown date

ubuntu: CVE-2023-4735 was patched at 2023-10-25

redos: CVE-2023-47359 was patched at 2023-11-21

34. Memory Corruption - vim (CVE-2023-4738) - High [527]

Description: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1848.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.16754

debian: CVE-2023-4738 was patched at unknown date

ubuntu: CVE-2023-4738 was patched at 2023-10-25

35. Memory Corruption - vim (CVE-2023-4750) - High [527]

Description: Use After Free in GitHub repository vim/vim prior to 9.0.1857.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00056, EPSS Percentile is 0.21045

debian: CVE-2023-4750 was patched at unknown date

ubuntu: CVE-2023-4750 was patched at 2023-10-25

36. Memory Corruption - vim (CVE-2023-4751) - High [527]

Description: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1331.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.16754

debian: CVE-2023-4751 was patched at unknown date

ubuntu: CVE-2023-4751 was patched at 2023-10-25

37. Memory Corruption - vim (CVE-2023-5535) - High [527]

Description: Use After Free in GitHub repository vim/vim prior to v9.0.2010.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.16029

debian: CVE-2023-5535 was patched at unknown date

ubuntu: CVE-2023-5535 was patched at 2023-10-25

38. Memory Corruption - Linux Kernel (CVE-2023-42754) - High [525]

Description: A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:seclists.org website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-42754 was patched at 2024-01-11, unknown date

ubuntu: CVE-2023-42754 was patched at 2023-10-31, 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10

39. Cross Site Scripting - Cacti (CVE-2023-39515) - High [523]

Description: Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data stored in the cacti's database. These data will be viewed by administrative cacti accounts and execute JavaScript code in the victim's browser at view-time. The script under `data_debug.php` displays data source related debugging information such as _data source paths, polling settings, meta-data on the data source_. _CENSUS_ found that an adversary that is able to configure a malicious data-source path, can deploy a stored XSS attack against any user that has privileges related to viewing the `data_debug.php` information. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the data source path in _cacti_. This configuration occurs through `http://<HOST>/cacti/data_sources.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.514Cacti is an open source operational monitoring and fault management framework
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00056, EPSS Percentile is 0.20838

debian: CVE-2023-39515 was patched at 2023-11-08, unknown date

40. Cross Site Scripting - Cacti (CVE-2023-39516) - High [523]

Description: Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability which allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The script under `data_sources.php` displays the data source management information (e.g. data source path, polling configuration etc.) for different data visualizations of the _cacti_ app. CENSUS found that an adversary that is able to configure a malicious data-source path, can deploy a stored XSS attack against any user of the same (or broader) privileges. A user that possesses the 'General Administration>Sites/Devices/Data' permissions can configure the data source path in Cacti. This configuration occurs through `http://<HOST>/cacti/data_sources.php`. The same page can be used for previewing the data source path. This issue has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to upgrade should manually escape HTML output.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.514Cacti is an open source operational monitoring and fault management framework
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00056, EPSS Percentile is 0.20838

debian: CVE-2023-39516 was patched at 2023-11-08, unknown date

41. Denial of Service - goproxy (CVE-2023-37788) - High [517]

Description: goproxy v1.1 was discovered to contain an issue which can lead to a Denial of service (DoS) via unspecified vectors.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:goproxy_project:goproxy (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00046, EPSS Percentile is 0.1372

debian: CVE-2023-37788 was patched at unknown date

redhat: CVE-2023-37788 was patched at 2023-10-31

42. Information Disclosure - Tang (CVE-2023-1672) - High [517]

Description: A race condition exists in the Tang server functionality for key generation and key rotation. This flaw results in a small time window where Tang private keys become readable by other processes on the same host.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:www.openwall.com website
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:tang_project:tang (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 5.3. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.18061

debian: CVE-2023-1672 was patched at 2023-11-07, unknown date

ubuntu: CVE-2023-1672 was patched at 2023-11-20

oraclelinux: CVE-2023-1672 was patched at 2023-11-11, 2023-11-17

almalinux: CVE-2023-1672 was patched at 2023-11-07, 2023-11-14

redhat: CVE-2023-1672 was patched at 2023-11-07, 2023-11-14

43. Security Feature Bypass - Calendar (CVE-2023-45150) - High [517]

Description: Nextcloud calendar is a calendar app for the Nextcloud server platform. Due to missing precondition checks the server was trying to validate strings of any length as email addresses even when megabytes of data were provided, eventually making the server busy and unresponsive. It is recommended that the Nextcloud Calendar app is upgraded to 4.4.4. The only workaround for users unable to upgrade is to disable the calendar app.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:hackerone.com website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:nextcloud:calendar (exists in CPE dict)
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00051, EPSS Percentile is 0.17019

redos: CVE-2023-45150 was patched at 2023-10-20

44. Remote Code Execution - Chromium (CVE-2023-5857) - High [502]

Description: Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially execute arbitrary code via a malicious file. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.710EPSS Probability is 0.00523, EPSS Percentile is 0.74456

debian: CVE-2023-5857 was patched at 2023-11-02, unknown date

45. Denial of Service - ImageMagick (CVE-2023-5349) - High [498]

Description: A memory leak flaw was found in ruby-magick, an interface between Ruby and ImageMagick. This issue can lead to a denial of service (DOS) by memory exhaustion.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images
CVSS Base Score0.510CVSS Base Score is 5.3. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00046, EPSS Percentile is 0.1379

debian: CVE-2023-5349 was patched at 2023-10-22, unknown date

46. Memory Corruption - vim (CVE-2023-5441) - High [491]

Description: NULL Pointer Dereference in GitHub repository vim/vim prior to 20d161ace307e28690229b68584f2d84556f8960.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.0802

debian: CVE-2023-5441 was patched at unknown date

ubuntu: CVE-2023-5441 was patched at 2023-10-25

47. Remote Code Execution - Cobbler (CVE-2021-40323) - High [488]

Description: Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.910EPSS Probability is 0.02948, EPSS Percentile is 0.89848

ubuntu: CVE-2021-40323 was patched at 2023-11-13

48. Incorrect Calculation - VLC Media Player (CVE-2023-47360) - High [482]

Description: Videolan VLC prior to version 3.0.20 contains an Integer underflow that leads to an incorrect packet length.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:0xariana.github.io website
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514Product detected by a:videolan:vlc_media_player (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00046, EPSS Percentile is 0.13815

debian: CVE-2023-47360 was patched at 2023-11-02, 2023-12-01, unknown date

redos: CVE-2023-47360 was patched at 2023-11-21

49. Open Redirect - Cacti (CVE-2023-39364) - High [479]

Description: Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, users with console access can be redirected to an arbitrary website after a change password performed via a specifically crafted URL. The `auth_changepassword.php` file accepts `ref` as a URL parameter and reflects it in the form used to perform the change password. It's value is used to perform a redirect via `header` PHP function. A user can be tricked in performing the change password operation, e.g., via a phishing message, and then interacting with the malicious website where the redirection has been performed, e.g., downloading malwares, providing credentials, etc. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website
Criticality of Vulnerability Type0.7515Open Redirect
Vulnerable Product is Common0.514Cacti is an open source operational monitoring and fault management framework
CVSS Base Score0.310CVSS Base Score is 3.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00058, EPSS Percentile is 0.21579

debian: CVE-2023-39364 was patched at 2023-11-08, unknown date

50. Remote Code Execution - postgresql (CVE-2023-5869) - High [476]

Description: A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remote user can trigger the overflow by providing specially crafted data. This enables the execution of arbitrary code on the target system, allowing users to write arbitrary bytes to memory and extensively read the server's memory.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Product detected by a:postgresql:postgresql (exists in CPE dict)
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.910EPSS Probability is 0.0145, EPSS Percentile is 0.85312

debian: CVE-2023-5869 was patched at 2023-11-13, 2023-11-14, unknown date

ubuntu: CVE-2023-5869 was patched at 2023-12-06, 2024-01-09, 2024-01-17

oraclelinux: CVE-2023-5869 was patched at 2023-11-30, 2023-12-13, 2023-12-15, 2023-12-18, 2023-12-19, 2023-12-20

almalinux: CVE-2023-5869 was patched at 2023-11-29, 2023-12-11, 2023-12-13, 2023-12-20

redhat: CVE-2023-5869 was patched at 2023-11-28, 2023-11-29, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-07, 2023-12-11, 2023-12-13, 2023-12-19, 2023-12-20

51. Security Feature Bypass - Chromium (CVE-2023-5482) - High [460]

Description: Insufficient data validation in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00149, EPSS Percentile is 0.5093

debian: CVE-2023-5482 was patched at 2023-11-02, unknown date

52. Security Feature Bypass - Cobbler (CVE-2018-1000226) - High [458]

Description: Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Incorrect Access Control vulnerability in XMLRPC API (/cobbler_api) that can result in Privilege escalation, data manipulation or exfiltration, LDAP credential harvesting. This attack appear to be exploitable via "network connectivity". Taking advantage of improper validation of security tokens in API endpoints. Please note this is a different issue than CVE-2018-10931.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.01309, EPSS Percentile is 0.84494

ubuntu: CVE-2018-1000226 was patched at 2023-11-13

53. Security Feature Bypass - Slurm (CVE-2022-29502) - High [458]

Description: SchedMD Slurm 21.08.x through 20.11.x has Incorrect Access Control that leads to Escalation of Privileges.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:schedmd:slurm (exists in CPE dict)
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.00742, EPSS Percentile is 0.78902

debian: CVE-2022-29502 was patched at unknown date

ubuntu: CVE-2022-29502 was patched at 2023-10-30

54. Command Injection - Squid (CVE-2023-46846) - High [447]

Description: SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common0.514Product detected by a:squid-cache:squid (exists in CPE dict)
CVSS Base Score0.910CVSS Base Score is 9.3. According to NVD data source
EPSS Percentile0.710EPSS Probability is 0.00412, EPSS Percentile is 0.71309

debian: CVE-2023-46846 was patched at 2024-01-09, unknown date

ubuntu: CVE-2023-46846 was patched at 2023-11-21

oraclelinux: CVE-2023-46846 was patched at 2023-11-03, 2023-11-07, 2023-11-16, 2023-11-22

almalinux: CVE-2023-46846 was patched at 2023-11-02, 2023-11-07, 2023-11-14

redhat: CVE-2023-46846 was patched at 2023-11-02, 2023-11-07, 2023-11-08, 2023-11-14

redos: CVE-2023-46846 was patched at 2023-11-21

55. Remote Code Execution - Linux Kernel (CVE-2023-39191) - High [435]

Description: An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.810CVSS Base Score is 8.2. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00047, EPSS Percentile is 0.14149

debian: CVE-2023-39191 was patched at unknown date

oraclelinux: CVE-2023-39191 was patched at 2023-11-12

redhat: CVE-2023-39191 was patched at 2024-01-23, 2024-01-25

56. Security Feature Bypass - ZooKeeper (CVE-2023-44981) - High [434]

Description: Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper (quorum.auth.enableSasl=true), the authorization is done by verifying that the instance part in SASL authentication ID is listed in zoo.cfg server list. The instance part in SASL auth ID is optional and if it's missing, like 'eve@EXAMPLE.COM', the authorization check will be skipped. As a result an arbitrary endpoint could join the cluster and begin propagating counterfeit changes to the leader, essentially giving it complete read-write access to the data tree. Quorum Peer authentication is not enabled by default. Users are recommended to upgrade to version 3.9.1, 3.8.3, 3.7.2, which fixes the issue. Alternately ensure the ensemble election/quorum communication is protected by a firewall as this will mitigate the issue. See the documentation for more details on correct cluster administration.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:apache:zookeeper (exists in CPE dict)
CVSS Base Score0.910CVSS Base Score is 9.1. According to NVD data source
EPSS Percentile0.710EPSS Probability is 0.00354, EPSS Percentile is 0.69136

debian: CVE-2023-44981 was patched at 2023-10-21, 2023-10-31, unknown date

ubuntu: CVE-2023-44981 was patched at 2024-01-16

57. Memory Corruption - Apache HTTP Server (CVE-2023-31122) - High [429]

Description: Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.914Apache HTTP Server is a free and open-source web server that delivers web content through the internet
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.00759, EPSS Percentile is 0.79174

debian: CVE-2023-31122 was patched at unknown date

ubuntu: CVE-2023-31122 was patched at 2023-11-22, 2023-11-23

redos: CVE-2023-31122 was patched at 2023-10-30

58. Security Feature Bypass - GNOME desktop (CVE-2023-28100) - High [425]

Description: Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Versions prior to 1.10.8, 1.12.8, 1.14.4, and 1.15.4 contain a vulnerability similar to CVE-2017-5226, but using the `TIOCLINUX` ioctl command instead of `TIOCSTI`. If a Flatpak app is run on a Linux virtual console such as `/dev/tty1`, it can copy text from the virtual console and paste it into the command buffer, from which the command might be run after the Flatpak app has exited. Ordinary graphical terminal emulators like xterm, gnome-terminal and Konsole are unaffected. This vulnerability is specific to the Linux virtual consoles `/dev/tty1`, `/dev/tty2` and so on. A patch is available in versions 1.10.8, 1.12.8, 1.14.4, and 1.15.4. As a workaround, don't run Flatpak on a Linux virtual console. Flatpak is primarily designed to be used in a Wayland or X11 graphical environment.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814GNOME originally an acronym for GNU Network Object Model Environment, is a free and open-source desktop environment for Linux and other Unix-like operating systems
CVSS Base Score1.010CVSS Base Score is 10.0. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-28100 was patched at unknown date

oraclelinux: CVE-2023-28100 was patched at 2023-11-11, 2023-11-17

almalinux: CVE-2023-28100 was patched at 2023-11-07, 2023-11-14

redhat: CVE-2023-28100 was patched at 2023-11-07, 2023-11-14

59. Denial of Service - Squid (CVE-2023-46847) - High [422]

Description: Squid is vulnerable to a Denial of Service, where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:squid-cache:squid (exists in CPE dict)
CVSS Base Score0.910CVSS Base Score is 8.6. According to NVD data source
EPSS Percentile0.910EPSS Probability is 0.03523, EPSS Percentile is 0.9066

debian: CVE-2023-46847 was patched at 2024-01-09, unknown date

ubuntu: CVE-2023-46847 was patched at 2023-11-21, 2023-12-11

oraclelinux: CVE-2023-46847 was patched at 2023-11-03, 2023-11-07, 2023-11-08, 2023-11-16, 2023-11-22, 2024-01-12

almalinux: CVE-2023-46847 was patched at 2023-11-02, 2023-11-07, 2023-11-14

redhat: CVE-2023-46847 was patched at 2023-11-02, 2023-11-07, 2023-11-08, 2023-11-13, 2023-11-14, 2023-11-29

redos: CVE-2023-46847 was patched at 2023-11-21

60. Remote Code Execution - Go (CVE-2023-39323) - High [416]

Description: Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Product detected by a:golang:go (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 8.1. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00165, EPSS Percentile is 0.53156

debian: CVE-2023-39323 was patched at unknown date

ubuntu: CVE-2023-39323 was patched at 2024-01-11

redos: CVE-2023-39323 was patched at 2023-11-09

61. Security Feature Bypass - Chromium (CVE-2023-5480) - High [413]

Description: Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00104, EPSS Percentile is 0.42251

debian: CVE-2023-5480 was patched at 2023-11-02, unknown date

62. Security Feature Bypass - Chromium (CVE-2023-5853) - High [413]

Description: Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00204, EPSS Percentile is 0.58428

debian: CVE-2023-5853 was patched at 2023-11-02, unknown date

63. Security Feature Bypass - Chromium (CVE-2023-5859) - High [413]

Description: Incorrect security UI in Picture In Picture in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain spoofing via a crafted local HTML page. (Chromium security severity: Low)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00204, EPSS Percentile is 0.58378

debian: CVE-2023-5859 was patched at 2023-11-02, unknown date

64. Denial of Service - Squid (CVE-2023-46848) - High [410]

Description: Squid is vulnerable to Denial of Service, where a remote attacker can perform DoS by sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:squid-cache:squid (exists in CPE dict)
CVSS Base Score0.910CVSS Base Score is 8.6. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.01357, EPSS Percentile is 0.84811

debian: CVE-2023-46848 was patched at unknown date

ubuntu: CVE-2023-46848 was patched at 2023-11-21

oraclelinux: CVE-2023-46848 was patched at 2023-11-03, 2023-11-16

almalinux: CVE-2023-46848 was patched at 2023-11-02, 2023-11-07

redhat: CVE-2023-46848 was patched at 2023-11-02, 2023-11-07

redos: CVE-2023-46848 was patched at 2023-11-21

65. Memory Corruption - Kerberos (CVE-2023-36054) - High [410]

Description: lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common114Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00267, EPSS Percentile is 0.64307

debian: CVE-2023-36054 was patched at 2023-10-22, unknown date

ubuntu: CVE-2023-36054 was patched at 2023-11-01, 2023-11-06

oraclelinux: CVE-2023-36054 was patched at 2023-11-11

almalinux: CVE-2023-36054 was patched at 2023-11-07

redhat: CVE-2023-36054 was patched at 2023-11-07

66. Security Feature Bypass - http::tiny (CVE-2023-31486) - High [410]

Description: HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:httptiny_project:httptiny (does NOT exist in CPE dict)
CVSS Base Score0.810CVSS Base Score is 8.1. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.0024, EPSS Percentile is 0.62059

debian: CVE-2023-31486 was patched at unknown date

oraclelinux: CVE-2023-31486 was patched at 2023-11-11, 2023-11-17

almalinux: CVE-2023-31486 was patched at 2023-11-07, 2023-11-14

redhat: CVE-2023-31486 was patched at 2023-11-07, 2023-11-14, 2024-01-25

67. Elevation of Privilege - Linux Kernel (CVE-2023-1252) - High [408]

Description: A use-after-free flaw was found in the Linux kernel’s Ext4 File System in how a user triggers several file operations simultaneously with the overlay FS usage. This flaw allows a local user to crash or potentially escalate their privileges on the system. Only if patch 9a2544037600 ("ovl: fix use after free in struct ovl_aio_req") not applied yet, the kernel could be affected.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-1252 was patched at unknown date

oraclelinux: CVE-2023-1252 was patched at 2023-11-12, 2023-11-17

almalinux: CVE-2023-1252 was patched at 2023-11-14

redhat: CVE-2023-1252 was patched at 2023-11-14

68. Elevation of Privilege - Linux Kernel (CVE-2023-5345) - High [408]

Description: A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-5345 was patched at unknown date

ubuntu: CVE-2023-5345 was patched at 2023-10-31, 2023-11-21, 2023-11-27, 2023-11-28, 2023-11-30, 2023-12-06, 2024-01-09, 2024-01-25

oraclelinux: CVE-2023-5345 was patched at 2023-12-14, 2023-12-22

almalinux: CVE-2023-5345 was patched at 2023-12-12

redhat: CVE-2023-5345 was patched at 2023-12-12

69. Denial of Service - Apache HTTP Server (CVE-2023-43622) - High [405]

Description: An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern. This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout. This issue affects Apache HTTP Server: from 2.4.55 through 2.4.57. Users are recommended to upgrade to version 2.4.58, which fixes the issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914Apache HTTP Server is a free and open-source web server that delivers web content through the internet
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00063, EPSS Percentile is 0.25666

debian: CVE-2023-43622 was patched at unknown date

ubuntu: CVE-2023-43622 was patched at 2023-11-22

redos: CVE-2023-43622 was patched at 2023-10-30

70. Incorrect Calculation - Chromium (CVE-2023-5849) - High [401]

Description: Integer overflow in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.0018, EPSS Percentile is 0.55352

debian: CVE-2023-5849 was patched at 2023-11-02, unknown date

71. Memory Corruption - Chromium (CVE-2023-5472) - High [401]

Description: Use after free in Profiles in Google Chrome prior to 118.0.5993.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00229, EPSS Percentile is 0.61106

debian: CVE-2023-5472 was patched at 2023-10-26, unknown date

72. Memory Corruption - Chromium (CVE-2023-5852) - High [401]

Description: Use after free in Printing in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00181, EPSS Percentile is 0.55387

debian: CVE-2023-5852 was patched at 2023-11-02, unknown date

73. Memory Corruption - Chromium (CVE-2023-5854) - High [401]

Description: Use after free in Profiles in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00181, EPSS Percentile is 0.55387

debian: CVE-2023-5854 was patched at 2023-11-02, unknown date

74. Memory Corruption - Chromium (CVE-2023-5855) - High [401]

Description: Use after free in Reading Mode in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00181, EPSS Percentile is 0.55387

debian: CVE-2023-5855 was patched at 2023-11-02, unknown date

75. Memory Corruption - Chromium (CVE-2023-5856) - High [401]

Description: Use after free in Side Panel in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.0018, EPSS Percentile is 0.55352

debian: CVE-2023-5856 was patched at 2023-11-02, unknown date

76. Memory Corruption - Chromium (CVE-2023-5996) - High [401]

Description: Use after free in WebAudio in Google Chrome prior to 119.0.6045.123 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00215, EPSS Percentile is 0.59531

debian: CVE-2023-5996 was patched at 2023-11-09, unknown date

77. Memory Corruption - Mozilla Firefox (CVE-2023-5730) - High [401]

Description: Memory safety bugs present in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00122, EPSS Percentile is 0.46432

debian: CVE-2023-5730 was patched at 2023-10-25, 2023-10-27, unknown date

ubuntu: CVE-2023-5730 was patched at 2023-10-30, 2023-11-02

oraclelinux: CVE-2023-5730 was patched at 2023-10-30, 2023-10-31

almalinux: CVE-2023-5730 was patched at 2023-10-30

redhat: CVE-2023-5730 was patched at 2023-10-30

78. Path Traversal - Node.js (CVE-2023-39332) - High [401]

Description: Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004), but not through non-`Buffer` `Uint8Array` objects. This is distinct from CVE-2023-32004 which only referred to `Buffer` objects. However, the vulnerability follows the same pattern using `Uint8Array` instead of `Buffer`. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Path Traversal
Vulnerable Product is Common0.814Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00062, EPSS Percentile is 0.24383

oraclelinux: CVE-2023-39332 was patched at 2023-11-22

almalinux: CVE-2023-39332 was patched at 2023-11-14

redhat: CVE-2023-39332 was patched at 2023-11-14

79. Security Feature Bypass - Chromium (CVE-2023-5851) - High [401]

Description: Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00138, EPSS Percentile is 0.49305

debian: CVE-2023-5851 was patched at 2023-11-02, unknown date

80. Security Feature Bypass - Chromium (CVE-2023-5858) - High [401]

Description: Inappropriate implementation in WebApp Provider in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00157, EPSS Percentile is 0.52179

debian: CVE-2023-5858 was patched at 2023-11-02, unknown date

Medium (103)

81. Memory Corruption - Kerberos (CVE-2023-39975) - Medium [398]

Description: kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common114Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00075, EPSS Percentile is 0.30911

oraclelinux: CVE-2023-39975 was patched at 2023-11-11

almalinux: CVE-2023-39975 was patched at 2023-11-07

redhat: CVE-2023-39975 was patched at 2023-11-07

82. Elevation of Privilege - Linux Kernel (CVE-2023-33952) - Medium [397]

Description: A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. This issue occurs due to the lack of validating the existence of an object prior to performing further free operations on the object, which may allow a local privileged user to escalate privileges and execute code in the context of the kernel.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.710CVSS Base Score is 6.7. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00045, EPSS Percentile is 0.12483

debian: CVE-2023-33952 was patched at unknown date

oraclelinux: CVE-2023-33952 was patched at 2023-11-12, 2023-11-17

almalinux: CVE-2023-33952 was patched at 2023-11-14

redhat: CVE-2023-33952 was patched at 2023-11-14

83. Security Feature Bypass - VMware Tools (CVE-2023-34058) - Medium [396]

Description: VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.714VMware Tools is a set of services and modules that enable several features in VMware products for better management of, and seamless user interactions with, guests operating systems
CVSS Base Score0.710CVSS Base Score is 7.1. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.0008, EPSS Percentile is 0.33192

debian: CVE-2023-34058 was patched at 2023-10-31, 2023-11-06, unknown date

ubuntu: CVE-2023-34058 was patched at 2023-10-31, 2023-12-06

oraclelinux: CVE-2023-34058 was patched at 2023-11-16, 2023-11-21

almalinux: CVE-2023-34058 was patched at 2023-11-15

redhat: CVE-2023-34058 was patched at 2023-11-15

84. Information Disclosure - Linux Kernel (CVE-2023-33951) - Medium [393]

Description: A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of GEM objects. The issue results from improper locking when performing operations on an object. This flaw allows a local privileged user to disclose information in the context of the kernel.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.710CVSS Base Score is 6.7. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00045, EPSS Percentile is 0.12483

debian: CVE-2023-33951 was patched at unknown date

oraclelinux: CVE-2023-33951 was patched at 2023-11-12, 2023-11-17

almalinux: CVE-2023-33951 was patched at 2023-11-14

redhat: CVE-2023-33951 was patched at 2023-11-14

85. Denial of Service - Mozilla Firefox (CVE-2023-5724) - Medium [389]

Description: Drivers are not always robust to extremely large draw calls and in some cases this scenario could have led to a crash. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00076, EPSS Percentile is 0.31234

debian: CVE-2023-5724 was patched at 2023-10-25, 2023-10-27, unknown date

ubuntu: CVE-2023-5724 was patched at 2023-10-30, 2023-11-02

oraclelinux: CVE-2023-5724 was patched at 2023-10-30, 2023-10-31

almalinux: CVE-2023-5724 was patched at 2023-10-30

redhat: CVE-2023-5724 was patched at 2023-10-30

86. Denial of Service - Mozilla Firefox (CVE-2023-5728) - Medium [389]

Description: During garbage collection extra operations were performed on a object that should not be. This could have led to a potentially exploitable crash. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00076, EPSS Percentile is 0.31234

debian: CVE-2023-5728 was patched at 2023-10-25, 2023-10-27, unknown date

ubuntu: CVE-2023-5728 was patched at 2023-10-30, 2023-11-02

oraclelinux: CVE-2023-5728 was patched at 2023-10-30, 2023-10-31

almalinux: CVE-2023-5728 was patched at 2023-10-30

redhat: CVE-2023-5728 was patched at 2023-10-30

87. Elevation of Privilege - X Server (CVE-2023-5367) - Medium [389]

Description: A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.514Product detected by a:x.org:x_server (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00125, EPSS Percentile is 0.46981

debian: CVE-2023-5367 was patched at 2023-10-25, unknown date

ubuntu: CVE-2023-5367 was patched at 2023-10-25, 2023-10-31

oraclelinux: CVE-2023-5367 was patched at 2023-11-08, 2023-11-22, 2024-01-03

almalinux: CVE-2023-5367 was patched at 2024-01-02

redhat: CVE-2023-5367 was patched at 2023-11-08, 2023-11-21, 2023-11-28, 2024-01-02, 2024-01-10

redos: CVE-2023-5367 was patched at 2023-11-15

88. Code Injection - GLPI (CVE-2023-41320) - Medium [387]

Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. UI layout preferences management can be hijacked to lead to SQL injection. This injection can be use to takeover an administrator account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.514Product detected by a:glpi-project:glpi (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 8.1. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00076, EPSS Percentile is 0.31592

redos: CVE-2023-41320 was patched at 2023-11-09

89. Authentication Bypass - Cobbler (CVE-2021-40325) - Medium [383]

Description: Cobbler before 3.3.0 allows authorization bypass for modification of settings.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.514Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00082, EPSS Percentile is 0.34079

ubuntu: CVE-2021-40325 was patched at 2023-11-13

90. Information Disclosure - Linux Kernel (CVE-2024-0443) - Medium [381]

Description: A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. When a cgroup is being destroyed, cgroup_rstat_flush() is only called at css_release_work_fn(), which is called when the blkcg reference count reaches 0. This circular dependency will prevent blkcg and some blkgs from being freed after they are made offline. This issue may allow an attacker with a local access to cause system instability, such as an out of memory error.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

redhat: CVE-2024-0443 was patched at 2023-11-14

91. Elevation of Privilege - GNOME desktop (CVE-2023-28101) - Medium [380]

Description: Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.8, 1.12.8, 1.14.4, and 1.15.4, if an attacker publishes a Flatpak app with elevated permissions, they can hide those permissions from users of the `flatpak(1)` command-line interface by setting other permissions to crafted values that contain non-printable control characters such as `ESC`. A fix is available in versions 1.10.8, 1.12.8, 1.14.4, and 1.15.4. As a workaround, use a GUI like GNOME Software rather than the command-line interface, or only install apps whose maintainers you trust.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814GNOME originally an acronym for GNU Network Object Model Environment, is a free and open-source desktop environment for Linux and other Unix-like operating systems
CVSS Base Score0.510CVSS Base Score is 5.0. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00063, EPSS Percentile is 0.25695

debian: CVE-2023-28101 was patched at unknown date

oraclelinux: CVE-2023-28101 was patched at 2023-11-11, 2023-11-17

almalinux: CVE-2023-28101 was patched at 2023-11-07, 2023-11-14

redhat: CVE-2023-28101 was patched at 2023-11-07, 2023-11-14

92. Remote Code Execution - Xrdp (CVE-2022-23613) - Medium [380]

Description: xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker which is able to locally access a sesman server to execute code as root. This vulnerability has been patched in version 0.9.18.1 and above. Users are advised to upgrade. There are no known workarounds.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514xrdp is an open source remote desktop protocol server
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.16825

debian: CVE-2022-23613 was patched at unknown date

ubuntu: CVE-2022-23613 was patched at 2023-11-08

93. Memory Corruption - Mozilla Firefox (CVE-2023-5731) - Medium [377]

Description: Memory safety bugs present in Firefox 118. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 119.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00068, EPSS Percentile is 0.28196

ubuntu: CVE-2023-5731 was patched at 2023-10-30

94. Path Traversal - Node.js (CVE-2023-39331) - Medium [377]

Description: A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Path Traversal
Vulnerable Product is Common0.814Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00054, EPSS Percentile is 0.19684

oraclelinux: CVE-2023-39331 was patched at 2023-11-22

almalinux: CVE-2023-39331 was patched at 2023-11-07, 2023-11-14, 2023-11-15

redhat: CVE-2023-39331 was patched at 2023-11-07, 2023-11-14, 2023-11-15

95. Security Feature Bypass - Mozilla Firefox (CVE-2023-5723) - Medium [377]

Description: An attacker with temporary script access to a site could have set a cookie containing invalid characters using `document.cookie` that could have led to unknown errors. This vulnerability affects Firefox < 119.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.510CVSS Base Score is 5.3. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.18

ubuntu: CVE-2023-5723 was patched at 2023-10-30

96. Code Injection - GLPI (CVE-2023-42461) - Medium [375]

Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The ITIL actors input field from the Ticket form can be used to perform a SQL injection. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.514Product detected by a:glpi-project:glpi (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00076, EPSS Percentile is 0.31592

redos: CVE-2023-42461 was patched at 2023-11-09

97. Security Feature Bypass - grafana (CVE-2022-39306) - Medium [375]

Description: Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:grafana:grafana (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.4. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00145, EPSS Percentile is 0.50334

oraclelinux: CVE-2022-39306 was patched at 2023-11-11

almalinux: CVE-2022-39306 was patched at 2023-11-07

redhat: CVE-2022-39306 was patched at 2023-11-07

98. Information Disclosure - Request Tracker (CVE-2023-45024) - Medium [374]

Description: Best Practical Request Tracker (RT) 5 before 5.0.5 allows Information Disclosure via a transaction search in the transaction query builder.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:bestpractical:request_tracker (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00087, EPSS Percentile is 0.3625

debian: CVE-2023-45024 was patched at 2023-10-30, unknown date

99. Information Disclosure - Traffic Server (CVE-2023-41752) - Medium [374]

Description: Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 8.1.8, from 9.0.0 through 9.2.2. Users are recommended to upgrade to version 8.1.9 or 9.2.3, which fixes the issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:apache:traffic_server (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00102, EPSS Percentile is 0.41352

debian: CVE-2023-41752 was patched at 2023-11-05, 2023-11-06, unknown date

100. Information Disclosure - Linux Kernel (CVE-2023-39189) - Medium [369]

Description: A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.510CVSS Base Score is 5.1. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-39189 was patched at 2024-01-11, unknown date

ubuntu: CVE-2023-39189 was patched at 2023-10-31, 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10

101. Elevation of Privilege - grafana (CVE-2022-23552) - Medium [366]

Description: Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch and prior to versions 8.5.16, 9.2.10, and 9.3.4, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible because SVG files weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. An attacker needs to have the Editor role in order to change a panel to include either an external URL to a SVG-file containing JavaScript, or use the `data:` scheme to load an inline SVG-file containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.16, 9.2.10, or 9.3.4 to receive a fix.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.514Product detected by a:grafana:grafana (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 7.3. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.001, EPSS Percentile is 0.40862

oraclelinux: CVE-2022-23552 was patched at 2023-11-11

almalinux: CVE-2022-23552 was patched at 2023-11-07

redhat: CVE-2022-23552 was patched at 2023-11-07

102. Information Disclosure - Mozilla Firefox (CVE-2023-5722) - Medium [364]

Description: Using iterative requests an attacker was able to learn the size of an opaque response, as well as the contents of a server-supplied Vary header. This vulnerability affects Firefox < 119.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.510CVSS Base Score is 5.3. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.18

ubuntu: CVE-2023-5722 was patched at 2023-10-30

103. Information Disclosure - Mozilla Firefox (CVE-2023-5725) - Medium [364]

Description: A malicious installed WebExtension could open arbitrary URLs, which under the right circumstance could be leveraged to collect sensitive user data. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00067, EPSS Percentile is 0.27733

debian: CVE-2023-5725 was patched at 2023-10-25, 2023-10-27, unknown date

ubuntu: CVE-2023-5725 was patched at 2023-10-30, 2023-11-02

oraclelinux: CVE-2023-5725 was patched at 2023-10-30, 2023-10-31

almalinux: CVE-2023-5725 was patched at 2023-10-30

redhat: CVE-2023-5725 was patched at 2023-10-30

104. Security Feature Bypass - Cobbler (CVE-2021-40324) - Medium [363]

Description: Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00062, EPSS Percentile is 0.24803

ubuntu: CVE-2021-40324 was patched at 2023-11-13

105. Security Feature Bypass - certifi (CVE-2023-37920) - Medium [363]

Description: Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:kennethreitz:certifi (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00059, EPSS Percentile is 0.22827

debian: CVE-2023-37920 was patched at unknown date

oraclelinux: CVE-2023-37920 was patched at 2023-12-18, 2024-01-11

almalinux: CVE-2023-37920 was patched at 2023-12-12, 2024-01-10

redhat: CVE-2023-37920 was patched at 2023-11-08, 2023-11-21, 2023-11-28, 2023-12-12, 2024-01-10

106. Information Disclosure - Request Tracker (CVE-2023-41259) - Medium [362]

Description: Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows Information Disclosure via fake or spoofed RT email headers in an email message or a mail-gateway REST API call.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:bestpractical:request_tracker (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00064, EPSS Percentile is 0.26465

debian: CVE-2023-41259 was patched at 2023-10-30, 2023-10-31, unknown date

ubuntu: CVE-2023-41259 was patched at 2023-12-04

107. Information Disclosure - Request Tracker (CVE-2023-41260) - Medium [362]

Description: Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows Information Exposure in responses to mail-gateway REST API calls.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:bestpractical:request_tracker (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00064, EPSS Percentile is 0.26465

debian: CVE-2023-41260 was patched at 2023-10-30, 2023-10-31, unknown date

ubuntu: CVE-2023-41260 was patched at 2023-12-04

108. Information Disclosure - grafana (CVE-2022-39201) - Medium [362]

Description: Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user's Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:grafana:grafana (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00092, EPSS Percentile is 0.38923

oraclelinux: CVE-2022-39201 was patched at 2023-11-11

almalinux: CVE-2022-39201 was patched at 2023-11-07

redhat: CVE-2022-39201 was patched at 2023-11-07

109. Authentication Bypass - grafana (CVE-2022-31130) - Medium [360]

Description: Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user's Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.514Product detected by a:grafana:grafana (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00102, EPSS Percentile is 0.41291

oraclelinux: CVE-2022-31130 was patched at 2023-11-11

almalinux: CVE-2022-31130 was patched at 2023-11-07

redhat: CVE-2022-31130 was patched at 2023-11-07

110. Denial of Service - Linux Kernel (CVE-2022-38457) - Medium [358]

Description: A use-after-free(UAF) vulnerability was found in function 'vmw_cmd_res_check' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.610CVSS Base Score is 6.3. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2022-38457 was patched at unknown date

oraclelinux: CVE-2022-38457 was patched at 2023-11-12, 2023-11-17

almalinux: CVE-2022-38457 was patched at 2023-11-14

redhat: CVE-2022-38457 was patched at 2023-11-14

111. Denial of Service - Linux Kernel (CVE-2022-40133) - Medium [358]

Description: A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf_tie_context' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.610CVSS Base Score is 6.3. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2022-40133 was patched at unknown date

oraclelinux: CVE-2022-40133 was patched at 2023-11-12, 2023-11-17

almalinux: CVE-2022-40133 was patched at 2023-11-14

redhat: CVE-2022-40133 was patched at 2023-11-14

112. Denial of Service - Linux Kernel (CVE-2023-34324) - Medium [358]

Description: Closing of an event channel in the Linux kernel can result in a deadlock. This happens when the close is being performed in parallel to an unrelated Xen console action and the handling of a Xen console interrupt in an unprivileged guest. The closing of an event channel is e.g. triggered by removal of a paravirtual device on the other side. As this action will cause console messages to be issued on the other side quite often, the chance of triggering the deadlock is not neglectable. Note that 32-bit Arm-guests are not affected, as the 32-bit Linux kernel on Arm doesn't use queued-RW-locks, which are required to trigger the issue (on Arm32 a waiting writer doesn't block further readers to get the lock).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00054, EPSS Percentile is 0.19171

debian: CVE-2023-34324 was patched at 2024-01-02, 2024-01-11, unknown date

ubuntu: CVE-2023-34324 was patched at 2023-10-31

113. Cross Site Scripting - grafana (CVE-2022-39324) - Medium [357]

Description: Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker’s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.514Product detected by a:grafana:grafana (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.7. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00092, EPSS Percentile is 0.387

oraclelinux: CVE-2022-39324 was patched at 2023-11-11

almalinux: CVE-2022-39324 was patched at 2023-11-07

redhat: CVE-2022-39324 was patched at 2023-11-07

114. Memory Corruption - OpenSSL (CVE-2023-5363) - Medium [353]

Description: Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse. Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception. However, these issues are not currently assessed as security critical. Changing the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary. OpenSSL 3.1 and 3.0 are vulnerable to this issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.2866

debian: CVE-2023-5363 was patched at 2023-10-24, unknown date

ubuntu: CVE-2023-5363 was patched at 2023-10-24

oraclelinux: CVE-2023-5363 was patched at 2024-01-22, 2024-01-25

almalinux: CVE-2023-5363 was patched at 2024-01-22

redhat: CVE-2023-5363 was patched at 2024-01-22, 2024-01-25

redos: CVE-2023-5363 was patched at 2023-11-09, 2023-11-10

115. Denial of Service - Go (CVE-2023-39322) - Medium [351]

Description: QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:golang:go (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00088, EPSS Percentile is 0.36917

oraclelinux: CVE-2023-39322 was patched at 2023-12-13, 2023-12-14, 2024-01-11

almalinux: CVE-2023-39322 was patched at 2023-12-12, 2024-01-10

redhat: CVE-2023-39322 was patched at 2023-10-31, 2023-11-15, 2023-12-12, 2024-01-10

116. Incorrect Calculation - zlib (CVE-2023-45853) - Medium [351]

Description: MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514Product detected by a:zlib:zlib (exists in CPE dict)
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00121, EPSS Percentile is 0.46321

debian: CVE-2023-45853 was patched at 2023-11-28, unknown date

redos: CVE-2023-45853 was patched at 2023-10-20

117. Security Feature Bypass - GLPI (CVE-2023-42462) - Medium [351]

Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The document upload process can be diverted to delete some files. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:glpi-project:glpi (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.7. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14748

redos: CVE-2023-42462 was patched at 2023-11-09

118. Security Feature Bypass - browserify-sign (CVE-2023-46234) - Medium [351]

Description: browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:browserify:browserify-sign (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.17739

debian: CVE-2023-46234 was patched at 2023-10-29, 2023-10-30, unknown date

119. Information Disclosure - grafana (CVE-2022-39307) - Medium [350]

Description: Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a “user not found” message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:grafana:grafana (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.7. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00075, EPSS Percentile is 0.30833

oraclelinux: CVE-2022-39307 was patched at 2023-11-11

almalinux: CVE-2022-39307 was patched at 2023-11-07

redhat: CVE-2022-39307 was patched at 2023-11-07

120. Authentication Bypass - Barbican (CVE-2023-1633) - Medium [348]

Description: A credentials leak flaw was found in OpenStack Barbican. This flaw allows a local authenticated attacker to read the configuration file, gaining access to sensitive credentials.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.514Product detected by a:openstack:barbican (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.6. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

redhat: CVE-2023-1633 was patched at 2023-11-08

121. Authentication Bypass - Cobbler (CVE-2021-45083) - Medium [348]

Description: An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it's trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.514Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS
CVSS Base Score0.710CVSS Base Score is 7.1. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

ubuntu: CVE-2021-45083 was patched at 2023-11-13

122. Denial of Service - Linux Kernel (CVE-2023-4732) - Medium [346]

Description: A flaw was found in pfn_swap_entry_to_page in memory management subsystem in the Linux Kernel. In this flaw, an attacker with a local user privilege may cause a denial of service problem due to a BUG statement referencing pmd_t x.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.510CVSS Base Score is 4.7. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-4732 was patched at unknown date

oraclelinux: CVE-2023-4732 was patched at 2023-11-17

almalinux: CVE-2023-4732 was patched at 2023-11-14

redhat: CVE-2023-4732 was patched at 2023-11-14, 2023-11-28, 2024-01-25

123. Elevation of Privilege - insights-client (CVE-2023-3972) - Medium [342]

Description: A vulnerability was found in insights-client. This security issue occurs because of insecure file operations or unsafe handling of temporary files and directories that lead to local privilege escalation. Before the insights-client has been registered on the system by root, an unprivileged local user or attacker could create the /var/tmp/insights-client directory (owning the directory with read, write, and execute permissions) on the system. After the insights-client is registered by root, an attacker could then control the directory content that insights are using by putting malicious scripts into it and executing arbitrary code as root (trivially bypassing SELinux protections because insights processes are allowed to disable SELinux system-wide).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.514Product detected by a:redhat:insights-client (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

redhat: CVE-2023-3972 was patched at 2023-11-02, 2023-11-08

124. Authentication Bypass - Redis (CVE-2023-45148) - Medium [341]

Description: Nextcloud is an open source home cloud server. When Memcached is used as `memcache.distributed` the rate limiting in Nextcloud Server could be reset unexpectedly resetting the rate count earlier than intended. Users are advised to upgrade to versions 25.0.11, 26.0.6 or 27.1.0. Users unable to upgrade should change their config setting `memcache.distributed` to `\OC\Memcache\Redis` and install Redis instead of Memcached.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.614Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00053, EPSS Percentile is 0.18495

redos: CVE-2023-45148 was patched at 2023-10-24

125. Denial of Service - Mozilla Firefox (CVE-2023-5721) - Medium [341]

Description: It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an insufficient activation-delay. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.0007, EPSS Percentile is 0.29117

debian: CVE-2023-5721 was patched at 2023-10-25, 2023-10-27, unknown date

ubuntu: CVE-2023-5721 was patched at 2023-10-30, 2023-11-02

oraclelinux: CVE-2023-5721 was patched at 2023-10-30, 2023-10-31

almalinux: CVE-2023-5721 was patched at 2023-10-30

redhat: CVE-2023-5721 was patched at 2023-10-30

126. Denial of Service - Go (CVE-2023-39321) - Medium [339]

Description: Processing an incomplete post-handshake message for a QUIC connection can cause a panic.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:golang:go (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00074, EPSS Percentile is 0.3069

oraclelinux: CVE-2023-39321 was patched at 2023-12-13, 2023-12-14, 2024-01-11

almalinux: CVE-2023-39321 was patched at 2023-12-12, 2024-01-10

redhat: CVE-2023-39321 was patched at 2023-10-31, 2023-11-15, 2023-12-12, 2024-01-10

127. Incorrect Calculation - memcached (CVE-2023-46853) - Medium [339]

Description: In Memcached before 1.6.22, an off-by-one error exists when processing proxy requests in proxy mode, if \n is used instead of \r\n.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514Product detected by a:memcached:memcached (exists in CPE dict)
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00091, EPSS Percentile is 0.38375

debian: CVE-2023-46853 was patched at unknown date

ubuntu: CVE-2023-46853 was patched at 2023-11-13

128. Security Feature Bypass - Open VM Tools (CVE-2023-34059) - Medium [339]

Description: open-vm-tools contains a file descriptor hijack vulnerability in the vmware-user-suid-wrapper. A malicious actor with non-root privileges may be able to hijack the /dev/uinput file descriptor allowing them to simulate user inputs.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:vmware:open_vm_tools (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 7.4. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-34059 was patched at 2023-10-31, 2023-11-06, unknown date

ubuntu: CVE-2023-34059 was patched at 2023-10-31, 2023-12-06

oraclelinux: CVE-2023-34059 was patched at 2023-11-16, 2023-11-21

almalinux: CVE-2023-34059 was patched at 2023-11-15

redhat: CVE-2023-34059 was patched at 2023-11-15

129. Security Feature Bypass - grafana (CVE-2022-31123) - Medium [339]

Description: Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Product detected by a:grafana:grafana (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00057, EPSS Percentile is 0.21578

oraclelinux: CVE-2022-31123 was patched at 2023-11-11

almalinux: CVE-2022-31123 was patched at 2023-11-07

redhat: CVE-2022-31123 was patched at 2023-11-07

130. Information Disclosure - nextcloud_server (CVE-2023-45151) - Medium [338]

Description: Nextcloud server is an open source home cloud platform. Affected versions of Nextcloud stored OAuth2 tokens in plaintext which allows an attacker who has gained access to the server to potentially elevate their privilege. This issue has been addressed and users are recommended to upgrade their Nextcloud Server to version 25.0.8, 26.0.3 or 27.0.1. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:nextcloud:nextcloud_server (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0006, EPSS Percentile is 0.23686

redos: CVE-2023-45151 was patched at 2023-10-24

131. Authentication Bypass - Rabbitmq-c (CVE-2023-35789) - Medium [336]

Description: An issue was discovered in the C AMQP client library (aka rabbitmq-c) through 0.13.0 for RabbitMQ. Credentials can only be entered on the command line (e.g., for amqp-publish or amqp-consume) and are thus visible to local attackers by listing a process and its arguments.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.514Product detected by a:rabbitmq-c_project:rabbitmq-c (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-35789 was patched at unknown date

oraclelinux: CVE-2023-35789 was patched at 2023-11-11, 2023-11-17

almalinux: CVE-2023-35789 was patched at 2023-11-07, 2023-11-14

redhat: CVE-2023-35789 was patched at 2023-11-07, 2023-11-14

132. Spoofing - Mozilla Firefox (CVE-2023-5732) - Medium [335]

Description: An attacker could have created a malicious link using bidirectional characters to spoof the location in the address bar when visited. This vulnerability affects Firefox < 117, Firefox ESR < 115.4, and Thunderbird < 115.4.1.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00099, EPSS Percentile is 0.40734

debian: CVE-2023-5732 was patched at 2023-10-25, 2023-10-27, unknown date

ubuntu: CVE-2023-5732 was patched at 2023-11-02

oraclelinux: CVE-2023-5732 was patched at 2023-10-30, 2023-10-31

almalinux: CVE-2023-5732 was patched at 2023-10-30

redhat: CVE-2023-5732 was patched at 2023-10-30

133. Memory Corruption - Linux Kernel (CVE-2022-3523) - Medium [334]

Description: A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is an unknown function of the file mm/memory.c of the component Driver Handler. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211020.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.510CVSS Base Score is 5.3. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00073, EPSS Percentile is 0.30126

debian: CVE-2022-3523 was patched at unknown date

oraclelinux: CVE-2022-3523 was patched at 2023-11-12

134. Cross Site Scripting - Cobbler (CVE-2018-1000225) - Medium [333]

Description: Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Cross Site Scripting (XSS) vulnerability in cobbler-web that can result in Privilege escalation to admin.. This attack appear to be exploitable via "network connectivity". Sending unauthenticated JavaScript payload to the Cobbler XMLRPC API (/cobbler_api).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.514Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00066, EPSS Percentile is 0.27532

ubuntu: CVE-2018-1000225 was patched at 2023-11-13

135. Cross Site Scripting - Go (CVE-2023-39318) - Medium [333]

Description: The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in <script> contexts. This may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.514Product detected by a:golang:go (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00084, EPSS Percentile is 0.34874

debian: CVE-2023-39318 was patched at unknown date

ubuntu: CVE-2023-39318 was patched at 2024-01-11

oraclelinux: CVE-2023-39318 was patched at 2023-12-13, 2023-12-14, 2024-01-11

almalinux: CVE-2023-39318 was patched at 2023-12-12, 2024-01-10

redhat: CVE-2023-39318 was patched at 2023-10-31, 2023-11-15, 2023-12-12, 2024-01-10

136. Cross Site Scripting - Sanitize (CVE-2023-36823) - Medium [333]

Description: Sanitize is an allowlist-based HTML and CSS sanitizer. Using carefully crafted input, an attacker may be able to sneak arbitrary HTML and CSS through Sanitize starting with version 3.0.0 and prior to version 6.0.2 when Sanitize is configured to use the built-in "relaxed" config or when using a custom config that allows `style` elements and one or more CSS at-rules. This could result in cross-site scripting or other undesired behavior when the malicious HTML and CSS are rendered in a browser. Sanitize 6.0.2 performs additional escaping of CSS in `style` element content, which fixes this issue. Users who are unable to upgrade can prevent this issue by using a Sanitize config that doesn't allow `style` elements, using a Sanitize config that doesn't allow CSS at-rules, or by manually escaping the character sequence `</` as `<\/` in `style` element content.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.514Product detected by a:sanitize_project:sanitize (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 7.1. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.16459

debian: CVE-2023-36823 was patched at 2023-11-14, unknown date

137. Denial of Service - GLPI (CVE-2023-41324) - Medium [327]

Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user that have read access on users resource can steal accounts of other users. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:glpi-project:glpi (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 8.1. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.16274

redos: CVE-2023-41324 was patched at 2023-11-09

138. Denial of Service - GLPI (CVE-2023-41326) - Medium [327]

Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A logged user from any profile can hijack the Kanban feature to alter any user field, and end-up with stealing its account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:glpi-project:glpi (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 8.1. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.16274

redos: CVE-2023-41326 was patched at 2023-11-09

139. Information Disclosure - NSS (CVE-2023-4421) - Medium [326]

Description: The NSS code used for checking PKCS#1 v1.5 was leaking information useful in mounting Bleichenbacher-like attacks. Both the overall correctness of the padding as well as the length of the encrypted message was leaking through timing side-channel. By sending large number of attacker-selected ciphertexts, the attacker would be able to decrypt a previously intercepted PKCS#1 v1.5 ciphertext (for example, to decrypt a TLS session that used RSA key exchange), or forge a signature using the victim's key. The issue was fixed by implementing the implicit rejection algorithm, in which the NSS returns a deterministic random message in case invalid padding is detected, as proposed in the Marvin Attack paper. This vulnerability affects NSS < 3.61.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:mozilla:nss (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00049, EPSS Percentile is 0.1497

debian: CVE-2023-4421 was patched at 2023-10-28, unknown date

140. Authentication Bypass - shadow-utils (CVE-2023-4641) - Medium [324]

Description: A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.514Product detected by a:shadow-maint:shadow-utils (does NOT exist in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.7. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00045, EPSS Percentile is 0.12067

debian: CVE-2023-4641 was patched at unknown date

oraclelinux: CVE-2023-4641 was patched at 2023-11-11, 2023-11-17

almalinux: CVE-2023-4641 was patched at 2023-11-07, 2023-11-14

redhat: CVE-2023-4641 was patched at 2023-11-07, 2023-11-14, 2024-01-25

141. Open Redirect - urllib3 (CVE-2018-25091) - Medium [324]

Description: urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.7515Open Redirect
Vulnerable Product is Common0.514Product detected by a:python:urllib3 (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00072, EPSS Percentile is 0.29656

debian: CVE-2018-25091 was patched at unknown date

ubuntu: CVE-2018-25091 was patched at 2023-11-07, 2023-11-15

142. Incorrect Calculation - Linux Kernel (CVE-2023-31085) - Medium [322]

Description: An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->erasesize), used indirectly by ctrl_cdev_ioctl, when mtd->erasesize is 0.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.06784

debian: CVE-2023-31085 was patched at unknown date

ubuntu: CVE-2023-31085 was patched at 2023-10-31, 2023-11-21, 2023-11-27, 2023-11-28, 2023-11-30, 2023-12-05, 2023-12-06, 2024-01-09

143. Memory Corruption - Linux Kernel (CVE-2023-1249) - Medium [322]

Description: A use-after-free flaw was found in the Linux kernel’s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 ("coredump: Use the vma snapshot in fill_files_note") not applied yet, then kernel could be affected.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-1249 was patched at unknown date

oraclelinux: CVE-2023-1249 was patched at 2023-11-12

144. Memory Corruption - Linux Kernel (CVE-2023-3358) - Medium [322]

Description: A null pointer dereference was found in the Linux kernel's Integrated Sensor Hub (ISH) driver. This issue could allow a local user to crash the system.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

debian: CVE-2023-3358 was patched at unknown date

oraclelinux: CVE-2023-3358 was patched at 2023-11-12

145. Cross Site Scripting - Go (CVE-2023-39319) - Medium [321]

Description: The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.514Product detected by a:golang:go (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.2399

debian: CVE-2023-39319 was patched at unknown date

ubuntu: CVE-2023-39319 was patched at 2024-01-11

oraclelinux: CVE-2023-39319 was patched at 2023-12-13, 2023-12-14, 2024-01-11

almalinux: CVE-2023-39319 was patched at 2023-12-12, 2024-01-10

redhat: CVE-2023-39319 was patched at 2023-10-31, 2023-11-15, 2023-12-12, 2024-01-10

146. Cross Site Scripting - Networking (CVE-2023-3978) - Medium [321]

Description: Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.514Product detected by a:golang:networking (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.18

debian: CVE-2023-3978 was patched at unknown date

oraclelinux: CVE-2023-3978 was patched at 2023-11-11, 2023-11-18

almalinux: CVE-2023-3978 was patched at 2023-11-07, 2023-11-14

redhat: CVE-2023-3978 was patched at 2023-10-31, 2023-11-07, 2023-11-14

147. Information Disclosure - GLPI (CVE-2023-41323) - Medium [314]

Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An unauthenticated user can enumerate users logins. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:glpi-project:glpi (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 5.3. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.179

redos: CVE-2023-41323 was patched at 2023-11-09

148. Memory Corruption - QEMU (CVE-2023-2680) - Medium [313]

Description: This CVE exists because of an incomplete fix for CVE-2021-3750. More specifically, the qemu-kvm package as released for Red Hat Enterprise Linux 9.1 via RHSA-2022:7967 included a version of qemu-kvm that was actually missing the fix for CVE-2021-3750.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.714QEMU is a generic and open source machine & userspace emulator and virtualizer
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.0573

oraclelinux: CVE-2023-2680 was patched at 2023-11-11

almalinux: CVE-2023-2680 was patched at 2023-11-07

redhat: CVE-2023-2680 was patched at 2023-11-07

149. Spoofing - Chromium (CVE-2023-5850) - Medium [311]

Description: Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain spoofing via a crafted domain name. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00138, EPSS Percentile is 0.49339

debian: CVE-2023-5850 was patched at 2023-11-02, unknown date

150. Denial of Service - tiffcrop (CVE-2023-3576) - Medium [308]

Description: A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614Tiffcrop processes one or more files created according to the Tag Image File Format, Revision 6.0, specification into one or more TIFF file(s)
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.08097

debian: CVE-2023-3576 was patched at 2023-11-27, unknown date

ubuntu: CVE-2023-3576 was patched at 2023-11-23

oraclelinux: CVE-2023-3576 was patched at 2023-11-11

almalinux: CVE-2023-3576 was patched at 2023-11-07

redhat: CVE-2023-3576 was patched at 2023-11-07

151. Information Disclosure - Redis (CVE-2023-45145) - Medium [307]

Description: Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.614Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability
CVSS Base Score0.410CVSS Base Score is 3.6. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.08226

debian: CVE-2023-45145 was patched at 2023-10-23, unknown date

ubuntu: CVE-2023-45145 was patched at 2023-12-05

redos: CVE-2023-45145 was patched at 2023-10-30

152. Denial of Service - MySQL (CVE-2023-22059) - Medium [303]

Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:oracle:mysql (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10871

ubuntu: CVE-2023-22059 was patched at 2023-10-30

153. Denial of Service - MySQL (CVE-2023-22079) - Medium [303]

Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:oracle:mysql (exists in CPE dict)
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10871

ubuntu: CVE-2023-22079 was patched at 2023-10-30

154. Denial of Service - Open Virtual Network (CVE-2023-3153) - Medium [303]

Description: A flaw was found in Open Virtual Network where the service monitor MAC does not properly rate limit. This issue could allow an attacker to cause a denial of service, including on deployments with CoPP enabled and properly configured.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:ovn:open_virtual_network (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 5.3. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.0008, EPSS Percentile is 0.33408

debian: CVE-2023-3153 was patched at unknown date

redhat: CVE-2023-3153 was patched at 2023-10-31, 2023-11-08

155. Path Traversal - Create Agent (CVE-2023-43803) - Medium [303]

Description: Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/v2/pkgs/tools/installed` and the way it handles plugin names supplied as user input. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can delete arbitrary files or folders belonging to the user that runs the Arduino Create Agent via a crafted HTTP POST request. This issue has been addressed in version `1.3.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Path Traversal
Vulnerable Product is Common0.514Product detected by a:arduino:create_agent (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0006, EPSS Percentile is 0.23513

debian: CVE-2023-43803 was patched at 2023-11-08

156. Information Disclosure - GLPI (CVE-2023-41321) - Medium [302]

Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user can enumerate sensitive fields values on resources on which he has read access. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:glpi-project:glpi (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00049, EPSS Percentile is 0.1497

redos: CVE-2023-41321 was patched at 2023-11-09

157. Denial of Service - GLPI (CVE-2023-41322) - Medium [291]

Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A user with write access to another user can make requests to change the latter's password and then take control of their account. Users are advised to upgrade to version 10.0.10. There are no known work around for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:glpi-project:glpi (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.16274

redos: CVE-2023-41322 was patched at 2023-11-09

158. Denial of Service - MySQL (CVE-2023-22084) - Medium [291]

Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.43 and prior, 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:oracle:mysql (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00055, EPSS Percentile is 0.20347

debian: CVE-2023-22084 was patched at unknown date

ubuntu: CVE-2023-22084 was patched at 2023-10-30, 2024-01-15, 2024-01-25

159. Denial of Service - Xrdp (CVE-2023-42822) - Medium [291]

Description: xrdp is an open source remote desktop protocol server. Access to the font glyphs in xrdp_painter.c is not bounds-checked . Since some of this data is controllable by the user, this can result in an out-of-bounds read within the xrdp executable. The vulnerability allows an out-of-bounds read within a potentially privileged process. On non-Debian platforms, xrdp tends to run as root. Potentially an out-of-bounds write can follow the out-of-bounds read. There is no denial-of-service impact, providing xrdp is running in forking mode. This issue has been addressed in release 0.9.23.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514xrdp is an open source remote desktop protocol server
CVSS Base Score0.510CVSS Base Score is 4.6. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00059, EPSS Percentile is 0.22959

debian: CVE-2023-42822 was patched at unknown date

ubuntu: CVE-2023-42822 was patched at 2023-11-08

redos: CVE-2023-42822 was patched at 2023-10-24

160. Incorrect Calculation - postgresql (CVE-2023-5868) - Medium [291]

Description: A memory disclosure vulnerability was found in PostgreSQL that allows remote users to access sensitive information by exploiting certain aggregate function calls with 'unknown'-type arguments. Handling 'unknown'-type values from string literals without type designation can disclose bytes, potentially revealing notable and confidential information. This issue exists due to excessive data output in aggregate function calls, enabling remote users to read some portion of system memory.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514Product detected by a:postgresql:postgresql (exists in CPE dict)
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.0018, EPSS Percentile is 0.55328

debian: CVE-2023-5868 was patched at 2023-11-13, 2023-11-14, unknown date

ubuntu: CVE-2023-5868 was patched at 2023-12-06, 2024-01-17

oraclelinux: CVE-2023-5868 was patched at 2023-11-30, 2023-12-13, 2023-12-15, 2023-12-18, 2023-12-20

almalinux: CVE-2023-5868 was patched at 2023-11-29, 2023-12-11, 2023-12-13, 2023-12-20

redhat: CVE-2023-5868 was patched at 2023-11-28, 2023-11-29, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-07, 2023-12-11, 2023-12-13, 2023-12-20

161. Incorrect Calculation - zchunk (CVE-2023-46228) - Medium [291]

Description: zchunk before 1.3.2 has multiple integer overflows via malformed zchunk files to lib/comp/comp.c, lib/comp/zstd/zstd.c, lib/dl/multipart.c, or lib/header.c.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514Product detected by a:zchunk:zchunk (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.16754

debian: CVE-2023-46228 was patched at unknown date

redos: CVE-2023-46228 was patched at 2023-10-30

162. Information Disclosure - urllib3 (CVE-2023-45803) - Medium [291]

Description: urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:python:urllib3 (exists in CPE dict)
CVSS Base Score0.410CVSS Base Score is 4.2. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.07745

debian: CVE-2023-45803 was patched at unknown date

ubuntu: CVE-2023-45803 was patched at 2023-11-07, 2023-11-15

oraclelinux: CVE-2023-45803 was patched at 2024-01-10, 2024-01-25

almalinux: CVE-2023-45803 was patched at 2024-01-10, 2024-01-25

redhat: CVE-2023-45803 was patched at 2024-01-10, 2024-01-18, 2024-01-25

163. Denial of Service - MySQL (CVE-2023-22032) - Medium [279]

Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:oracle:mysql (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10871

ubuntu: CVE-2023-22032 was patched at 2023-10-30

164. Denial of Service - MySQL (CVE-2023-22064) - Medium [279]

Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:oracle:mysql (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10871

ubuntu: CVE-2023-22064 was patched at 2023-10-30

165. Denial of Service - MySQL (CVE-2023-22066) - Medium [279]

Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:oracle:mysql (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10871

ubuntu: CVE-2023-22066 was patched at 2023-10-30

166. Denial of Service - MySQL (CVE-2023-22068) - Medium [279]

Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:oracle:mysql (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10871

ubuntu: CVE-2023-22068 was patched at 2023-10-30

167. Denial of Service - MySQL (CVE-2023-22070) - Medium [279]

Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:oracle:mysql (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10871

ubuntu: CVE-2023-22070 was patched at 2023-10-30

168. Denial of Service - MySQL (CVE-2023-22078) - Medium [279]

Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:oracle:mysql (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10871

ubuntu: CVE-2023-22078 was patched at 2023-10-30

169. Denial of Service - MySQL (CVE-2023-22092) - Medium [279]

Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:oracle:mysql (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10871

ubuntu: CVE-2023-22092 was patched at 2023-10-30

170. Denial of Service - MySQL (CVE-2023-22097) - Medium [279]

Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:oracle:mysql (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10871

ubuntu: CVE-2023-22097 was patched at 2023-10-30

171. Denial of Service - MySQL (CVE-2023-22103) - Medium [279]

Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:oracle:mysql (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10871

ubuntu: CVE-2023-22103 was patched at 2023-10-30

172. Denial of Service - MySQL (CVE-2023-22112) - Medium [279]

Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:oracle:mysql (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10871

ubuntu: CVE-2023-22112 was patched at 2023-10-30

173. Denial of Service - MySQL (CVE-2023-22114) - Medium [279]

Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:oracle:mysql (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.9. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10871

ubuntu: CVE-2023-22114 was patched at 2023-10-30

174. Denial of Service - postgresql (CVE-2023-5870) - Medium [279]

Description: A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Product detected by a:postgresql:postgresql (exists in CPE dict)
CVSS Base Score0.210CVSS Base Score is 2.2. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00115, EPSS Percentile is 0.44994

debian: CVE-2023-5870 was patched at 2023-11-13, 2023-11-14, unknown date

ubuntu: CVE-2023-5870 was patched at 2023-12-06, 2024-01-09, 2024-01-17

oraclelinux: CVE-2023-5870 was patched at 2023-11-30, 2023-12-13, 2023-12-15, 2023-12-18, 2023-12-20

almalinux: CVE-2023-5870 was patched at 2023-11-29, 2023-12-11, 2023-12-13, 2023-12-20

redhat: CVE-2023-5870 was patched at 2023-11-28, 2023-11-29, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-07, 2023-12-11, 2023-12-13, 2023-12-20

175. Memory Corruption - memcached (CVE-2023-46852) - Medium [279]

Description: In Memcached before 1.6.22, a buffer overflow exists when processing multiget requests in proxy mode, if there are many spaces after the "get" substring.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:memcached:memcached (exists in CPE dict)
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00046, EPSS Percentile is 0.1372

debian: CVE-2023-46852 was patched at unknown date

ubuntu: CVE-2023-46852 was patched at 2023-11-13

176. Path Traversal - GLPI (CVE-2023-41888) - Medium [279]

Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The lack of path filtering on the GLPI URL may allow an attacker to transmit a malicious URL of login page that can be used to attempt a phishing attack on user credentials. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Path Traversal
Vulnerable Product is Common0.514Product detected by a:glpi-project:glpi (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 5.3. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00047, EPSS Percentile is 0.14194

redos: CVE-2023-41888 was patched at 2023-11-09

177. Spoofing - Mozilla Firefox (CVE-2023-5729) - Medium [276]

Description: A malicious web site can enter fullscreen mode while simultaneously triggering a WebAuthn prompt. This could have obscured the fullscreen notification and could have been leveraged in a spoofing attack. This vulnerability affects Firefox < 119.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.18

ubuntu: CVE-2023-5729 was patched at 2023-10-30

178. Memory Corruption - Ghostscript (CVE-2023-4042) - Medium [255]

Description: A flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostscript was not included in RHSA-2021:1852-06 advisory as it was claimed to be. This issue only affects the ghostscript package as shipped with Red Hat Enterprise Linux 8.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:artifex:ghostscript (exists in CPE dict)
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.0802

oraclelinux: CVE-2023-4042 was patched at 2023-11-17

almalinux: CVE-2023-4042 was patched at 2023-11-14

redhat: CVE-2023-4042 was patched at 2023-11-14

179. Incorrect Calculation - Xrdp (CVE-2023-40184) - Medium [244]

Description: xrdp is an open source remote desktop protocol (RDP) server. In versions prior to 0.9.23 improper handling of session establishment errors allows bypassing OS-level session restrictions. The `auth_start_session` function can return non-zero (1) value on, e.g., PAM error which may result in in session restrictions such as max concurrent sessions per user by PAM (ex ./etc/security/limits.conf) to be bypassed. Users (administrators) don't use restrictions by PAM are not affected. This issue has been addressed in release version 0.9.23. Users are advised to upgrade. There are no known workarounds for this issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.514xrdp is an open source remote desktop protocol server
CVSS Base Score0.310CVSS Base Score is 2.6. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00081, EPSS Percentile is 0.33691

debian: CVE-2023-40184 was patched at unknown date

ubuntu: CVE-2023-40184 was patched at 2023-11-08

180. Memory Corruption - X Server (CVE-2023-5380) - Medium [244]

Description: A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:x.org:x_server (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 4.7. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00045, EPSS Percentile is 0.12483

debian: CVE-2023-5380 was patched at 2023-10-25, unknown date

ubuntu: CVE-2023-5380 was patched at 2023-10-25, 2023-10-31

oraclelinux: CVE-2023-5380 was patched at 2023-11-22

redhat: CVE-2023-5380 was patched at 2023-11-21

redos: CVE-2023-5380 was patched at 2023-11-15

181. Memory Corruption - qt (CVE-2023-33285) - Medium [244]

Description: An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. QDnsLookup has a buffer over-read via a crafted reply from a DNS server.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:qt:qt (exists in CPE dict)
CVSS Base Score0.510CVSS Base Score is 5.3. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00046, EPSS Percentile is 0.1372

debian: CVE-2023-33285 was patched at unknown date

oraclelinux: CVE-2023-33285 was patched at 2023-11-12, 2023-11-17

almalinux: CVE-2023-33285 was patched at 2023-11-07, 2023-11-14

redhat: CVE-2023-33285 was patched at 2023-11-07, 2023-11-14

182. Memory Corruption - GPAC (CVE-2023-46927) - Medium [239]

Description: GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/MP4Box.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.414GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity)
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10354

debian: CVE-2023-46927 was patched at unknown date

redos: CVE-2023-46927 was patched at 2023-11-10

183. Memory Corruption - Procps (CVE-2023-4016) - Medium [208]

Description: Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.514Product detected by a:procps_project:procps (exists in CPE dict)
CVSS Base Score0.210CVSS Base Score is 2.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.06784

debian: CVE-2023-4016 was patched at unknown date

ubuntu: CVE-2023-4016 was patched at 2023-11-14

oraclelinux: CVE-2023-4016 was patched at 2023-11-11, 2023-11-17

almalinux: CVE-2023-4016 was patched at 2023-11-07, 2023-11-14

redhat: CVE-2023-4016 was patched at 2023-11-07, 2023-11-14

redos: CVE-2023-4016 was patched at 2023-10-20

Low (9)

184. Unknown Vulnerability Type - GPAC (CVE-2023-46928) - Low [150]

Description: {'nvd_cve_data_all': 'GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.414GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity)
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10354

debian: CVE-2023-46928 was patched at unknown date

redos: CVE-2023-46928 was patched at 2023-11-10

185. Unknown Vulnerability Type - GPAC (CVE-2023-46930) - Low [150]

Description: {'nvd_cve_data_all': 'GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.414GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity)
CVSS Base Score0.610CVSS Base Score is 5.5. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10354

debian: CVE-2023-46930 was patched at unknown date

redos: CVE-2023-46930 was patched at 2023-11-10

186. Unknown Vulnerability Type - Unknown Product (CVE-2019-14560) - Low [0]

Description: {'nvd_cve_data_all': 'Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

oraclelinux: CVE-2019-14560 was patched at 2023-11-11, 2023-11-17

almalinux: CVE-2019-14560 was patched at 2023-11-07, 2023-11-14

redhat: CVE-2019-14560 was patched at 2023-11-07, 2023-11-14, 2024-01-25

187. Unknown Vulnerability Type - Unknown Product (CVE-2023-40474) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-40474 was patched at 2023-10-24, 2023-10-28, unknown date

ubuntu: CVE-2023-40474 was patched at 2023-11-29

188. Unknown Vulnerability Type - Unknown Product (CVE-2023-40475) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-40475 was patched at 2023-10-24, 2023-10-28, unknown date

ubuntu: CVE-2023-40475 was patched at 2023-11-29

189. Unknown Vulnerability Type - Unknown Product (CVE-2023-40476) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-40476 was patched at 2023-10-24, 2023-10-28, unknown date

ubuntu: CVE-2023-40476 was patched at 2023-11-29

190. Unknown Vulnerability Type - Unknown Product (CVE-2023-4134) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-4134 was patched at unknown date

ubuntu: CVE-2023-4134 was patched at 2023-10-31, 2023-11-28

191. Unknown Vulnerability Type - Unknown Product (CVE-2023-42117) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-42117 was patched at unknown date

ubuntu: CVE-2023-42117 was patched at 2023-10-26

192. Unknown Vulnerability Type - Unknown Product (CVE-2023-42119) - Low [0]

Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-42119 was patched at unknown date

ubuntu: CVE-2023-42119 was patched at 2023-10-26

Exploitation in the wild detected (1)

Cross Site Scripting (1)

Public exploit exists, but exploitation in the wild is NOT detected (46)

Remote Code Execution (7)

Arbitrary File Writing (1)

Elevation of Privilege (1)

Authentication Bypass (1)

Denial of Service (12)

Code Injection (1)

Command Injection (1)

Arbitrary File Reading (1)

Security Feature Bypass (3)

Memory Corruption (11)

Incorrect Calculation (3)

Cross Site Scripting (2)

Information Disclosure (1)

Open Redirect (1)

Other Vulnerabilities (145)

Remote Code Execution (6)

Security Feature Bypass (20)

Command Injection (1)

Memory Corruption (22)

Denial of Service (33)

Elevation of Privilege (7)

Incorrect Calculation (7)

Path Traversal (4)

Information Disclosure (17)

Code Injection (2)

Authentication Bypass (7)

Cross Site Scripting (6)

Spoofing (3)

Open Redirect (1)

Unknown Vulnerability Type (9)