Report Name: Linux Patch Wednesday October 2023
Generated: 2023-11-05 02:05:45

Vulristics Vulnerability Scores
Basic Vulnerability Scores
Products

Product NamePrevalenceUCHMLAComment
Active Directory0.911Active Directory is a directory service developed by Microsoft for Windows domain networks
Apache Log4j0.911Apache Log4j is a Java-based logging utility
HTTP/2 protocol0.911HTTP/2 is a major revision of the HTTP network protocol used by the World Wide Web
Linux Kernel0.9257The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
Binutils0.888The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
Chromium0.8261119Chromium is a free and open-source web browser project, mainly developed and maintained by Google
GNOME desktop0.811GNOME originally an acronym for GNU Network Object Model Environment, is a free and open-source desktop environment for Linux and other Unix-like operating systems
GNU C Library0.8134The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library
Mozilla Firefox0.8347Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
Netty0.811Netty is a non-blocking I/O client-server framework for the development of Java network applications such as protocol servers and clients
Node.js0.833Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more
Samba0.8112Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell
Webkit0.811WebKit is a browser engine developed by Apple and primarily used in its Safari web browser, as well as all web browsers on iOS and iPadOS
Windows NTFS0.8112The default file system of the Windows NT family
Xlib0.8145Xlib (also known as libX11) is an X Window System protocol client library written in the C programming language
libvpx0.811libvpx is a free software video codec library from Google and the Alliance for Open Media (AOMedia)
Apache Tomcat0.733Apache Tomcat is a free and open-source implementation of the Jakarta Servlet, Jakarta Expression Language, and WebSocket technologies
Babel0.711Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
Curl0.7112Curl is a command-line tool for transferring data specified with URL syntax
FFmpeg0.755FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
Intel Ethernet Controller RDMA driver for linux0.711Remote Direct Memory Access (RDMA) is a computer networking technology usually implemented over high-speed, low-latency networks (aka fabrics) which allows for direct access to a remote host's memory, dramatically reducing latency and CPU overhead
Logstash0.711Logstash is an open source data collection engine with real-time pipelining capabilities
MariaDB0.711MariaDB is a community-developed, commercially supported fork of the MySQL relational database management system, intended to remain free and open-source software under the GNU General Public License
MediaWiki0.71225MediaWiki is a free server-based wiki software, licensed under the GNU General Public License (GPL)
QEMU0.733QEMU is a generic and open source machine & userspace emulator and virtualizer
macOS0.711macOS is an operating system developed and marketed by Apple Inc
semver0.711The semantic version parser used by npm
vim0.744Vim is a free and open-source, screen-based text editor program
Bouncy Castle0.611Bouncy Castle is a collection of APIs used in cryptography
Eclipse Mosquitto0.655Eclipse Mosquitto provides a lightweight server implementation of the MQTT protocol that is suitable for all situations from full power machines to embedded and low power machines
FreeRDP0.61010FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
ImageMagick0.611ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images
Jetty0.6235Jetty is a Java based web server and servlet engine
LibTomMath0.611LibTomMath is a free open source portable number theoretic multiple-precision integer library written entirely in C
Nokogiri0.611Nokogiri is an open source XML and HTML library for the Ruby programming language
Puma0.611Puma is a Ruby/Rack web server built for parallelism
Python0.6123Python is a high-level, general-purpose programming language
ReadyMedia0.611ReadyMedia (formerly known as MiniDLNA) is a simple media server software, with the aim of being fully compliant with DLNA/UPnP-AV clients
Wireshark0.611Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education
libxml20.611libxml2 is an XML toolkit implemented in C, originally developed for the GNOME Project
pgAdmin0.611pgAdmin is the most popular and feature rich Open Source administration and development platform for PostgreSQL, the most advanced Open Source database in the world
tiffcrop0.611Tiffcrop processes one or more files created according to the Tag Image File Format, Revision 6.0, specification into one or more TIFF file(s)
Django0.511Django is a free and open-source, Python-based web framework that follows the model–template–views architectural pattern
FRRouting0.511Free Range Routing or FRRouting or FRR is a network routing software suite running on Unix-like platforms, particularly Linux, Solaris, OpenBSD, FreeBSD and NetBSD
Go Project0.511Go is an open source project developed by a team at Google and many contributors from the open source community
HTTP/1 Client0.511The first usable version of HTTP protocol created in 1997
SchedMD Slurm0.511The Slurm Workload Manager, formerly known as Simple Linux Utility for Resource Management, or simply Slurm, is a free and open-source job scheduler for Linux and Unix-like kernels, used by many of the world's supercomputers and computer clusters
TLS0.511TLS
GPAC0.411GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity)
LLDP0.411LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as Extreme's EDP (Extreme Discovery Protocol) and CDP (Cisco Discovery Protocol)
tough-cookie0.411tough-cookie is a RFC6265 Cookies and CookieJar module for Node.js
Artifex Ghostscript0.311Artifex Ghostscript is an interpreter for the PostScript® language and PDF files
OpenPMIx0.311Reference Implementation of the Process Management Interface Exascale (PMIx) standard
Unknown Product01212Unknown Product


Vulnerability Types

Vulnerability TypeCriticalityUCHMLA
Remote Code Execution1.0111012
Code Injection0.9733
Command Injection0.97224
Arbitrary File Reading0.9511
Authentication Bypass0.95123
Security Feature Bypass0.97714
Denial of Service0.7133438
Memory Corruption0.6183948
Open Redirect0.611
Elevation of Privilege0.522
Cross Site Scripting0.411
Information Disclosure0.4112
Path Traversal0.411
Spoofing0.433
Tampering0.311
Unknown Vulnerability Type011314


Comments

SourceUCHMLA
debian21299314139
oraclelinux21915128
almalinux2191123
redhat311020438
ubuntu211647874
redos151824


Vulnerabilities

Urgent (3)

1. Remote Code Execution - Chromium (CVE-2023-3171) - Urgent [954]

Description: Remote Code Execution in Chromium

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on RansomwareINFO website
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on ExploitINFO website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 9.2. According to Custom data source
EPSS Percentile1.010EPSS Probability is 0.97434, EPSS Percentile is 0.99924

redhat: CVE-2023-3171 was patched at 2023-10-06

2. Denial of Service - HTTP/2 protocol (CVE-2023-44487) - Urgent [905]

Description: The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (cisa_kev object) website
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Uncontrolled Resource Consumption in Ietf Http, [githubexploit] Exploit for Uncontrolled Resource Consumption in Ietf Http, [githubexploit] Exploit for Uncontrolled Resource Consumption in Ietf Http)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914HTTP/2 is a major revision of the HTTP network protocol used by the World Wide Web
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.52748, EPSS Percentile is 0.97218

debian: CVE-2023-44487 was patched at 2023-10-10, 2023-10-12, 2023-10-16, 2023-10-30, unknown date

oraclelinux: CVE-2023-44487 was patched at 2023-10-17, 2023-10-18, 2023-10-19, 2023-10-20, 2023-10-23, 2023-10-24, 2023-10-26

almalinux: CVE-2023-44487 was patched at 2023-10-16, 2023-10-17, 2023-10-18, 2023-10-19, 2023-10-23, 2023-10-24, 2023-10-25

redhat: CVE-2023-44487 was patched at 2023-10-16, 2023-10-17, 2023-10-18, 2023-10-19, 2023-10-20, 2023-10-23, 2023-10-24, 2023-10-25, 2023-10-27, 2023-10-31

ubuntu: CVE-2023-44487 was patched at 2023-10-10, 2023-10-19

3. Memory Corruption - Chromium (CVE-2023-5217) - Urgent [883]

Description: Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (cisa_kev object) website
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Out-of-bounds Write in Webmproject Libvpx)
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.26047, EPSS Percentile is 0.96188

debian: CVE-2023-5217 was patched at 2023-09-29, unknown date

oraclelinux: CVE-2023-5217 was patched at 2023-10-05, 2023-10-06, 2023-10-10, 2023-10-11, 2023-10-13

almalinux: CVE-2023-5217 was patched at 2023-10-04, 2023-10-09

redhat: CVE-2023-5217 was patched at 2023-10-04, 2023-10-05, 2023-10-09

ubuntu: CVE-2023-5217 was patched at 2023-10-02, 2023-10-03, 2023-10-23, 2023-11-01

redos: CVE-2023-5217 was patched at 2023-10-16

Critical (1)

4. Remote Code Execution - GNU C Library (CVE-2023-4911) - Critical [621]

Description: A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Out-of-bounds Write in Gnu Glibc, [githubexploit] Exploit for Out-of-bounds Write in Gnu Glibc, [githubexploit] Exploit for Out-of-bounds Write in Gnu Glibc, [githubexploit] Exploit for Out-of-bounds Write in Gnu Glibc, [githubexploit] Exploit for Out-of-bounds Write in Gnu Glibc, [githubexploit] Exploit for Out-of-bounds Write in Gnu Glibc, [githubexploit] Exploit for Out-of-bounds Write in Gnu Glibc, [githubexploit] Exploit for Out-of-bounds Write in Gnu Glibc, [githubexploit] Exploit for Out-of-bounds Write in Gnu Glibc, [githubexploit] Exploit for Out-of-bounds Write in Gnu Glibc, [githubexploit] Exploit for Out-of-bounds Write in Gnu Glibc, [githubexploit] Exploit for Out-of-bounds Write in Gnu Glibc, [githubexploit] Exploit for Out-of-bounds Write in Gnu Glibc, [githubexploit] Exploit for Out-of-bounds Write in Gnu Glibc, [zdt] glibc ld.so Local Privilege Escalation Vulnerability, [packetstorm] glibc ld.so Local Privilege Escalation)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.1105

debian: CVE-2023-4911 was patched at 2023-10-03, unknown date

oraclelinux: CVE-2023-4911 was patched at 2023-10-05, 2023-10-06, 2023-10-09, 2023-10-10, 2023-10-12

almalinux: CVE-2023-4911 was patched at 2023-10-05

redhat: CVE-2023-4911 was patched at 2023-10-05

ubuntu: CVE-2023-4911 was patched at 2023-10-03

High (33)

5. Memory Corruption - Curl (CVE-2023-38545) - High [580]

Description: This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host name can be is 255 bytes. If the host name is detected to be longer, curl switches to local name resolving and instead passes on the resolved address only. Due to this bug, the local variable that means "let the host resolve the name" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long host name to the target buffer instead of copying just the resolved address there. The target buffer being a heap based buffer, and the host name coming from the URL that curl has been told to operate with.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Out-of-bounds Write in Haxx Libcurl, [githubexploit] Exploit for Out-of-bounds Write in Haxx Libcurl, [githubexploit] Exploit for Out-of-bounds Write in Haxx Libcurl, [githubexploit] Exploit for Out-of-bounds Write in Haxx Libcurl, [githubexploit] Exploit for Out-of-bounds Write in Haxx Libcurl)
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.714Curl is a command-line tool for transferring data specified with URL syntax
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00066, EPSS Percentile is 0.27578

debian: CVE-2023-38545 was patched at 2023-10-11, unknown date

oraclelinux: CVE-2023-38545 was patched at 2023-10-18

almalinux: CVE-2023-38545 was patched at 2023-10-17

redhat: CVE-2023-38545 was patched at 2023-10-13, 2023-10-17

ubuntu: CVE-2023-38545 was patched at 2023-10-11, 2023-10-17

redos: CVE-2023-38545 was patched at 2023-10-16

6. Memory Corruption - Jetty (CVE-2023-26048) - High [528]

Description: Jetty is a java based web server and servlet engine. In affected versions servlets with multipart support (e.g. annotated with `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or `HttpServletRequest.getParts()` may cause `OutOfMemoryError` when the client sends a multipart request with a part that has a name but no filename and very large content. This happens even with the default settings of `fileSizeThreshold=0` which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw `OutOfMemoryError`. However, the server may be able to recover after the `OutOfMemoryError` and continue its service -- although it may take some time. This issue has been patched in versions 9.4.51, 10.0.14, and 11.0.14. Users are advised to upgrade. Users unable to upgrade may set the multipart parameter `maxRequestSize` which must be set to a non-negative value, so the whole multipart content is limited (although still read into memory).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Uncontrolled Resource Consumption in Eclipse Jetty)
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.614Jetty is a Java based web server and servlet engine
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile0.510EPSS Probability is 0.00131, EPSS Percentile is 0.4777

debian: CVE-2023-26048 was patched at 2023-09-28, unknown date

7. Remote Code Execution - Linux Kernel (CVE-2023-44466) - High [495]

Description: An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile0.510EPSS Probability is 0.0014, EPSS Percentile is 0.49394

debian: CVE-2023-44466 was patched at unknown date

ubuntu: CVE-2023-44466 was patched at 2023-10-04, 2023-10-06, 2023-10-19, 2023-10-24, 2023-10-31

8. Denial of Service - TLS (CVE-2023-29409) - High [494]

Description: Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Uncontrolled Resource Consumption in Golang Go)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514TLS
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.18295

debian: CVE-2023-29409 was patched at unknown date

oraclelinux: CVE-2023-29409 was patched at 2023-10-18

almalinux: CVE-2023-29409 was patched at 2023-10-16

redhat: CVE-2023-29409 was patched at 2023-10-16, 2023-10-20

9. Remote Code Execution - Python (CVE-2019-19450) - High [480]

Description: paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.710EPSS Probability is 0.00378, EPSS Percentile is 0.69937

debian: CVE-2019-19450 was patched at unknown date

oraclelinux: CVE-2019-19450 was patched at 2023-10-11, 2023-10-19

almalinux: CVE-2019-19450 was patched at 2023-10-17

redhat: CVE-2019-19450 was patched at 2023-10-10, 2023-10-17

10. Remote Code Execution - GNOME desktop (CVE-2023-43641) - High [478]

Description: libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814GNOME originally an acronym for GNU Network Object Model Environment, is a free and open-source desktop environment for Linux and other Unix-like operating systems
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile0.510EPSS Probability is 0.00139, EPSS Percentile is 0.49215

debian: CVE-2023-43641 was patched at 2023-10-11, unknown date

ubuntu: CVE-2023-43641 was patched at 2023-10-09, 2023-10-17

11. Tampering - Jetty (CVE-2023-26049) - High [475]

Description: Jetty is a java based web server and servlet engine. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered. So, a cookie header such as: `DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d"` will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d instead of 3 separate cookies. This has security implications because if, say, JSESSIONID is an HttpOnly cookie, and the DISPLAY_LANGUAGE cookie value is rendered on the page, an attacker can smuggle the JSESSIONID cookie into the DISPLAY_LANGUAGE cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server or its logging system. This issue has been addressed in versions 9.4.51, 10.0.14, 11.0.14, and 12.0.0.beta0 and users are advised to upgrade. There are no known workarounds for this issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Exposure of Sensitive Information to an Unauthorized Actor in Eclipse Jetty, [githubexploit] Exploit for Exposure of Sensitive Information to an Unauthorized Actor in Eclipse Jetty)
Criticality of Vulnerability Type0.315Tampering
Vulnerable Product is Common0.614Jetty is a Java based web server and servlet engine
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile0.510EPSS Probability is 0.00172, EPSS Percentile is 0.54188

debian: CVE-2023-26049 was patched at 2023-09-28, unknown date

12. Remote Code Execution - Webkit (CVE-2023-39928) - High [466]

Description: A use-after-free vulnerability exists in the MediaRecorder API of Webkit WebKitGTK 2.40.5. A specially crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code execution. A user would need to to visit a malicious webpage to trigger this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814WebKit is a browser engine developed by Apple and primarily used in its Safari web browser, as well as all web browsers on iOS and iPadOS
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00093, EPSS Percentile is 0.39161

debian: CVE-2023-39928 was patched at 2023-10-12, unknown date

ubuntu: CVE-2023-39928 was patched at 2023-10-10

13. Security Feature Bypass - Node.js (CVE-2023-32002) - High [460]

Description: The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00091, EPSS Percentile is 0.3861

debian: CVE-2023-32002 was patched at unknown date

oraclelinux: CVE-2023-32002 was patched at 2023-09-28, 2023-10-05, 2023-10-10

almalinux: CVE-2023-32002 was patched at 2023-09-26, 2023-10-09

redhat: CVE-2023-32002 was patched at 2023-09-26, 2023-10-09

14. Command Injection - Puma (CVE-2023-40175) - High [451]

Description: Puma is a Ruby/Rack web server built for parallelism. Prior to versions 6.3.1 and 5.6.7, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggling. Severity of this issue is highly dependent on the nature of the web site using puma is. This could be caused by either incorrect parsing of trailing fields in chunked transfer encoding bodies or by parsing of blank/zero-length Content-Length headers. Both issues have been addressed and this vulnerability has been fixed in versions 6.3.1 and 5.6.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common0.614Puma is a Ruby/Rack web server built for parallelism
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.510EPSS Probability is 0.00127, EPSS Percentile is 0.4706

debian: CVE-2023-40175 was patched at unknown date

ubuntu: CVE-2023-40175 was patched at 2023-09-27

15. Remote Code Execution - macOS (CVE-2023-41074) - High [449]

Description: The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714macOS is an operating system developed and marketed by Apple Inc
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.0011, EPSS Percentile is 0.43899

debian: CVE-2023-41074 was patched at 2023-10-12, unknown date

ubuntu: CVE-2023-41074 was patched at 2023-10-10

16. Security Feature Bypass - Node.js (CVE-2023-32006) - High [436]

Description: The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00066, EPSS Percentile is 0.27969

debian: CVE-2023-32006 was patched at unknown date

oraclelinux: CVE-2023-32006 was patched at 2023-09-28, 2023-10-05, 2023-10-10

almalinux: CVE-2023-32006 was patched at 2023-09-26, 2023-10-09

redhat: CVE-2023-32006 was patched at 2023-09-26, 2023-10-09

17. Remote Code Execution - LibTomMath (CVE-2023-36328) - High [433]

Description: Integer Overflow vulnerability in mp_grow in libtom libtommath before commit beba892bc0d4e4ded4d667ab1d2a94f4d75109a9, allows attackers to execute arbitrary code and cause a denial of service (DoS).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614LibTomMath is a free open source portable number theoretic multiple-precision integer library written entirely in C
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00081, EPSS Percentile is 0.34189

debian: CVE-2023-36328 was patched at unknown date

ubuntu: CVE-2023-36328 was patched at 2023-10-02

redos: CVE-2023-36328 was patched at 2023-10-23

18. Remote Code Execution - Artifex Ghostscript (CVE-2023-43115) - High [430]

Description: In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.314Artifex Ghostscript is an interpreter for the PostScript® language and PDF files
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.710EPSS Probability is 0.00497, EPSS Percentile is 0.73645

debian: CVE-2023-43115 was patched at unknown date

oraclelinux: CVE-2023-43115 was patched at 2023-11-03

almalinux: CVE-2023-43115 was patched at 2023-11-02

redhat: CVE-2023-43115 was patched at 2023-10-18, 2023-11-02

ubuntu: CVE-2023-43115 was patched at 2023-10-17

19. Remote Code Execution - Babel (CVE-2023-45133) - High [426]

Description: Babel is a compiler for writingJavaScript. In `@babel/traverse` prior to versions 7.23.2 and 8.0.0-alpha.4 and all versions of `babel-traverse`, using Babel to compile code that was specifically crafted by an attacker can lead to arbitrary code execution during compilation, when using plugins that rely on the `path.evaluate()`or `path.evaluateTruthy()` internal Babel methods. Known affected plugins are `@babel/plugin-transform-runtime`; `@babel/preset-env` when using its `useBuiltIns` option; and any "polyfill provider" plugin that depends on `@babel/helper-define-polyfill-provider`, such as `babel-plugin-polyfill-corejs3`, `babel-plugin-polyfill-corejs2`, `babel-plugin-polyfill-es-shims`, `babel-plugin-polyfill-regenerator`. No other plugins under the `@babel/` namespace are impacted, but third-party plugins might be. Users that only compile trusted code are not impacted. The vulnerability has been fixed in `@babel/traverse@7.23.2` and `@babel/traverse@8.0.0-alpha.4`. Those who cannot upgrade `@babel/traverse` and are using one of the affected packages mentioned above should upgrade them to their latest version to avoid triggering the vulnerable code path in affected `@babel/traverse` versions: `@babel/plugin-transform-runtime` v7.23.2, `@babel/preset-env` v7.23.2, `@babel/helper-define-polyfill-provider` v0.4.3, `babel-plugin-polyfill-corejs2` v0.4.6, `babel-plugin-polyfill-corejs3` v0.8.5, `babel-plugin-polyfill-es-shims` v0.10.0, `babel-plugin-polyfill-regenerator` v0.5.3.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.0006, EPSS Percentile is 0.23943

debian: CVE-2023-45133 was patched at 2023-10-16, unknown date

20. Arbitrary File Reading - ReadyMedia (CVE-2022-26505) - High [424]

Description: A DNS rebinding issue in ReadyMedia (formerly MiniDLNA) before 1.3.1 allows a remote web server to exfiltrate media files.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9515Arbitrary File Reading
Vulnerable Product is Common0.614ReadyMedia (formerly known as MiniDLNA) is a simple media server software, with the aim of being fully compliant with DLNA/UPnP-AV clients
CVSS Base Score0.710CVSS Base Score is 7.4. According to Vulners data source
EPSS Percentile0.610EPSS Probability is 0.00253, EPSS Percentile is 0.63025

debian: CVE-2022-26505 was patched at unknown date

ubuntu: CVE-2022-26505 was patched at 2023-09-27

21. Memory Corruption - Mozilla Firefox (CVE-2023-5176) - High [419]

Description: Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.510EPSS Probability is 0.00128, EPSS Percentile is 0.47255

debian: CVE-2023-5176 was patched at 2023-09-28, 2023-10-03, unknown date

oraclelinux: CVE-2023-5176 was patched at 2023-10-05, 2023-10-06, 2023-10-13

almalinux: CVE-2023-5176 was patched at 2023-10-04

redhat: CVE-2023-5176 was patched at 2023-10-04, 2023-10-05

ubuntu: CVE-2023-5176 was patched at 2023-10-03

22. Remote Code Execution - Windows NTFS (CVE-2023-4692) - High [419]

Description: An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814The default file system of the Windows NT family
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.05714

debian: CVE-2023-4692 was patched at 2023-10-06, unknown date

ubuntu: CVE-2023-4692 was patched at 2023-10-04

23. Remote Code Execution - Xlib (CVE-2023-43787) - High [419]

Description: A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Xlib (also known as libX11) is an X Window System protocol client library written in the C programming language
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.07878

debian: CVE-2023-43787 was patched at 2023-10-05, unknown date

ubuntu: CVE-2023-43787 was patched at 2023-10-03, 2023-10-10, 2023-10-23

redos: CVE-2023-43787 was patched at 2023-10-19

24. Authentication Bypass - MediaWiki (CVE-2023-3550) - High [417]

Description: Mediawiki v1.40.0 does not validate namespaces used in XML files. Therefore, if the instance administrator allows XML file uploads, a remote attacker with a low-privileged user account can use this exploit to become an administrator by sending a malicious link to the instance administrator.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.714MediaWiki is a free server-based wiki software, licensed under the GNU General Public License (GPL)
CVSS Base Score0.710CVSS Base Score is 7.3. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00113, EPSS Percentile is 0.44531

debian: CVE-2023-3550 was patched at 2023-10-10, unknown date

25. Denial of Service - Apache Log4j (CVE-2023-26464) - High [417]

Description: ** UNSUPPORTED WHEN ASSIGNED ** When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie, deeply nested) hashmap or hashtable (depending on which logging component is in use) to be processed could exhaust the available memory in the virtual machine and achieve Denial of Service when the object is deserialized. This issue affects Apache Log4j before 2. Affected users are recommended to update to Log4j 2.x. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914Apache Log4j is a Java-based logging utility
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00089, EPSS Percentile is 0.37434

redhat: CVE-2023-26464 was patched at 2023-10-06

26. Security Feature Bypass - Chromium (CVE-2023-5483) - High [413]

Description: Inappropriate implementation in Intents in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00079, EPSS Percentile is 0.3345

debian: CVE-2023-5483 was patched at 2023-10-12, unknown date

27. Security Feature Bypass - Node.js (CVE-2023-32559) - High [413]

Description: A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the policy mechanism by requiring internal modules and eventually take advantage of `process.binding('spawn_sync')` run arbitrary code, outside of the limits defined in a `policy.json` file. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.1697

debian: CVE-2023-32559 was patched at unknown date

oraclelinux: CVE-2023-32559 was patched at 2023-09-28, 2023-10-05, 2023-10-10

almalinux: CVE-2023-32559 was patched at 2023-09-26, 2023-10-09

redhat: CVE-2023-32559 was patched at 2023-09-26, 2023-10-09

28. Memory Corruption - Linux Kernel (CVE-2023-38427) - High [411]

Description: An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/smb2pdu.c in ksmbd has an integer underflow and out-of-bounds read in deassemble_neg_contexts.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00063, EPSS Percentile is 0.25953

debian: CVE-2023-38427 was patched at unknown date

ubuntu: CVE-2023-38427 was patched at 2023-10-05, 2023-10-31

29. Memory Corruption - Chromium (CVE-2023-5186) - High [407]

Description: Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile0.510EPSS Probability is 0.00167, EPSS Percentile is 0.53375

debian: CVE-2023-5186 was patched at 2023-09-29, unknown date

30. Memory Corruption - Chromium (CVE-2023-5218) - High [407]

Description: Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile0.510EPSS Probability is 0.00127, EPSS Percentile is 0.47167

debian: CVE-2023-5218 was patched at 2023-10-12, unknown date

31. Memory Corruption - Mozilla Firefox (CVE-2023-5172) - High [407]

Description: A hashtable in the Ion Engine could have been mutated while there was a live interior reference, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox < 118.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00091, EPSS Percentile is 0.3861

ubuntu: CVE-2023-5172 was patched at 2023-10-03

32. Memory Corruption - Mozilla Firefox (CVE-2023-5175) - High [407]

Description: During process shutdown, it was possible that an `ImageBitmap` was created that would later be used after being freed from a different codepath, leading to a potentially exploitable crash. This vulnerability affects Firefox < 118.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00091, EPSS Percentile is 0.3861

ubuntu: CVE-2023-5175 was patched at 2023-10-03

33. Command Injection - pgAdmin (CVE-2023-5002) - High [404]

Description: A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common0.614pgAdmin is the most popular and feature rich Open Source administration and development platform for PostgreSQL, the most advanced Open Source database in the world
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00057, EPSS Percentile is 0.21948

redos: CVE-2023-5002 was patched at 2023-10-13

34. Denial of Service - libvpx (CVE-2023-44488) - High [401]

Description: VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814libvpx is a free software video codec library from Google and the Alliance for Open Media (AOMedia)
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00085, EPSS Percentile is 0.35449

debian: CVE-2023-44488 was patched at 2023-10-05, unknown date

oraclelinux: CVE-2023-44488 was patched at 2023-10-10, 2023-10-11, 2023-10-30, 2023-10-31

almalinux: CVE-2023-44488 was patched at 2023-10-09, 2023-10-30

redhat: CVE-2023-44488 was patched at 2023-10-09, 2023-10-30

ubuntu: CVE-2023-44488 was patched at 2023-10-02, 2023-10-23, 2023-11-01

redos: CVE-2023-44488 was patched at 2023-10-16

35. Security Feature Bypass - Chromium (CVE-2023-5475) - High [401]

Description: Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.18136

debian: CVE-2023-5475 was patched at 2023-10-12, unknown date

36. Security Feature Bypass - Chromium (CVE-2023-5479) - High [401]

Description: Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00053, EPSS Percentile is 0.19123

debian: CVE-2023-5479 was patched at 2023-10-12, unknown date

37. Security Feature Bypass - Chromium (CVE-2023-5487) - High [401]

Description: Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.18767

debian: CVE-2023-5487 was patched at 2023-10-12, unknown date

Medium (96)

38. Security Feature Bypass - Apache Tomcat (CVE-2023-45648) - Medium [396]

Description: Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.714Apache Tomcat is a free and open-source implementation of the Jakarta Servlet, Jakarta Expression Language, and WebSocket technologies
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile0.510EPSS Probability is 0.00157, EPSS Percentile is 0.52061

debian: CVE-2023-45648 was patched at 2023-10-10, unknown date

redhat: CVE-2023-45648 was patched at 2023-10-31

39. Memory Corruption - Linux Kernel (CVE-2023-38431) - Medium [388]

Description: An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/connection.c in ksmbd does not validate the relationship between the NetBIOS header's length field and the SMB header sizes, via pdu_size in ksmbd_conn_handler_loop, leading to an out-of-bounds read.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.910CVSS Base Score is 9.1. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24271

debian: CVE-2023-38431 was patched at unknown date

ubuntu: CVE-2023-38431 was patched at 2023-10-05, 2023-10-31

40. Memory Corruption - FreeRDP (CVE-2023-40567) - Medium [385]

Description: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `clear_decompress_bands_data` function in which there is no offset validation. Abuse of this vulnerability may lead to an out of bounds write. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.614FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.510EPSS Probability is 0.00118, EPSS Percentile is 0.45559

debian: CVE-2023-40567 was patched at unknown date

ubuntu: CVE-2023-40567 was patched at 2023-10-04

41. Denial of Service - QEMU (CVE-2023-3255) - Medium [384]

Description: A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714QEMU is a generic and open source machine & userspace emulator and virtualizer
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.510EPSS Probability is 0.00138, EPSS Percentile is 0.49125

debian: CVE-2023-3255 was patched at unknown date

debian: CVE-2023-32559 was patched at unknown date

oraclelinux: CVE-2023-3255 was patched at 2023-10-07

oraclelinux: CVE-2023-32559 was patched at 2023-09-28, 2023-10-05, 2023-10-10

almalinux: CVE-2023-32559 was patched at 2023-09-26, 2023-10-09

redhat: CVE-2023-32559 was patched at 2023-09-26, 2023-10-09

42. Denial of Service - semver (CVE-2022-25883) - Medium [384]

Description: Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714The semantic version parser used by npm
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00091, EPSS Percentile is 0.38762

debian: CVE-2022-25883 was patched at unknown date

oraclelinux: CVE-2022-25883 was patched at 2023-09-28, 2023-10-05

almalinux: CVE-2022-25883 was patched at 2023-09-26

redhat: CVE-2022-25883 was patched at 2023-09-26, 2023-10-06

43. Memory Corruption - Chromium (CVE-2023-5187) - Medium [383]

Description: Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00066, EPSS Percentile is 0.27836

debian: CVE-2023-5187 was patched at 2023-09-29, unknown date

44. Memory Corruption - Chromium (CVE-2023-5346) - Medium [383]

Description: Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00082, EPSS Percentile is 0.34262

debian: CVE-2023-5346 was patched at 2023-10-04, unknown date

45. Memory Corruption - Chromium (CVE-2023-5474) - Medium [383]

Description: Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00083, EPSS Percentile is 0.34708

debian: CVE-2023-5474 was patched at 2023-10-12, unknown date

46. Memory Corruption - Chromium (CVE-2023-5476) - Medium [383]

Description: Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00083, EPSS Percentile is 0.34664

debian: CVE-2023-5476 was patched at 2023-10-12, unknown date

47. Memory Corruption - vim (CVE-2022-3520) - Medium [378]

Description: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0765.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00071, EPSS Percentile is 0.2949

debian: CVE-2022-3520 was patched at unknown date

debian: CVE-2022-35205 was patched at unknown date

ubuntu: CVE-2022-3520 was patched at 2023-10-09

ubuntu: CVE-2022-35205 was patched at 2023-10-04

48. Denial of Service - GNU C Library (CVE-2023-4527) - Medium [377]

Description: A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00066, EPSS Percentile is 0.27586

debian: CVE-2023-4527 was patched at unknown date

oraclelinux: CVE-2023-4527 was patched at 2023-10-10, 2023-10-12

almalinux: CVE-2023-4527 was patched at 2023-10-05

redhat: CVE-2023-4527 was patched at 2023-10-05

ubuntu: CVE-2023-4527 was patched at 2023-10-03

49. Denial of Service - GNU C Library (CVE-2023-4806) - Medium [377]

Description: A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library
CVSS Base Score0.610CVSS Base Score is 5.9. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00096, EPSS Percentile is 0.40075

debian: CVE-2023-4806 was patched at unknown date

oraclelinux: CVE-2023-4806 was patched at 2023-10-10, 2023-10-12

almalinux: CVE-2023-4806 was patched at 2023-10-05

redhat: CVE-2023-4806 was patched at 2023-10-05

50. Security Feature Bypass - Chromium (CVE-2023-5478) - Medium [377]

Description: Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00078, EPSS Percentile is 0.3295

debian: CVE-2023-5478 was patched at 2023-10-12, unknown date

51. Security Feature Bypass - Chromium (CVE-2023-5485) - Medium [377]

Description: Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00076, EPSS Percentile is 0.31717

debian: CVE-2023-5485 was patched at 2023-10-12, unknown date

52. Memory Corruption - FreeRDP (CVE-2023-40186) - Medium [373]

Description: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an IntegerOverflow leading to Out-Of-Bound Write Vulnerability in the `gdi_CreateSurface` function. This issue affects FreeRDP based clients only. FreeRDP proxies are not affected as image decoding is not done by a proxy. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.614FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00107, EPSS Percentile is 0.43204

debian: CVE-2023-40186 was patched at unknown date

ubuntu: CVE-2023-40186 was patched at 2023-10-04

53. Memory Corruption - FreeRDP (CVE-2023-40569) - Medium [373]

Description: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `progressive_decompress` function. This issue is likely down to incorrect calculations of the `nXSrc` and `nYSrc` variables. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.614FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00107, EPSS Percentile is 0.43204

debian: CVE-2023-40569 was patched at unknown date

ubuntu: CVE-2023-40569 was patched at 2023-10-04

54. Elevation of Privilege - Intel Ethernet Controller RDMA driver for linux (CVE-2023-25775) - Medium [372]

Description: Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.714Remote Direct Memory Access (RDMA) is a computer networking technology usually implemented over high-speed, low-latency networks (aka fabrics) which allows for direct access to a remote host's memory, dramatically reducing latency and CPU overhead
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00102, EPSS Percentile is 0.41623

debian: CVE-2023-25775 was patched at unknown date

ubuntu: CVE-2023-25775 was patched at 2023-10-04

55. Memory Corruption - Mozilla Firefox (CVE-2023-5170) - Medium [371]

Description: In canvas rendering, a compromised content process could have caused a surface to change unexpectedly, leading to a memory leak of a privileged process. This memory leak could be used to effect a sandbox escape if the correct data was leaked. This vulnerability affects Firefox < 118.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.710CVSS Base Score is 7.4. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00087, EPSS Percentile is 0.36449

ubuntu: CVE-2023-5170 was patched at 2023-10-03

56. Denial of Service - FreeRDP (CVE-2023-39353) - Medium [367]

Description: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to a missing offset validation leading to Out Of Bound Read. In the `libfreerdp/codec/rfx.c` file there is no offset validation in `tile->quantIdxY`, `tile->quantIdxCb`, and `tile->quantIdxCr`. As a result crafted input can lead to an out of bounds read access which in turn will cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
CVSS Base Score0.910CVSS Base Score is 9.1. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00071, EPSS Percentile is 0.29752

debian: CVE-2023-39353 was patched at unknown date

ubuntu: CVE-2023-39353 was patched at 2023-10-04

57. Denial of Service - FreeRDP (CVE-2023-40181) - Medium [367]

Description: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Integer-Underflow leading to Out-Of-Bound Read in the `zgfx_decompress_segment` function. In the context of `CopyMemory`, it's possible to read data beyond the transmitted packet range and likely cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
CVSS Base Score0.910CVSS Base Score is 9.1. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00078, EPSS Percentile is 0.3308

debian: CVE-2023-40181 was patched at unknown date

ubuntu: CVE-2023-40181 was patched at 2023-10-04

58. Open Redirect - Apache Tomcat (CVE-2023-41080) - Medium [366]

Description: URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. The vulnerability is limited to the ROOT (default) web application.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Open Redirect
Vulnerable Product is Common0.714Apache Tomcat is a free and open-source implementation of the Jakarta Servlet, Jakarta Expression Language, and WebSocket technologies
CVSS Base Score0.610CVSS Base Score is 6.1. According to Vulners data source
EPSS Percentile0.610EPSS Probability is 0.00255, EPSS Percentile is 0.63212

debian: CVE-2023-41080 was patched at 2023-10-10, unknown date

59. Memory Corruption - Linux Kernel (CVE-2023-4623) - Medium [364]

Description: A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free. We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.05714

debian: CVE-2023-4623 was patched at unknown date

ubuntu: CVE-2023-4623 was patched at 2023-10-04, 2023-10-19, 2023-10-20, 2023-10-23, 2023-10-24, 2023-10-25, 2023-10-26, 2023-10-30, 2023-10-31

60. Code Injection - HTTP/1 Client (CVE-2023-29406) - Medium [363]

Description: The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.514The first usable version of HTTP protocol created in 1997
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00054, EPSS Percentile is 0.2005

debian: CVE-2023-29406 was patched at unknown date

redhat: CVE-2023-29406 was patched at 2023-10-16, 2023-10-20

61. Denial of Service - FFmpeg (CVE-2020-22024) - Medium [360]

Description: Buffer Overflow vulnerability in FFmpeg 4.2 at the lagfun_frame16 function in libavfilter/vf_lagfun.c, which could let a remote malicious user cause Denial of Service.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28901

debian: CVE-2020-22024 was patched at unknown date

ubuntu: CVE-2020-22024 was patched at 2023-10-12

62. Denial of Service - FFmpeg (CVE-2020-22039) - Medium [360]

Description: A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the inavi_add_ientry function.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00072, EPSS Percentile is 0.30356

debian: CVE-2020-22039 was patched at unknown date

ubuntu: CVE-2020-22039 was patched at 2023-10-12

63. Denial of Service - FFmpeg (CVE-2020-22043) - Medium [360]

Description: A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak at the fifo_alloc_common function in libavutil/fifo.c.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00072, EPSS Percentile is 0.30356

debian: CVE-2020-22043 was patched at unknown date

ubuntu: CVE-2020-22043 was patched at 2023-10-12

64. Denial of Service - FFmpeg (CVE-2020-22051) - Medium [360]

Description: A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the filter_frame function in vf_tile.c.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00081, EPSS Percentile is 0.34217

debian: CVE-2020-22051 was patched at unknown date

ubuntu: CVE-2020-22051 was patched at 2023-10-12

65. Denial of Service - MariaDB (CVE-2023-5157) - Medium [360]

Description: A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714MariaDB is a community-developed, commercially supported fork of the MySQL relational database management system, intended to remain free and open-source software under the GNU General Public License
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00057, EPSS Percentile is 0.219

debian: CVE-2023-5157 was patched at unknown date

oraclelinux: CVE-2023-5157 was patched at 2023-10-13, 2023-10-18

almalinux: CVE-2023-5157 was patched at 2023-10-12

redhat: CVE-2023-5157 was patched at 2023-10-12

66. Security Feature Bypass - Logstash (CVE-2021-22138) - Medium [360]

Description: In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitoring server. This could result in a man in the middle style attack against the Logstash monitoring data.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.714Logstash is an open source data collection engine with real-time pipelining capabilities
CVSS Base Score0.410CVSS Base Score is 3.7. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00065, EPSS Percentile is 0.27409

redos: CVE-2021-22138 was patched at 2023-09-28

67. Memory Corruption - Mozilla Firefox (CVE-2023-5169) - Medium [359]

Description: A compromised content process could have provided malicious data in a `PathRecording` resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00073, EPSS Percentile is 0.30451

debian: CVE-2023-5169 was patched at 2023-09-28, 2023-10-03, unknown date

oraclelinux: CVE-2023-5169 was patched at 2023-10-05, 2023-10-06, 2023-10-13

almalinux: CVE-2023-5169 was patched at 2023-10-04

redhat: CVE-2023-5169 was patched at 2023-10-04, 2023-10-05

ubuntu: CVE-2023-5169 was patched at 2023-10-03

68. Memory Corruption - Mozilla Firefox (CVE-2023-5171) - Medium [359]

Description: During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00073, EPSS Percentile is 0.30451

debian: CVE-2023-5171 was patched at 2023-09-28, 2023-10-03, unknown date

oraclelinux: CVE-2023-5171 was patched at 2023-10-05, 2023-10-06, 2023-10-13

almalinux: CVE-2023-5171 was patched at 2023-10-04

redhat: CVE-2023-5171 was patched at 2023-10-04, 2023-10-05

ubuntu: CVE-2023-5171 was patched at 2023-10-03

69. Memory Corruption - Mozilla Firefox (CVE-2023-5173) - Medium [359]

Description: In a non-standard configuration of Firefox, an integer overflow could have occurred based on network traffic (possibly under influence of a local unprivileged webpage), leading to an out-of-bounds write to privileged process memory. *This bug only affects Firefox if a non-standard preference allowing non-HTTPS Alternate Services (`network.http.altsvc.oe`) is enabled.* This vulnerability affects Firefox < 118.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00048, EPSS Percentile is 0.15167

ubuntu: CVE-2023-5173 was patched at 2023-10-03

70. Memory Corruption - Netty (CVE-2023-34462) - Medium [359]

Description: Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The `SniHandler` can allocate up to 16MB of heap for each channel during the TLS handshake. When the handler or the channel does not have an idle timeout, it can be used to make a TCP server using the `SniHandler` to allocate 16MB of heap. The `SniHandler` class is a handler that waits for the TLS handshake to configure a `SslHandler` according to the indicated server name by the `ClientHello` record. For this matter it allocates a `ByteBuf` using the value defined in the `ClientHello` record. Normally the value of the packet should be smaller than the handshake packet but there are not checks done here and the way the code is written, it is possible to craft a packet that makes the `SslClientHelloHandler`. This vulnerability has been fixed in version 4.1.94.Final.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Netty is a non-blocking I/O client-server framework for the development of Java network applications such as protocol servers and clients
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00073, EPSS Percentile is 0.30571

debian: CVE-2023-34462 was patched at unknown date

redhat: CVE-2023-34462 was patched at 2023-10-06

71. Denial of Service - Linux Kernel (CVE-2023-28327) - Medium [358]

Description: A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.05714

debian: CVE-2023-28327 was patched at unknown date

redhat: CVE-2023-28327 was patched at 2023-10-10

72. Code Injection - Bouncy Castle (CVE-2023-33201) - Medium [356]

Description: Bouncy Castle For Java before 1.74 is affected by an LDAP injection vulnerability. The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.614Bouncy Castle is a collection of APIs used in cryptography
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00051, EPSS Percentile is 0.1782

debian: CVE-2023-33201 was patched at unknown date

redhat: CVE-2023-33201 was patched at 2023-10-06

73. Command Injection - Jetty (CVE-2023-40167) - Medium [356]

Description: Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RFC and other servers routinely reject such requests with 400 responses. There is no known exploit scenario, but it is conceivable that request smuggling could result if jetty is used in combination with a server that does not close the connection after sending such a 400 response. Versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1 contain a patch for this issue. There is no workaround as there is no known exploit scenario.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common0.614Jetty is a Java based web server and servlet engine
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.0006, EPSS Percentile is 0.24138

debian: CVE-2023-40167 was patched at 2023-09-28, unknown date

74. Denial of Service - Eclipse Mosquitto (CVE-2021-41039) - Medium [355]

Description: In versions 1.6 to 2.0.11 of Eclipse Mosquitto, an MQTT v5 client connecting with a large number of user-property properties could cause excessive CPU usage, leading to a loss of performance and possible denial of service.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614Eclipse Mosquitto provides a lightweight server implementation of the MQTT protocol that is suitable for all situations from full power machines to embedded and low power machines
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00075, EPSS Percentile is 0.31391

debian: CVE-2021-41039 was patched at 2023-10-01, unknown date

75. Denial of Service - FreeRDP (CVE-2023-39350) - Medium [355]

Description: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. This issue affects Clients only. Integer underflow leading to DOS (e.g. abort due to `WINPR_ASSERT` with default compilation flags). When an insufficient blockLen is provided, and proper length validation is not performed, an Integer Underflow occurs, leading to a Denial of Service (DOS) vulnerability. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.0008, EPSS Percentile is 0.336

debian: CVE-2023-39350 was patched at unknown date

ubuntu: CVE-2023-39350 was patched at 2023-10-04

76. Denial of Service - FreeRDP (CVE-2023-40589) - Medium [355]

Description: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions there is a Global-Buffer-Overflow in the ncrush_decompress function. Feeding crafted input into this function can trigger the overflow which has only been shown to cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00071, EPSS Percentile is 0.29833

debian: CVE-2023-40589 was patched at unknown date

ubuntu: CVE-2023-40589 was patched at 2023-10-04

77. Denial of Service - GNU C Library (CVE-2023-4813) - Medium [353]

Description: A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library
CVSS Base Score0.610CVSS Base Score is 5.9. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.1749

debian: CVE-2023-4813 was patched at unknown date

oraclelinux: CVE-2023-4813 was patched at 2023-10-10, 2023-10-12

almalinux: CVE-2023-4813 was patched at 2023-10-05

redhat: CVE-2023-4813 was patched at 2023-10-05

78. Security Feature Bypass - Chromium (CVE-2023-5477) - Medium [353]

Description: Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00046, EPSS Percentile is 0.14385

debian: CVE-2023-5477 was patched at 2023-10-12, unknown date

79. Security Feature Bypass - OpenPMIx (CVE-2023-41915) - Medium [353]

Description: OpenPMIx PMIx before 4.2.6 and 5.0.x before 5.0.1 allows attackers to obtain ownership of arbitrary files via a race condition during execution of library code with UID 0.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.314Reference Implementation of the Process Management Interface Exascale (PMIx) standard
CVSS Base Score0.810CVSS Base Score is 8.1. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00105, EPSS Percentile is 0.42526

debian: CVE-2023-41915 was patched at 2023-11-04, unknown date

ubuntu: CVE-2023-41915 was patched at 2023-10-17

80. Authentication Bypass - Python (CVE-2023-40217) - Medium [352]

Description: An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00049, EPSS Percentile is 0.15825

debian: CVE-2023-40217 was patched at unknown date

oraclelinux: CVE-2023-40217 was patched at 2023-10-13, 2023-10-17, 2023-10-24, 2023-10-25

almalinux: CVE-2023-40217 was patched at 2023-10-05, 2023-10-23

redhat: CVE-2023-40217 was patched at 2023-10-05, 2023-10-09, 2023-10-23, 2023-10-24, 2023-11-02

81. Memory Corruption - tough-cookie (CVE-2023-26136) - Medium [352]

Description: Versions of the package tough-cookie before 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.414tough-cookie is a RFC6265 Cookies and CookieJar module for Node.js
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.510EPSS Probability is 0.00173, EPSS Percentile is 0.54315

debian: CVE-2023-26136 was patched at unknown date

redhat: CVE-2023-26136 was patched at 2023-10-06

82. Denial of Service - Go Project (CVE-2023-39325) - Medium [351]

Description: A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Go is an open source project developed by a team at Google and many contributors from the open source community
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.0009, EPSS Percentile is 0.3784

debian: CVE-2023-39325 was patched at unknown date

oraclelinux: CVE-2023-39325 was patched at 2023-10-18, 2023-10-20

almalinux: CVE-2023-39325 was patched at 2023-10-16, 2023-10-18, 2023-10-24

redhat: CVE-2023-39325 was patched at 2023-10-16, 2023-10-17, 2023-10-18, 2023-10-20, 2023-10-23, 2023-10-24, 2023-10-31

83. Memory Corruption - FreeRDP (CVE-2023-40188) - Medium [350]

Description: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `general_LumaToYUV444` function. This Out-Of-Bounds Read occurs because processing is done on the `in` variable without checking if it contains data of sufficient length. Insufficient data for the `in` variable may cause errors or crashes. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.614FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
CVSS Base Score0.910CVSS Base Score is 9.1. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00071, EPSS Percentile is 0.29752

debian: CVE-2023-40188 was patched at unknown date

ubuntu: CVE-2023-40188 was patched at 2023-10-04

84. Code Injection - Curl (CVE-2023-38546) - Medium [349]

Description: This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program using libcurl. And if using the correct file format of course.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.714Curl is a command-line tool for transferring data specified with URL syntax
CVSS Base Score0.410CVSS Base Score is 3.7. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00046, EPSS Percentile is 0.14317

debian: CVE-2023-38546 was patched at 2023-10-11, unknown date

oraclelinux: CVE-2023-38546 was patched at 2023-10-18

almalinux: CVE-2023-38546 was patched at 2023-10-17

redhat: CVE-2023-38546 was patched at 2023-10-13, 2023-10-17, 2023-11-02

ubuntu: CVE-2023-38546 was patched at 2023-10-11, 2023-10-17

redos: CVE-2023-38546 was patched at 2023-10-16

85. Denial of Service - MediaWiki (CVE-2023-45363) - Medium [348]

Description: An issue was discovered in ApiPageSet.php in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. It allows attackers to cause a denial of service (unbounded loop and RequestTimeoutException) when querying pages redirected to other variants with redirects and converttitles set.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714MediaWiki is a free server-based wiki software, licensed under the GNU General Public License (GPL)
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.11395

debian: CVE-2023-45363 was patched at 2023-10-10, unknown date

86. Security Feature Bypass - MediaWiki (CVE-2023-45364) - Medium [348]

Description: An issue was discovered in includes/page/Article.php in MediaWiki 1.36.x through 1.39.x before 1.39.5 and 1.40.x before 1.40.1. Deleted revision existence is leaked due to incorrect permissions being checked. This reveals that a given revision ID belonged to the given page title, and its timestamp, both of which are not supposed to be public information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.714MediaWiki is a free server-based wiki software, licensed under the GNU General Public License (GPL)
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.11395

debian: CVE-2023-45364 was patched at 2023-10-10, unknown date

87. Memory Corruption - Chromium (CVE-2023-5473) - Medium [347]

Description: Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.610CVSS Base Score is 6.3. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00078, EPSS Percentile is 0.32591

debian: CVE-2023-5473 was patched at 2023-10-12, unknown date

88. Denial of Service - Linux Kernel (CVE-2023-37453) - Medium [346]

Description: An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.510CVSS Base Score is 4.6. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00045, EPSS Percentile is 0.12522

debian: CVE-2023-37453 was patched at unknown date

ubuntu: CVE-2023-37453 was patched at 2023-10-04

89. Elevation of Privilege - Linux Kernel (CVE-2023-42753) - Medium [346]

Description: An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.05714

debian: CVE-2023-42753 was patched at unknown date

oraclelinux: CVE-2023-42753 was patched at 2023-09-22, 2023-09-23, 2023-10-10, 2023-10-13, 2023-10-17

ubuntu: CVE-2023-42753 was patched at 2023-10-04, 2023-10-19, 2023-10-20, 2023-10-23, 2023-10-24, 2023-10-25, 2023-10-26, 2023-10-30, 2023-10-31

90. Memory Corruption - FRRouting (CVE-2023-41360) - Medium [345]

Description: An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c can read the initial byte of the ORF header in an ahead-of-stream situation.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.514Free Range Routing or FRRouting or FRR is a network routing software suite running on Unix-like platforms, particularly Linux, Solaris, OpenBSD, FreeBSD and NetBSD
CVSS Base Score0.910CVSS Base Score is 9.1. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00087, EPSS Percentile is 0.36449

debian: CVE-2023-41360 was patched at unknown date

ubuntu: CVE-2023-41360 was patched at 2023-10-17, 2023-10-18

91. Command Injection - Jetty (CVE-2023-36479) - Medium [344]

Description: Eclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks. This wrapped command, plus an optional command prefix, will then be executed through a call to Runtime.exec. If the original binary name provided by the user contains a quotation mark followed by a space, the resulting command line will contain multiple tokens instead of one. This issue was patched in version 9.4.52, 10.0.16, 11.0.16 and 12.0.0-beta2.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common0.614Jetty is a Java based web server and servlet engine
CVSS Base Score0.410CVSS Base Score is 4.3. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00055, EPSS Percentile is 0.21229

debian: CVE-2023-36479 was patched at 2023-09-28, unknown date

92. Denial of Service - FreeRDP (CVE-2023-39351) - Medium [344]

Description: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of FreeRDP are subject to a Null Pointer Dereference leading a crash in the RemoteFX (rfx) handling. Inside the `rfx_process_message_tileset` function, the program allocates tiles using `rfx_allocate_tiles` for the number of numTiles. If the initialization process of tiles is not completed for various reasons, tiles will have a NULL pointer. Which may be accessed in further processing and would cause a program crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00049, EPSS Percentile is 0.15646

debian: CVE-2023-39351 was patched at unknown date

ubuntu: CVE-2023-39351 was patched at 2023-10-04

93. Denial of Service - FreeRDP (CVE-2023-39354) - Medium [344]

Description: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `nsc_rle_decompress_data` function. The Out-Of-Bounds Read occurs because it processes `context->Planes` without checking if it contains data of sufficient length. Should an attacker be able to leverage this vulnerability they may be able to cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00051, EPSS Percentile is 0.17709

debian: CVE-2023-39354 was patched at unknown date

ubuntu: CVE-2023-39354 was patched at 2023-10-04

94. Denial of Service - Nokogiri (CVE-2022-23476) - Medium [344]

Description: Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `>= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614Nokogiri is an open source XML and HTML library for the Ruby programming language
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00049, EPSS Percentile is 0.15814

debian: CVE-2022-23476 was patched at unknown date

redos: CVE-2022-23476 was patched at 2023-10-03

95. Information Disclosure - Apache Tomcat (CVE-2023-42795) - Medium [342]

Description: Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.714Apache Tomcat is a free and open-source implementation of the Jakarta Servlet, Jakarta Expression Language, and WebSocket technologies
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile0.810EPSS Probability is 0.00691, EPSS Percentile is 0.77968

debian: CVE-2023-42795 was patched at 2023-10-10, unknown date

redhat: CVE-2023-42795 was patched at 2023-10-31

96. Memory Corruption - vim (CVE-2022-3491) - Medium [342]

Description: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0742.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.17428

debian: CVE-2022-3491 was patched at unknown date

ubuntu: CVE-2022-3491 was patched at 2023-10-09

97. Memory Corruption - vim (CVE-2022-4292) - Medium [342]

Description: Use After Free in GitHub repository vim/vim prior to 9.0.0882.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.17428

debian: CVE-2022-4292 was patched at unknown date

ubuntu: CVE-2022-4292 was patched at 2023-10-09

98. Authentication Bypass - Jetty (CVE-2023-41900) - Medium [341]

Description: Jetty is a Java based web server and servlet engine. Versions 9.4.21 through 9.4.51, 10.0.15, and 11.0.15 are vulnerable to weak authentication. If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides to revoke an already authenticated user, then the current request will still treat the user as authenticated. The authentication is then cleared from the session and subsequent requests will not be treated as authenticated. So a request on a previously authenticated session could be allowed to bypass authentication after it had been rejected by the `LoginService`. This impacts usages of the jetty-openid which have configured a nested `LoginService` and where that `LoginService` will is capable of rejecting previously authenticated users. Versions 9.4.52, 10.0.16, and 11.0.16 have a patch for this issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common0.614Jetty is a Java based web server and servlet engine
CVSS Base Score0.410CVSS Base Score is 4.3. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00049, EPSS Percentile is 0.15818

debian: CVE-2023-41900 was patched at 2023-09-28, unknown date

99. Denial of Service - Binutils (CVE-2022-35205) - Medium [341]

Description: An issue was discovered in Binutils readelf 2.38.50, reachable assertion failure in function display_debug_names allows attackers to cause a denial of service.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10862

debian: CVE-2022-35205 was patched at unknown date

ubuntu: CVE-2022-35205 was patched at 2023-10-04

100. Denial of Service - Binutils (CVE-2022-47007) - Medium [341]

Description: An issue was discovered function stab_demangle_v3_arg in stabs.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10862

debian: CVE-2022-47007 was patched at unknown date

ubuntu: CVE-2022-47007 was patched at 2023-10-04

redos: CVE-2022-47007 was patched at 2023-10-13

101. Denial of Service - Binutils (CVE-2022-47008) - Medium [341]

Description: An issue was discovered function make_tempdir, and make_tempname in bucomm.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10862

debian: CVE-2022-47008 was patched at unknown date

ubuntu: CVE-2022-47008 was patched at 2023-10-04

redos: CVE-2022-47008 was patched at 2023-10-13

102. Denial of Service - Binutils (CVE-2022-47010) - Medium [341]

Description: An issue was discovered function pr_function_type in prdbg.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10862

debian: CVE-2022-47010 was patched at unknown date

ubuntu: CVE-2022-47010 was patched at 2023-10-04

redos: CVE-2022-47010 was patched at 2023-10-13

103. Denial of Service - Binutils (CVE-2022-47011) - Medium [341]

Description: An issue was discovered function parse_stab_struct_fields in stabs.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10862

debian: CVE-2022-47011 was patched at unknown date

ubuntu: CVE-2022-47011 was patched at 2023-10-04

redos: CVE-2022-47011 was patched at 2023-10-13

104. Denial of Service - Xlib (CVE-2023-43786) - Medium [341]

Description: A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Xlib (also known as libX11) is an X Window System protocol client library written in the C programming language
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.05714

debian: CVE-2023-43786 was patched at 2023-10-05, unknown date

ubuntu: CVE-2023-43786 was patched at 2023-10-03, 2023-10-10, 2023-10-23

redos: CVE-2023-43786 was patched at 2023-10-19

105. Memory Corruption - Eclipse Mosquitto (CVE-2023-28366) - Medium [338]

Description: The broker in Eclipse Mosquitto 1.3.2 through 2.x before 2.0.16 has a memory leak that can be abused remotely when a client sends many QoS 2 messages with duplicate message IDs, and fails to respond to PUBREC commands. This occurs because of mishandling of EAGAIN from the libc send function.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.614Eclipse Mosquitto provides a lightweight server implementation of the MQTT protocol that is suitable for all situations from full power machines to embedded and low power machines
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00081, EPSS Percentile is 0.33858

debian: CVE-2023-28366 was patched at 2023-10-01, unknown date

106. Spoofing - Chromium (CVE-2023-5484) - Medium [335]

Description: Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00112, EPSS Percentile is 0.44359

debian: CVE-2023-5484 was patched at 2023-10-12, unknown date

107. Memory Corruption - vim (CVE-2022-4293) - Medium [330]

Description: Floating Point Comparison with Incorrect Operator in GitHub repository vim/vim prior to 9.0.0804.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00062, EPSS Percentile is 0.25001

debian: CVE-2022-4293 was patched at unknown date

ubuntu: CVE-2022-4293 was patched at 2023-10-09

108. Memory Corruption - LLDP (CVE-2023-41910) - Medium [328]

Description: An issue was discovered in lldpd before 1.0.17. By crafting a CDP PDU packet with specific CDP_TLV_ADDRESSES TLVs, a malicious actor can remotely force the lldpd daemon to perform an out-of-bounds read on heap memory. This occurs in cdp_decode in daemon/protocols/cdp.c.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.414LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as Extreme's EDP (Extreme Discovery Protocol) and CDP (Cisco Discovery Protocol)
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00063, EPSS Percentile is 0.25387

debian: CVE-2023-41910 was patched at 2023-09-25, unknown date

109. Denial of Service - FFmpeg (CVE-2021-28429) - Medium [324]

Description: Integer overflow vulnerability in av_timecode_make_string in libavutil/timecode.c in FFmpeg version 4.3.2, allows local attackers to cause a denial of service (DoS) via crafted .mov file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.05714

debian: CVE-2021-28429 was patched at unknown date

ubuntu: CVE-2021-28429 was patched at 2023-10-12

110. Denial of Service - QEMU (CVE-2023-3301) - Medium [324]

Description: A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714QEMU is a generic and open source machine & userspace emulator and virtualizer
CVSS Base Score0.610CVSS Base Score is 5.6. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.05714

debian: CVE-2023-3301 was patched at unknown date

oraclelinux: CVE-2023-3301 was patched at 2023-09-22, 2023-10-07

111. Memory Corruption - Binutils (CVE-2022-48063) - Medium [323]

Description: GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function load_separate_debug_files at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.08612

debian: CVE-2022-48063 was patched at unknown date

ubuntu: CVE-2022-48063 was patched at 2023-10-04

redos: CVE-2022-48063 was patched at 2023-10-13

112. Memory Corruption - Binutils (CVE-2022-48064) - Medium [323]

Description: GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function bfd_dwarf2_find_nearest_line_with_alt at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.08537

debian: CVE-2022-48064 was patched at unknown date

redos: CVE-2022-48064 was patched at 2023-10-13

113. Memory Corruption - Binutils (CVE-2022-48065) - Medium [323]

Description: GNU Binutils before 2.40 was discovered to contain a memory leak vulnerability var the function find_abstract_instance in dwarf2.c.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.08612

debian: CVE-2022-48065 was patched at unknown date

redos: CVE-2022-48065 was patched at 2023-10-13

114. Memory Corruption - Windows NTFS (CVE-2023-4693) - Medium [323]

Description: An out-of-bounds read flaw was found on grub2's NTFS filesystem driver. This issue may allow a physically present attacker to present a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack allows sensitive data cached in memory or EFI variable values to be leaked, presenting a high Confidentiality risk.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814The default file system of the Windows NT family
CVSS Base Score0.510CVSS Base Score is 4.6. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.18698

debian: CVE-2023-4693 was patched at 2023-10-06, unknown date

ubuntu: CVE-2023-4693 was patched at 2023-10-04

115. Memory Corruption - Xlib (CVE-2023-43785) - Medium [323]

Description: A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function. This flaw allows a local user to trigger an out-of-bounds read error and read the contents of memory on the system.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Xlib (also known as libX11) is an X Window System protocol client library written in the C programming language
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.05714

debian: CVE-2023-43785 was patched at 2023-10-05, unknown date

ubuntu: CVE-2023-43785 was patched at 2023-10-03, 2023-10-10

redos: CVE-2023-43785 was patched at 2023-10-19

116. Memory Corruption - Xlib (CVE-2023-43788) - Medium [323]

Description: A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local to trigger an out-of-bounds read error and read the contents of memory on the system.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Xlib (also known as libX11) is an X Window System protocol client library written in the C programming language
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00045, EPSS Percentile is 0.12638

debian: CVE-2023-43788 was patched at 2023-10-05, unknown date

ubuntu: CVE-2023-43788 was patched at 2023-10-03, 2023-10-23

redos: CVE-2023-43788 was patched at 2023-10-16

117. Memory Corruption - Xlib (CVE-2023-43789) - Medium [323]

Description: A vulnerability was found in libXpm where a vulnerability exists due to a boundary condition, a local user can trigger an out-of-bounds read error and read contents of memory on the system.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Xlib (also known as libX11) is an X Window System protocol client library written in the C programming language
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.05714

debian: CVE-2023-43789 was patched at 2023-10-05, unknown date

ubuntu: CVE-2023-43789 was patched at 2023-10-03, 2023-10-23

redos: CVE-2023-43789 was patched at 2023-10-19

118. Spoofing - Chromium (CVE-2023-5481) - Medium [323]

Description: Inappropriate implementation in Downloads in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00081, EPSS Percentile is 0.34207

debian: CVE-2023-5481 was patched at 2023-10-12, unknown date

119. Denial of Service - Wireshark (CVE-2023-5371) - Medium [320]

Description: RTPS dissector memory leak in Wireshark 4.0.0 to 4.0.8 and 3.6.0 to 3.6.16 allows denial of service via packet injection or crafted capture file

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00046, EPSS Percentile is 0.14317

debian: CVE-2023-5371 was patched at unknown date

redos: CVE-2023-5371 was patched at 2023-10-13

120. Memory Corruption - QEMU (CVE-2023-3180) - Medium [319]

Description: A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a heap buffer overflow when the two values differ.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.714QEMU is a generic and open source machine & userspace emulator and virtualizer
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00042, EPSS Percentile is 0.05714

debian: CVE-2023-3180 was patched at unknown date

oraclelinux: CVE-2023-3180 was patched at 2023-09-22, 2023-10-07

121. Memory Corruption - Eclipse Mosquitto (CVE-2023-3592) - Medium [314]

Description: In Mosquitto before 2.0.16, a memory leak occurs when clients send v5 CONNECT packets with a will message that contains invalid property types.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.614Eclipse Mosquitto provides a lightweight server implementation of the MQTT protocol that is suitable for all situations from full power machines to embedded and low power machines
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.11249

debian: CVE-2023-3592 was patched at 2023-10-01, unknown date

122. Memory Corruption - ImageMagick (CVE-2021-40211) - Medium [314]

Description: An issue was discovered with ImageMagick 7.1.0-4 via Division by zero in function ReadEnhMetaFile of coders/emf.c.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.614ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00046, EPSS Percentile is 0.14317

debian: CVE-2021-40211 was patched at unknown date

oraclelinux: CVE-2021-40211 was patched at 2023-10-05

redhat: CVE-2021-40211 was patched at 2023-10-05

123. Memory Corruption - libxml2 (CVE-2023-45322) - Medium [314]

Description: ** DISPUTED ** libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor's position is "I don't think these issues are critical enough to warrant a CVE ID ... because an attacker typically can't control when memory allocations fail."

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.614libxml2 is an XML toolkit implemented in C, originally developed for the GNOME Project
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00053, EPSS Percentile is 0.19337

debian: CVE-2023-45322 was patched at unknown date

redos: CVE-2023-45322 was patched at 2023-10-13

124. Denial of Service - tiffcrop (CVE-2023-1916) - Medium [308]

Description: A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614Tiffcrop processes one or more files created according to the Tag Image File Format, Revision 6.0, specification into one or more TIFF file(s)
CVSS Base Score0.610CVSS Base Score is 6.1. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10862

debian: CVE-2023-1916 was patched at unknown date

ubuntu: CVE-2023-1916 was patched at 2023-10-11

125. Memory Corruption - Python (CVE-2022-48566) - Medium [302]

Description: An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score0.610CVSS Base Score is 5.9. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00057, EPSS Percentile is 0.21996

debian: CVE-2022-48566 was patched at unknown date

ubuntu: CVE-2022-48566 was patched at 2023-09-27

126. Spoofing - Chromium (CVE-2023-5486) - Medium [288]

Description: Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00078, EPSS Percentile is 0.3295

debian: CVE-2023-5486 was patched at 2023-10-12, unknown date

127. Denial of Service - Active Directory (CVE-2023-42670) - Medium [286]

Description: A flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba's RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation "classic DCs") can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as "The procedure number is out of range" when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914Active Directory is a directory service developed by Microsoft for Windows domain networks
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile0.110EPSS Probability is 0.00045, EPSS Percentile is 0.12638

debian: CVE-2023-42670 was patched at 2023-10-11, unknown date

ubuntu: CVE-2023-42670 was patched at 2023-10-10, 2023-10-17

128. Memory Corruption - Eclipse Mosquitto (CVE-2023-0809) - Medium [278]

Description: In Mosquitto before 2.0.16, excessive memory is allocated based on malicious initial packets that are not CONNECT packets.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.614Eclipse Mosquitto provides a lightweight server implementation of the MQTT protocol that is suitable for all situations from full power machines to embedded and low power machines
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.11249

debian: CVE-2023-0809 was patched at 2023-10-01, unknown date

129. Memory Corruption - GPAC (CVE-2023-41000) - Medium [257]

Description: GPAC through 2.2.1 has a use-after-free vulnerability in the function gf_bifs_flush_command_list in bifs/memory_decoder.c.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.414GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity)
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.10862

debian: CVE-2023-41000 was patched at unknown date

redos: CVE-2023-41000 was patched at 2023-09-26

130. Denial of Service - Django (CVE-2023-43665) - Medium [220]

Description: In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Django is a free and open-source, Python-based web framework that follows the model–template–views architectural pattern
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile0.110EPSS Probability is 0.00045, EPSS Percentile is 0.12638

debian: CVE-2023-43665 was patched at unknown date

ubuntu: CVE-2023-43665 was patched at 2023-10-04

redos: CVE-2023-43665 was patched at 2023-10-30

131. Unknown Vulnerability Type - Eclipse Mosquitto (CVE-2021-34434) - Medium [207]

Description: {'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In Eclipse Mosquitto versions 2.0 to 2.0.11, when using the dynamic security plugin, if the ability for a client to make subscriptions on a topic is revoked when a durable client is offline, then existing subscriptions for that client are not revoked.', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.614Eclipse Mosquitto provides a lightweight server implementation of the MQTT protocol that is suitable for all situations from full power machines to embedded and low power machines
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00096, EPSS Percentile is 0.40184

debian: CVE-2021-34434 was patched at 2023-10-01, unknown date

132. Path Traversal - Samba (CVE-2023-3961) - Medium [204]

Description: A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Path Traversal
Vulnerable Product is Common0.814Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-3961 was patched at 2023-10-11, unknown date

redhat: CVE-2023-3961 was patched at 2023-10-31

133. Memory Corruption - SchedMD Slurm (CVE-2023-41914) - Medium [202]

Description: SchedMD Slurm 23.02.x before 23.02.6 and 22.05.x before 22.05.10 allows filesystem race conditions for gaining ownership of a file, overwriting a file, or deleting files.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.514The Slurm Workload Manager, formerly known as Simple Linux Utility for Resource Management, or simply Slurm, is a free and open-source job scheduler for Linux and Unix-like kernels, used by many of the world's supercomputers and computer clusters
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.0728

debian: CVE-2023-41914 was patched at 2023-10-17, unknown date

Low (15)

134. Cross Site Scripting - MediaWiki (CVE-2023-45360) - Low [199]

Description: An issue was discovered in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. There is XSS in youhavenewmessagesmanyusers and youhavenewmessages i18n messages. This is related to MediaWiki:Youhavenewmessagesfromusers.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Cross Site Scripting
Vulnerable Product is Common0.714MediaWiki is a free server-based wiki software, licensed under the GNU General Public License (GPL)
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.0728

debian: CVE-2023-45360 was patched at 2023-10-10, unknown date

135. Information Disclosure - MediaWiki (CVE-2023-45362) - Low [199]

Description: An issue was discovered in DifferenceEngine.php in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. diff-multi-sameuser (aka "X intermediate revisions by the same user not shown") ignores username suppression. This is an information leak.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.714MediaWiki is a free server-based wiki software, licensed under the GNU General Public License (GPL)
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.0728

debian: CVE-2023-45362 was patched at 2023-10-10, unknown date

136. Unknown Vulnerability Type - Samba (CVE-2023-4091) - Low [145]

Description: {'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.814Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile0.110EPSS Probability is 0.00045, EPSS Percentile is 0.12899

debian: CVE-2023-4091 was patched at 2023-10-11, unknown date

redhat: CVE-2023-4091 was patched at 2023-10-31

ubuntu: CVE-2023-4091 was patched at 2023-10-10, 2023-10-17

137. Unknown Vulnerability Type - Unknown Product (CVE-2023-3865) - Low [0]

Description: {'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-3865 was patched at unknown date

ubuntu: CVE-2023-3865 was patched at 2023-10-04, 2023-10-06, 2023-10-19, 2023-10-24, 2023-10-31

138. Unknown Vulnerability Type - Unknown Product (CVE-2023-3866) - Low [0]

Description: {'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-3866 was patched at unknown date

ubuntu: CVE-2023-3866 was patched at 2023-10-04, 2023-10-06, 2023-10-19, 2023-10-24, 2023-10-31

139. Unknown Vulnerability Type - Unknown Product (CVE-2023-4061) - Low [0]

Description: {'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

redhat: CVE-2023-4061 was patched at 2023-10-06

140. Unknown Vulnerability Type - Unknown Product (CVE-2023-4154) - Low [0]

Description: {'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-4154 was patched at 2023-10-11, unknown date

ubuntu: CVE-2023-4154 was patched at 2023-10-10, 2023-10-17

141. Unknown Vulnerability Type - Unknown Product (CVE-2023-42114) - Low [0]

Description: {'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-42114 was patched at 2023-10-02, unknown date

ubuntu: CVE-2023-42114 was patched at 2023-10-04

142. Unknown Vulnerability Type - Unknown Product (CVE-2023-42115) - Low [0]

Description: {'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-42115 was patched at 2023-10-02, unknown date

ubuntu: CVE-2023-42115 was patched at 2023-10-04

143. Unknown Vulnerability Type - Unknown Product (CVE-2023-42116) - Low [0]

Description: {'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-42116 was patched at 2023-10-02, unknown date

ubuntu: CVE-2023-42116 was patched at 2023-10-04

144. Unknown Vulnerability Type - Unknown Product (CVE-2023-42669) - Low [0]

Description: {'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-42669 was patched at 2023-10-11, unknown date

redhat: CVE-2023-42669 was patched at 2023-10-31

ubuntu: CVE-2023-42669 was patched at 2023-10-10, 2023-10-17

145. Unknown Vulnerability Type - Unknown Product (CVE-2023-43040) - Low [0]

Description: {'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-43040 was patched at unknown date

redhat: CVE-2023-43040 was patched at 2023-10-12

146. Unknown Vulnerability Type - Unknown Product (CVE-2023-45359) - Low [0]

Description: {'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-45359 was patched at 2023-10-10, unknown date

147. Unknown Vulnerability Type - Unknown Product (CVE-2023-45361) - Low [0]

Description: {'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-45361 was patched at 2023-10-10, unknown date

148. Unknown Vulnerability Type - Unknown Product (CVE-2023-5090) - Low [0]

Description: {'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS Probability is 0, EPSS Percentile is 0

debian: CVE-2023-5090 was patched at unknown date

oraclelinux: CVE-2023-5090 was patched at 2023-10-13, 2023-10-17

Exploitation in the wild detected (3)

Remote Code Execution (1)

Denial of Service (1)

Memory Corruption (1)

Public exploit exists, but exploitation in the wild is NOT detected (5)

Remote Code Execution (1)

Memory Corruption (2)

Denial of Service (1)

Tampering (1)

Other Vulnerabilities (140)

Remote Code Execution (10)

Security Feature Bypass (14)

Command Injection (4)

Arbitrary File Reading (1)

Memory Corruption (45)

Denial of Service (36)

Authentication Bypass (3)

Elevation of Privilege (2)

Open Redirect (1)

Code Injection (3)

Information Disclosure (2)

Spoofing (3)

Unknown Vulnerability Type (14)

Path Traversal (1)

Cross Site Scripting (1)