Security
Headlines
HeadlinesLatestCVEs

Source

CVE

CVE-2023-38164

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

CVE
#xss#vulnerability#microsoft
CVE-2023-29463: Pavilion8® Security Misconfiguration Vulnerability

The JMX Console within the Rockwell Automation Pavilion8 is exposed to application users and does not require authentication. If exploited, a malicious user could potentially retrieve other application users’ session data and or log users out of their session.

CVE-2023-36742

Visual Studio Code Remote Code Execution Vulnerability

CVE-2023-0119: Invalid Bug ID

A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user's session, make requests on behalf of the user, and obtain user credentials.

CVE-2023-4863

Heap buffer overflow in WebP in Google Chrome prior to 116.0.5845.187 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

CVE-2023-4913

Cross-site Scripting (XSS) - Reflected in GitHub repository cecilapp/cecil prior to 7.47.1.

CVE-2023-4914

Relative Path Traversal in GitHub repository cecilapp/cecil prior to 7.47.1.

CVE-2023-40784

DedeCMS 5.7.102 has a File Upload vulnerability via uploads/dede/module_make.php.

CVE-2023-2071: FactoryTalk View Machine Edition Vulnerable to Remote Code Execution

Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets.  The device has the functionality, through a CIP class, to execute exported functions from libraries.  There is a routine that restricts it to execute specific functions from two dynamic link library files.  By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function.