Vulnerabilities (CVE)

Filtered by NVD-CWE-Other
Total 28799 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-42453 2 Fedoraproject, Matrix 2 Fedora, Synapse 2024-01-07 N/A 4.3 MEDIUM
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. Users were able to forge read receipts for any event (if they knew the room ID and event ID). Note that the users were not able to view the events, but simply mark it as read. This could be confusing as clients will show the event as read by the user, even if they are not in the room. This issue has been patched in version 1.93.0. Users are advised to upgrade. There are no known workarounds for this issue.
CVE-2023-50559 1 Openxiangshan 1 Xiangshan 2024-01-05 N/A 5.5 MEDIUM
An issue was discovered in XiangShan v2.1, allows local attackers to obtain sensitive information via the L1D cache.
CVE-2023-23570 1 Gallagher 1 Command Centre 2024-01-05 N/A 8.1 HIGH
Client-Side enforcement of Server-Side security for the Command Centre server could be bypassed and lead to invalid configuration with undefined behavior. This issue affects: Gallagher Command Centre 8.90 prior to vEL8.90.1620 (MR2), all versions of 8.80 and prior.
CVE-2023-23576 1 Gallagher 1 Command Centre 2024-01-05 N/A 4.3 MEDIUM
Incorrect behavior order in the Command Centre Server could allow privileged users to gain physical access to the site for longer than intended after a network outage when competencies are used in the access decision. This issue affects: Gallagher Command Centre: 8.90 prior to vEL8.90.1620 (MR2), 8.80 prior to vEL8.80.1369 (MR3), 8.70 prior to vEL8.70.2375 (MR5), 8.60 prior to vEL8.60.2550 (MR7), all versions of 8.50 and prior.
CVE-2023-50332 1 Weseek 1 Growi 2024-01-05 N/A 6.5 MEDIUM
Improper authorization vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.0.6. If this vulnerability is exploited, a user may delete or suspend its own account without the user's intention.
CVE-2023-49002 1 Xenomtechnologies 1 Phone Dialer-voice Call Dialer 2024-01-05 N/A 7.5 HIGH
An issue in Xenom Technologies (sinous) Phone Dialer-voice Call Dialer v.1.2.5 allows an attacker to bypass intended access restrictions via interaction with com.funprime.calldialer.ui.activities.OutgoingActivity.
CVE-2023-49938 1 Schedmd 1 Slurm 2024-01-03 N/A 8.2 HIGH
An issue was discovered in SchedMD Slurm 22.05.x and 23.02.x. There is Incorrect Access Control: an attacker can modified their extended group list that is used with the sbcast subsystem, and open files with an unauthorized set of extended groups. The fixed versions are 22.05.11 and 23.02.7.
CVE-2023-51661 1 Wasmer 1 Wasmer 2024-01-03 N/A 8.6 HIGH
Wasmer is a WebAssembly runtime that enables containers to run anywhere: from Desktop to the Cloud, Edge and even the browser. Wasm programs can access the filesystem outside of the sandbox. Service providers running untrusted Wasm code on Wasmer can unexpectedly expose the host filesystem. This vulnerability has been patched in version 4.2.4.
CVE-2023-2585 1 Redhat 6 Enterprise Linux, Openshift Container Platform, Openshift Container Platform For Ibm Z and 3 more 2024-01-02 N/A 8.1 HIGH
Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.
CVE-2020-16969 1 Microsoft 1 Exchange Server 2023-12-31 4.3 MEDIUM 7.1 HIGH
<p>An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages. An attacker who successfully exploited the vulnerability could use this to gain further information from a user.</p> <p>To exploit the vulnerability, an attacker could include specially crafted OWA messages that could be loaded, without warning or filtering, from the attacker-controlled URL. This callback vector provides an information disclosure tactic used in web beacons and other types of tracking systems.</p> <p>The security update corrects the way that Exchange handles these token validations.</p>
CVE-2020-12802 3 Fedoraproject, Libreoffice, Opensuse 3 Fedora, Libreoffice, Leap 2023-12-31 4.3 MEDIUM 5.3 MEDIUM
LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where remote graphic links loaded from docx documents were omitted from this protection prior to version 6.4.4. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.
CVE-2023-50477 1 Nos 1 Nos Client 2023-12-29 N/A 9.8 CRITICAL
An issue was discovered in nos client version 0.6.6, allows remote attackers to escalate privileges via getRPCEndpoint.js.
CVE-2023-6930 1 Eurotel 2 Etl3100, Etl3100 Firmware 2023-12-29 N/A 9.8 CRITICAL
EuroTel ETL3100 versions v01c01 and v01x37 suffer from an unauthenticated configuration and log download vulnerability. This enables the attacker to disclose sensitive information and assist in authentication bypass, privilege escalation, and full system access.
CVE-2023-50706 1 Efacec 2 Uc 500e, Uc 500e Firmware 2023-12-29 N/A 4.3 MEDIUM
A user without administrator permissions with access to the UC500 windows system could perform a memory dump of the running processes and extract clear credentials or valid session tokens.
CVE-2021-26431 1 Microsoft 2 Windows 10, Windows Server 2016 2023-12-28 4.6 MEDIUM 7.8 HIGH
Windows Recovery Environment Agent Elevation of Privilege Vulnerability
CVE-2023-46686 1 Gallagher 1 Command Centre 2023-12-28 N/A 7.1 HIGH
A reliance on untrusted inputs in a security decision could be exploited by a privileged user to configure the Gallagher Command Centre Diagnostics Service to use less secure communication protocols. This issue affects: Gallagher Diagnostics Service prior to v1.3.0 (distributed in 9.00.1507(MR1)).
CVE-2022-24038 1 Karmasis 1 Infraskope Siem\+ 2023-12-28 N/A 6.5 MEDIUM
Karmasis Informatics Infraskope SIEM+ has an unauthenticated access vulnerability which could allow an unauthenticated attacker to damage the page where the agents are listed.
CVE-2022-24037 1 Karmasis 1 Infraskope Siem\+ 2023-12-28 N/A 8.2 HIGH
Karmasis Informatics Infraskope SIEM+ has an unauthenticated access vulnerability which could allow an unauthenticated attacker to obtain critical information.
CVE-2022-24036 1 Karmasis 1 Infraskope Siem\+ 2023-12-28 N/A 8.6 HIGH
Karmasis Informatics Infraskope SIEM+ has an unauthenticated access vulnerability which could allow an unauthenticated attacker to modificate logs.
CVE-2022-3697 1 Redhat 2 Ansible, Ansible Collection 2023-12-28 N/A 7.5 HIGH
A flaw was found in Ansible in the amazon.aws collection when using the tower_callback parameter from the amazon.aws.ec2_instance module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs.