Filtered by CWE-20
Total 12817 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-40062 1 Solarwinds 1 Solarwinds Platform 2024-11-21 8 High
SolarWinds Platform Incomplete List of Disallowed Inputs Remote Code Execution Vulnerability. If executed, this vulnerability would allow a low-privileged user to execute commands with SYSTEM privileges.
CVE-2023-40061 1 Solarwinds 1 Solarwinds Platform 2024-11-21 8.8 High
 Insecure job execution mechanism vulnerability. This vulnerability can lead to other attacks as a result.
CVE-2023-40053 1 Solarwinds 1 Serv-u 2024-11-21 5 Medium
A vulnerability has been identified within Serv-U 15.4 that allows an authenticated actor to insert content on the file share function feature of Serv-U, which could be used maliciously.
CVE-2023-40034 1 Woodpecker-ci 1 Woodpecker 2024-11-21 8.1 High
Woodpecker is a community fork of the Drone CI system. In affected versions an attacker can post malformed webhook data witch lead to an update of the repository data that can e.g. allow the takeover of an repo. This is only critical if the CI is configured for public usage and connected to a forge witch is also in public usage. This issue has been addressed in version 1.0.2. Users are advised to upgrade. Users unable to upgrade should secure the CI system by making it inaccessible to untrusted entities, for example, by placing it behind a firewall.
CVE-2023-3894 1 Fasterxml 1 Jackson-dataformats-text 2024-11-21 5.8 Medium
Those using jackson-dataformats-text to parse TOML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
CVE-2023-3770 1 Ingeteam 2 Ingepac Da3451, Ingepac Da3451 Firmware 2024-11-21 5.3 Medium
 Incorrect validation vulnerability of the data entered, allowing an attacker with access to the network on which the affected device is located to use the discovery port protocol (1925/UDP) to obtain device-specific information without the need for authentication.
CVE-2023-3769 1 Ingeteam 2 Ingepac Fc5066, Ingepac Fc5066 Firmware 2024-11-21 8.6 High
Incorrect data input validation vulnerability, which could allow an attacker with access to the network to implement fuzzing techniques that would allow him to gain knowledge about specially crafted packets that would create a DoS condition through the MMS protocol when initiating communication, achieving a complete system reboot of the device and its services.
CVE-2023-3768 1 Ingeteam 6 Ingepac Da3451, Ingepac Da3451 Firmware, Ingepac Ef Md and 3 more 2024-11-21 8.6 High
Incorrect data input validation vulnerability, which could allow an attacker with access to the network to implement fuzzing techniques that would allow him to gain knowledge about specially crafted packets that would create a DoS condition through the MMS protocol when initiating communication, achieving a complete system reboot of the device and its services.
CVE-2023-3724 1 Wolfssl 1 Wolfssl 2024-11-21 9.1 Critical
If a TLS 1.3 client gets neither a PSK (pre shared key) extension nor a KSE (key share extension) when connecting to a malicious server, a default predictable buffer gets used for the IKM (Input Keying Material) value when generating the session master secret. Using a potentially known IKM value when generating the session master secret key compromises the key generated, allowing an eavesdropper to reconstruct it and potentially allowing access to or meddling with message contents in the session. This issue does not affect client validation of connected servers, nor expose private key information, but could result in an insecure TLS 1.3 session when not controlling both sides of the connection. wolfSSL recommends that TLS 1.3 client side users update the version of wolfSSL used. 
CVE-2023-3705 2 Aditya Infotech Limited, Cpplusworld 9 Cp-vnr-3104, Cp-vnr-3108, Cp-vnr-3208 and 6 more 2024-11-21 7.5 High
The vulnerability exists in CP-Plus NVR due to an improper input handling at the web-based management interface of the affected product. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device. Successful exploitation of this vulnerability could allow the remote attacker to obtain sensitive information on the targeted device.
CVE-2023-3704 2 Aditya Infotech Limited, Cpplusworld 27 Cp-uvr-0401l1-4kh, Cp-uvr-0401l1b-4kh, Cp-uvr-0801f1-hc and 24 more 2024-11-21 5.3 Medium
The vulnerability exists in CP-Plus DVR due to an improper input validation within the web-based management interface of the affected products. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device. Successful exploitation of this vulnerability could allow the remote attacker to change system time of the targeted device.
CVE-2023-3466 1 Citrix 2 Netscaler Application Delivery Controller, Netscaler Gateway 2024-11-21 8.3 High
Reflected Cross-Site Scripting (XSS)
CVE-2023-3434 2 Microsoft, Savoirfairelinux 2 Windows, Jami 2024-11-21 4.4 Medium
Improper Input Validation in the hyperlink interpretation in Savoir-faire Linux's Jami (version 20222284) on Windows. This allows an attacker to send a custom HTML anchor tag to pass a string value to the Windows QRC Handler through the Jami messenger.
CVE-2023-3433 1 Savoirfairelinux 1 Jami 2024-11-21 5.5 Medium
The "nickname" field within Savoir-faire Linux's Jami application is susceptible to a failed state when a user inserts special characters into the field. When present, these special characters, make it so the application cannot create the signature for the user and results in a local denial of service to the application. 
CVE-2023-3034 1 Bund 1 Bkg Professional Ntripcaster 2024-11-21 4.7 Medium
Reflected XSS affects the ‘mode’ parameter in the /admin functionality of the web application in versions <=2.0.44
CVE-2023-39950 1 Siemens 1 Efibootguard 2024-11-21 6.1 Medium
efibootguard is a simple UEFI boot loader with support for safely switching between current and updated partition sets. Insufficient or missing validation and sanitization of input from untrustworthy bootloader environment files can cause crashes and probably also code injections into `bg_setenv`) or programs using `libebgenv`. This is triggered when the affected components try to modify a manipulated environment, in particular its user variables. Furthermore, `bg_printenv` may crash over invalid read accesses or report invalid results. Not affected by this issue is EFI Boot Guard's bootloader EFI binary. EFI Boot Guard release v0.15 contains required patches to sanitize and validate the bootloader environment prior to processing it in userspace. Its library and tools should be updated, so should programs statically linked against it. An update of the bootloader EFI executable is not required. The only way to prevent the issue with an unpatched EFI Boot Guard version is to avoid accesses to user variables, specifically modifications to them.
CVE-2023-39538 1 Ami 1 Aptio V 2024-11-21 7.5 High
AMI AptioV contains a vulnerability in BIOS where a User may cause an unrestricted upload of a BMP Logo file with dangerous type by Local access. A successful exploit of this vulnerability may lead to a loss of Confidentiality, Integrity, and/or Availability. 
CVE-2023-39537 1 Ami 1 Aptio V 2024-11-21 7.5 High
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
CVE-2023-39536 1 Ami 1 Aptio V 2024-11-21 7.5 High
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
CVE-2023-39535 1 Ami 1 Aptio V 2024-11-21 7.5 High
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.