Export limit exceeded: 346758 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 25161 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (25161 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-3894 1 Fasterxml 1 Jackson-dataformats-text 2024-11-21 5.8 Medium
Those using jackson-dataformats-text to parse TOML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
CVE-2023-3819 1 Pimcore 1 Pimcore 2024-11-21 6.5 Medium
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository pimcore/pimcore prior to 10.6.4.
CVE-2023-3770 1 Ingeteam 2 Ingepac Da3451, Ingepac Da3451 Firmware 2024-11-21 5.3 Medium
 Incorrect validation vulnerability of the data entered, allowing an attacker with access to the network on which the affected device is located to use the discovery port protocol (1925/UDP) to obtain device-specific information without the need for authentication.
CVE-2023-3769 1 Ingeteam 2 Ingepac Fc5066, Ingepac Fc5066 Firmware 2024-11-21 8.6 High
Incorrect data input validation vulnerability, which could allow an attacker with access to the network to implement fuzzing techniques that would allow him to gain knowledge about specially crafted packets that would create a DoS condition through the MMS protocol when initiating communication, achieving a complete system reboot of the device and its services.
CVE-2023-3768 1 Ingeteam 6 Ingepac Da3451, Ingepac Da3451 Firmware, Ingepac Ef Md and 3 more 2024-11-21 8.6 High
Incorrect data input validation vulnerability, which could allow an attacker with access to the network to implement fuzzing techniques that would allow him to gain knowledge about specially crafted packets that would create a DoS condition through the MMS protocol when initiating communication, achieving a complete system reboot of the device and its services.
CVE-2023-3724 1 Wolfssl 1 Wolfssl 2024-11-21 9.1 Critical
If a TLS 1.3 client gets neither a PSK (pre shared key) extension nor a KSE (key share extension) when connecting to a malicious server, a default predictable buffer gets used for the IKM (Input Keying Material) value when generating the session master secret. Using a potentially known IKM value when generating the session master secret key compromises the key generated, allowing an eavesdropper to reconstruct it and potentially allowing access to or meddling with message contents in the session. This issue does not affect client validation of connected servers, nor expose private key information, but could result in an insecure TLS 1.3 session when not controlling both sides of the connection. wolfSSL recommends that TLS 1.3 client side users update the version of wolfSSL used. 
CVE-2023-3705 2 Aditya Infotech Limited, Cpplusworld 9 Cp-vnr-3104, Cp-vnr-3108, Cp-vnr-3208 and 6 more 2024-11-21 7.5 High
The vulnerability exists in CP-Plus NVR due to an improper input handling at the web-based management interface of the affected product. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device. Successful exploitation of this vulnerability could allow the remote attacker to obtain sensitive information on the targeted device.
CVE-2023-3704 2 Aditya Infotech Limited, Cpplusworld 27 Cp-uvr-0401l1-4kh, Cp-uvr-0401l1b-4kh, Cp-uvr-0801f1-hc and 24 more 2024-11-21 5.3 Medium
The vulnerability exists in CP-Plus DVR due to an improper input validation within the web-based management interface of the affected products. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device. Successful exploitation of this vulnerability could allow the remote attacker to change system time of the targeted device.
CVE-2023-3553 1 Teampass 1 Teampass 2024-11-21 7.5 High
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository nilsteampassnet/teampass prior to 3.0.10.
CVE-2023-3529 1 Rotem-dynamics 1 Rotem Crm 2024-11-21 5.3 Medium
A vulnerability classified as problematic has been found in Rotem Dynamics Rotem CRM up to 20230729. This affects an unknown part of the file /LandingPages/api/otp/send?id=[ID][ampersand]method=sms of the component OTP URI Interface. The manipulation leads to information exposure through discrepancy. It is possible to initiate the attack remotely. The identifier VDB-233253 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2023-3466 1 Citrix 2 Netscaler Application Delivery Controller, Netscaler Gateway 2024-11-21 8.3 High
Reflected Cross-Site Scripting (XSS)
CVE-2023-3462 2 Hashicorp, Redhat 3 Vault, Openshift, Openshift Data Foundation 2024-11-21 5.3 Medium
HashiCorp's Vault and Vault Enterprise are vulnerable to user enumeration when using the LDAP auth method. An attacker may submit requests of existent and non-existent LDAP users and observe the response from Vault to check if the account is valid on the LDAP server. This vulnerability is fixed in Vault 1.14.1 and 1.13.5.
CVE-2023-3455 1 Huawei 2 Emui, Harmonyos 2024-11-21 9.1 Critical
Key management vulnerability on system. Successful exploitation of this vulnerability may affect service availability and integrity.
CVE-2023-3434 2 Microsoft, Savoirfairelinux 2 Windows, Jami 2024-11-21 4.4 Medium
Improper Input Validation in the hyperlink interpretation in Savoir-faire Linux's Jami (version 20222284) on Windows. This allows an attacker to send a custom HTML anchor tag to pass a string value to the Windows QRC Handler through the Jami messenger.
CVE-2023-3433 1 Savoirfairelinux 1 Jami 2024-11-21 5.5 Medium
The "nickname" field within Savoir-faire Linux's Jami application is susceptible to a failed state when a user inserts special characters into the field. When present, these special characters, make it so the application cannot create the signature for the user and results in a local denial of service to the application. 
CVE-2023-3361 2 Opendatahub, Redhat 2 Open Data Hub Dashboard, Openshift Data Science 2024-11-21 7.7 High
A flaw was found in Red Hat OpenShift Data Science. When exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML, it reads S3 credentials from the cluster (ds pipeline server) and saves them in plain text in the generated output instead of an ID for a Kubernetes secret.
CVE-2023-3349 1 Ayesa 1 Ibermatica Rps 2024-11-21 8.2 High
Information exposure vulnerability in IBERMATICA RPS 2019, which exploitation could allow an unauthenticated user to retrieve sensitive information, such as usernames, IP addresses or SQL queries sent to the application. By accessing the URL /RPS2019Service/status.html, the application enables the logging mechanism by generating the log file, which can be downloaded.
CVE-2023-3336 1 Moxa 2 Tn-5900, Tn-5900 Firmware 2024-11-21 5.3 Medium
TN-5900 Series version 3.3 and prior versions is vulnearble to user enumeration vulnerability. The vulnerability may allow a remote attacker to determine whether a user is valid during password recovery through the web login page and enable a brute force attack with valid users.
CVE-2023-3299 1 Hashicorp 1 Nomad 2024-11-21 3.4 Low
HashiCorp Nomad Enterprise 1.2.11 up to 1.5.6, and 1.4.10 ACL policies using a block without a label generates unexpected results. Fixed in 1.6.0, 1.5.7, and 1.4.11.
CVE-2023-3231 1 Ujcms 1 Ujcms 2024-11-21 3.1 Low
A vulnerability has been found in UJCMS up to 6.0.2 and classified as problematic. This vulnerability affects unknown code of the component ZIP Package Handler. The manipulation of the argument dir leads to information disclosure. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-231502 is the identifier assigned to this vulnerability.