Total
2182 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-51013 | 1 Totolink | 2 Ex1800t, Ex1800t Firmware | 2024-11-21 | N/A | 9.8 CRITICAL |
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the lanNetmask parameter’ of the setLanConfig interface of the cstecgi .cgi. | |||||
CVE-2023-51012 | 1 Totolink | 2 Ex1800t, Ex1800t Firmware | 2024-11-21 | N/A | 9.8 CRITICAL |
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the lanGateway parameter’ of the setLanConfig interface of the cstecgi .cgi. | |||||
CVE-2023-51011 | 1 Totolink | 2 Ex1800t, Ex1800t Firmware | 2024-11-21 | N/A | 9.8 CRITICAL |
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the lanPriDns parameter’ of the setLanConfig interface of the cstecgi .cgi | |||||
CVE-2023-50918 | 1 Misp | 1 Misp | 2024-11-21 | N/A | 9.8 CRITICAL |
app/Controller/AuditLogsController.php in MISP before 2.4.182 mishandles ACLs for audit logs. | |||||
CVE-2023-4972 | 1 Yepas | 1 Digital Yepas | 2024-11-21 | N/A | 9.8 CRITICAL |
Incorrect Use of Privileged APIs vulnerability in Yepas Digital Yepas allows Collect Data as Provided by Users.This issue affects Digital Yepas: before 1.0.1. | |||||
CVE-2023-4342 | 1 Broadcom | 1 Raid Controller Web Interface | 2024-11-21 | N/A | 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP strict-transport-security policy | |||||
CVE-2023-4341 | 1 Broadcom | 1 Raid Controller Web Interface | 2024-11-21 | N/A | 9.8 CRITICAL |
Broadcom RAID Controller is vulnerable to Privilege escalation to root due to creation of insecure folders by Web GUI | |||||
CVE-2023-4340 | 1 Broadcom | 1 Raid Controller Web Interface | 2024-11-21 | N/A | 9.8 CRITICAL |
Broadcom RAID Controller is vulnerable to Privilege escalation by taking advantage of the Session prints in the log file | |||||
CVE-2023-4338 | 1 Broadcom | 1 Raid Controller Web Interface | 2024-11-21 | N/A | 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers | |||||
CVE-2023-4337 | 1 Broadcom | 1 Raid Controller Web Interface | 2024-11-21 | N/A | 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation | |||||
CVE-2023-4336 | 1 Broadcom | 1 Raid Controller Web Interface | 2024-11-21 | N/A | 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard cookies with Secure attribute | |||||
CVE-2023-4329 | 1 Broadcom | 1 Raid Controller Web Interface | 2024-11-21 | N/A | 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard SESSIONID cookie with SameSite attribute | |||||
CVE-2023-4325 | 1 Broadcom | 1 Raid Controller Web Interface | 2024-11-21 | N/A | 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable due to usage of Libcurl with LSA has known vulnerabilities | |||||
CVE-2023-4324 | 1 Broadcom | 1 Raid Controller Web Interface | 2024-11-21 | N/A | 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP Content-Security-Policy headers | |||||
CVE-2023-4323 | 1 Broadcom | 1 Raid Controller Web Interface | 2024-11-21 | N/A | 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable to improper session management of active sessions on Gateway setup | |||||
CVE-2023-4280 | 2024-11-21 | N/A | 9.3 CRITICAL | ||
An unvalidated input in Silicon Labs TrustZone implementation in v4.3.x and earlier of the Gecko SDK allows an attacker to access the trusted region of memory from the untrusted region. | |||||
CVE-2023-4020 | 1 Silabs | 1 Gecko Software Development Kit | 2024-11-21 | N/A | 9.0 CRITICAL |
An unvalidated input in a library function responsible for communicating between secure and non-secure memory in Silicon Labs TrustZone implementation allows reading/writing of memory in the secure region of memory from the non-secure region of memory. | |||||
CVE-2023-49409 | 1 Tenda | 2 Ax3, Ax3 Firmware | 2024-11-21 | N/A | 9.8 CRITICAL |
Tenda AX3 V16.03.12.11 was discovered to contain a Command Execution vulnerability via the function /goform/telnet. | |||||
CVE-2023-49406 | 1 Tenda | 2 W30e, W30e Firmware | 2024-11-21 | N/A | 9.8 CRITICAL |
Tenda W30E V16.01.0.12(4843) was discovered to contain a Command Execution vulnerability via the function /goform/telnet. | |||||
CVE-2023-49291 | 1 Tj-actions | 1 Branch-names | 2024-11-21 | N/A | 9.3 CRITICAL |
tj-actions/branch-names is a Github action to retrieve branch or tag names with support for all events. The `tj-actions/branch-names` GitHub Actions improperly references the `github.event.pull_request.head.ref` and `github.head_ref` context variables within a GitHub Actions `run` step. The head ref variable is the branch name and can be used to execute arbitrary code using a specially crafted branch name. As a result an attacker can use this vulnerability to steal secrets from or abuse `GITHUB_TOKEN` permissions. This vulnerability has been addressed in version 7.0.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. |