Vulnerabilities (CVE)

Filtered by CWE-668
Total 600 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-38830 1 Phpjabbers 1 Yacht Listing Script 2024-11-21 N/A 7.5 HIGH
An information leak in PHPJabbers Yacht Listing Script v1.0 allows attackers to export clients' credit card numbers from the Reservations module.
CVE-2023-38558 1 Siemens 1 Simatic Pcs Neo 2024-11-21 N/A 5.5 MEDIUM
A vulnerability has been identified in SIMATIC PCS neo (Administration Console) V4.0 (All versions), SIMATIC PCS neo (Administration Console) V4.0 Update 1 (All versions). The affected application leaks Windows admin credentials. An attacker with local access to the Administration Console could get the credentials, and impersonate the admin user, thereby gaining admin access to other Windows systems.
CVE-2023-38160 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-11-21 N/A 5.5 MEDIUM
Windows TCP/IP Information Disclosure Vulnerability
CVE-2023-38152 1 Microsoft 5 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 2 more 2024-11-21 N/A 5.3 MEDIUM
DHCP Server Service Information Disclosure Vulnerability
CVE-2023-37911 1 Xwiki 1 Xwiki 2024-11-21 N/A 6.5 MEDIUM
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 9.4-rc-1 and prior to versions 14.10.8 and 15.3-rc-1, when a document has been deleted and re-created, it is possible for users with view right on the re-created document but not on the deleted document to view the contents of the deleted document. Such a situation might arise when rights were added to the deleted document. This can be exploited through the diff feature and, partially, through the REST API by using versions such as `deleted:1` (where the number counts the deletions in the wiki and is thus guessable). Given sufficient rights, the attacker can also re-create the deleted document, thus extending the scope to any deleted document as long as the attacker has edit right in the location of the deleted document. This vulnerability has been patched in XWiki 14.10.8 and 15.3 RC1 by properly checking rights when deleted revisions of a document are accessed. The only workaround is to regularly clean deleted documents to minimize the potential exposure. Extra care should be taken when deleting sensitive documents that are protected individually (and not, e.g., by being placed in a protected space) or deleting a protected space as a whole.
CVE-2023-37645 1 Eyoucms 1 Eyoucms 2024-11-21 N/A 5.3 MEDIUM
eyoucms v1.6.3 was discovered to contain an information disclosure vulnerability via the component /custom_model_path/recruit.filelist.txt.
CVE-2023-37599 1 Issabel 1 Pbx 2024-11-21 N/A 7.5 HIGH
An issue in issabel-pbx v.4.0.0-6 allows a remote attacker to obtain sensitive information via the modules directory
CVE-2023-36596 1 Microsoft 10 Windows 10 1507, Windows 10 1809, Windows 10 21h1 and 7 more 2024-11-21 N/A 7.5 HIGH
Remote Procedure Call Information Disclosure Vulnerability
CVE-2023-36429 1 Microsoft 1 Dynamics 365 2024-11-21 N/A 6.5 MEDIUM
Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
CVE-2023-36043 1 Microsoft 1 System Center Operations Manager 2024-11-21 N/A 6.5 MEDIUM
Open Management Infrastructure Information Disclosure Vulnerability
CVE-2023-36013 1 Microsoft 1 Powershell 2024-11-21 N/A 6.5 MEDIUM
PowerShell Information Disclosure Vulnerability
CVE-2023-35696 1 Sick 2 Icr890-4, Icr890-4 Firmware 2024-11-21 N/A 7.5 HIGH
Unauthenticated endpoints in the SICK ICR890-4 could allow an unauthenticated remote attacker to retrieve sensitive information about the device via HTTP requests.
CVE-2023-35151 1 Xwiki 1 Xwiki 2024-11-21 N/A 7.5 HIGH
XWiki Platform is a generic wiki platform. Starting in version 7.3-milestone-1 and prior to versions 14.4.8, 14.10.6, and 15.1, ny user can call a REST endpoint and obtain the obfuscated passwords, even when the mail obfuscation is activated. The issue has been patched in XWiki 14.4.8, 14.10.6, and 15.1. There is no known workaround.
CVE-2023-35013 1 Ibm 1 Security Verify Governance 2024-11-21 N/A 2.3 LOW
IBM Security Verify Governance 10.0, Identity Manager could allow a local privileged user to obtain sensitive information from source code. IBM X-Force ID: 257769.
CVE-2023-34725 1 Jaycar 2 La5570, La5570 Firmware 2024-11-21 N/A 6.8 MEDIUM
An issue was discovered in TechView LA-5570 Wireless Gateway 1.0.19_T53, allows physical attackers to gain escalated privileges via a telnet connection.
CVE-2023-34467 1 Xwiki 1 Xwiki 2024-11-21 N/A 7.5 HIGH
XWiki Platform is a generic wiki platform. Starting in version 3.5-milestone-1 and prior to versions 14.4.8, 14.10.4, and 15.0-rc-1, the mail obfuscation configuration was not fully taken into account. While the mail displayed to the end user was obfuscated, the rest response was also containing the mail unobfuscated and users were able to filter and sort on the unobfuscated, allowing them to infer the mail content. The consequence was the possibility to retrieve the email addresses of all users even when obfuscated. This has been patched in XWiki 14.4.8, 14.10.4, and 15.0-rc-1.
CVE-2023-34119 1 Zoom 1 Rooms 2024-11-21 N/A 8.2 HIGH
Insecure temporary file in the installer for Zoom Rooms for Windows before version 5.15.0 may allow an authenticated user to enable an escalation of privilege via local access.
CVE-2023-33368 1 Assaabloy 1 Control Id Idsecure 2024-11-21 N/A 6.5 MEDIUM
Some API routes exists in Control ID IDSecure 4.7.26.0 and prior, exfiltrating sensitive information and passwords to users accessing these API routes.
CVE-2023-33293 1 Kaiostech 1 Kaios 2024-11-21 N/A 5.3 MEDIUM
An issue was discovered in KaiOS 3.0 and 3.1. The binary /system/kaios/api-daemon exposes a local web server on *.localhost with subdomains for each installed applications, e.g., myapp.localhost. An attacker can make fetch requests to api-deamon to determine if a given app is installed and read the manifest.webmanifest contents, including the app version.
CVE-2023-32760 1 Archerirm 1 Archer 2024-11-21 N/A 7.7 HIGH
An issue in Archer Platform before v.6.13 fixed in v.6.12.0.6 and v.6.13.0 allows an authenticated attacker to obtain sensitive information via API calls related to data feeds and data publication.