Vulnerabilities (CVE)

CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-48596 1 Sciencelogic 1 Sl1 2023-08-11 N/A 8.8 HIGH
A SQL injection vulnerability exists in the “ticket queue watchers” feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.
CVE-2023-39520 1 Cryptomator 1 Cryptomator 2023-08-11 N/A 7.8 HIGH
Cryptomator encrypts data being stored on cloud infrastructure. The MSI installer provided on the homepage for Cryptomator version 1.9.2 allows local privilege escalation for low privileged users, via the `repair` function. The problem occurs as the repair function of the MSI is spawning an SYSTEM Powershell without the `-NoProfile` parameter. Therefore the profile of the user starting the repair will be loaded. Version 1.9.3 contains a fix for this issue. Adding a `-NoProfile` to the powershell is a possible workaround.
CVE-2022-48599 1 Sciencelogic 1 Sl1 2023-08-11 N/A 8.8 HIGH
A SQL injection vulnerability exists in the “reporter events type” feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.
CVE-2022-48600 1 Sciencelogic 1 Sl1 2023-08-11 N/A 8.8 HIGH
A SQL injection vulnerability exists in the “notes view” feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.
CVE-2022-48601 1 Sciencelogic 1 Sl1 2023-08-11 N/A 8.8 HIGH
A SQL injection vulnerability exists in the “network print report” feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.
CVE-2022-48602 1 Sciencelogic 1 Sl1 2023-08-11 N/A 8.8 HIGH
A SQL injection vulnerability exists in the “message viewer print” feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.
CVE-2022-48595 1 Sciencelogic 1 Sl1 2023-08-11 N/A 8.8 HIGH
A SQL injection vulnerability exists in the “ticket template watchers” feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.
CVE-2022-48594 1 Sciencelogic 1 Sl1 2023-08-11 N/A 8.8 HIGH
A SQL injection vulnerability exists in the “ticket watchers email” feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.
CVE-2022-48593 1 Sciencelogic 1 Sl1 2023-08-11 N/A 8.8 HIGH
A SQL injection vulnerability exists in the “topology data service” feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.
CVE-2023-36899 1 Microsoft 11 .net, .net Framework, Windows 10 1809 and 8 more 2023-08-11 N/A 8.8 HIGH
ASP.NET Elevation of Privilege Vulnerability
CVE-2023-38704 1 Datadoghq 1 Import-in-the-middle 2023-08-11 N/A 9.8 CRITICAL
import-in-the-middle is a module loading interceptor specifically for ESM modules. The import-in-the-middle loader works by generating a wrapper module on the fly. The wrapper uses the module specifier to load the original module and add some wrapping code. Prior to version 1.4.2, it allows for remote code execution in cases where an application passes user-supplied input directly to the `import()` function. This vulnerability has been patched in import-in-the-middle version 1.4.2. Some workarounds are available. Do not pass any user-supplied input to `import()`. Instead, verify it against a set of allowed values. If using import-in-the-middle, directly or indirectly, and support for EcmaScript Modules is not needed, ensure that no options are set, either via command-line or the `NODE_OPTIONS` environment variable, that would enable loader hooks.
CVE-2023-39363 1 Vyperlang 1 Vyper 2023-08-11 N/A 5.9 MEDIUM
Vyer is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). In versions 0.2.15, 0.2.16 and 0.3.0, named re-entrancy locks are allocated incorrectly. Each function using a named re-entrancy lock gets a unique lock regardless of the key, allowing cross-function re-entrancy in contracts compiled with the susceptible versions. A specific set of conditions is required to result in misbehavior of affected contracts, specifically: a `.vy` contract compiled with `vyper` versions `0.2.15`, `0.2.16`, or `0.3.0`; a primary function that utilizes the `@nonreentrant` decorator with a specific `key` and does not strictly follow the check-effects-interaction pattern (i.e. contains an external call to an untrusted party before storage updates); and a secondary function that utilizes the same `key` and would be affected by the improper state caused by the primary function. Version 0.3.1 contains a fix for this issue.
CVE-2023-38830 1 Phpjabbers 1 Yacht Listing Script 2023-08-11 N/A 7.5 HIGH
An information leak in PHPJabbers Yacht Listing Script v1.0 allows attackers to export clients' credit card numbers from the Reservations module.
CVE-2023-39903 1 Fujitsu 1 Software Infrastructure Manager 2023-08-11 N/A 5.0 MEDIUM
An issue was discovered in Fujitsu Software Infrastructure Manager (ISM) before 2.8.0.061. The ismsnap component (in this specific case at /var/log/fujitsu/ServerViewSuite/ism/FirmwareManagement/FirmwareManagement.log) allows insecure collection and storage of authorization credentials in cleartext. That occurs when users perform any ISM Firmware Repository Address setup test (Test the Connection), or regularly authorize against an already configured remote firmware repository site, as set up in ISM Firmware Repository Address. A privileged attacker is therefore able to potentially gather the associated ismsnap maintenance data, in the same manner as a trusted party allowed to export ismsnap data from ISM. The preconditions for an ISM installation to be generally vulnerable are that the Download Firmware (Firmware Repository Server) function is enabled and configured, and that the character \ (backslash) is used in a user credential (i.e., user/ID or password) of the remote proxy host / firmware repository server. NOTE: this may overlap CVE-2023-39379.
CVE-2023-39776 1 Phpjabbers 1 Ticket Support Script 2023-08-11 N/A 9.8 CRITICAL
A File Upload vulnerability in PHPJabbers Ticket Support Script v3.2 allows attackers to execute arbitrary code via uploading a crafted file.
CVE-2023-4177 1 Empowerid 1 Empowerid 2023-08-11 N/A 5.7 MEDIUM
A vulnerability was found in EmpowerID up to 7.205.0.0. It has been rated as problematic. This issue affects some unknown processing of the component Multi-Factor Authentication Code Handler. The manipulation leads to information disclosure. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 7.205.0.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-236213 was assigned to this vulnerability.
CVE-2022-44629 1 Catalystconnect 1 Catalyst Connect Zoho Crm Client Portal 2023-08-11 N/A 4.8 MEDIUM
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Catalyst Connect Catalyst Connect Zoho CRM Client Portal plugin <= 2.0.0 versions.
CVE-2023-38348 1 Lw-systems 1 Benno Mailarchiv 2023-08-11 N/A 8.8 HIGH
A CSRF issue was discovered in LWsystems Benno MailArchiv 2.10.1.
CVE-2022-48580 1 Sciencelogic 1 Sl1 2023-08-11 N/A 8.8 HIGH
A command injection vulnerability exists in the ARP ping device tool feature of the ScienceLogic SL1 that takes unsanitized user controlled input and passes it directly to a shell command. This allows for the injection of arbitrary commands to the underlying operating system.
CVE-2023-38172 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2023-08-11 N/A 7.5 HIGH
Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-38167 1 Microsoft 1 Dynamics 365 Business Central 2023-08-11 N/A 7.2 HIGH
Microsoft Dynamics Business Central Elevation Of Privilege Vulnerability
CVE-2023-38347 1 Lw-systems 1 Benno Mailarchiv 2023-08-11 N/A 6.1 MEDIUM
An issue was discovered in LWsystems Benno MailArchiv 2.10.1. Attackers can cause XSS via JavaScript content to a mailbox.
CVE-2022-48603 1 Sciencelogic 1 Sl1 2023-08-11 N/A 8.8 HIGH
A SQL injection vulnerability exists in the “message viewer iframe” feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.
CVE-2023-36914 1 Microsoft 5 Windows 10 21h2, Windows 10 22h2, Windows 11 21h2 and 2 more 2023-08-11 N/A 5.5 MEDIUM
Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability
CVE-2022-48598 1 Sciencelogic 1 Sl1 2023-08-11 N/A 8.8 HIGH
A SQL injection vulnerability exists in the “reporter events type date” feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.
CVE-2023-39218 1 Zoom 3 Rooms, Virtual Desktop Infrastructure, Zoom 2023-08-11 N/A 4.9 MEDIUM
Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow a privileged user to enable information disclosure via network access.
CVE-2022-48581 1 Sciencelogic 1 Sl1 2023-08-11 N/A 8.8 HIGH
A command injection vulnerability exists in the “dash export” feature of the ScienceLogic SL1 that takes unsanitized user controlled input and passes it directly to a shell command. This allows for the injection of arbitrary commands to the underlying operating system.
CVE-2023-34545 1 Cskaza 1 Cszcms 2023-08-11 N/A 9.8 CRITICAL
A SQL injection vulnerability in CSZCMS 1.3.0 allows remote attackers to run arbitrary SQL commands via p parameter or the search URL.
CVE-2023-38758 1 Wger 1 Workout Manager 2023-08-11 N/A 5.4 MEDIUM
Cross Site Scripting vulnerability in wger Project wger Workout Manager v.2.2.0a3 allows a remote attacker to gain privileges via the license_author field in the add-ingredient function in the templates/ingredients/view.html, models/ingredients.py, and views/ingredients.py components.
CVE-2023-39217 1 Zoom 2 Meeting Software Development Kit, Video Software Development Kit 2023-08-11 N/A 7.5 HIGH
Improper input validation in Zoom SDK’s before 5.14.10 may allow an unauthenticated user to enable a denial of service via network access.
CVE-2023-39216 1 Zoom 1 Zoom 2023-08-11 N/A 9.8 CRITICAL
Improper input validation in Zoom Desktop Client for Windows before 5.14.7 may allow an unauthenticated user to enable an escalation of privilege via network access.
CVE-2023-3522 1 A2technology 1 License Portal System 2023-08-11 N/A 9.8 CRITICAL
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in a2 License Portal System allows SQL Injection.This issue affects License Portal System: before 1.48.
CVE-2023-3386 1 A2technology 1 Camera Trap Tracking System 2023-08-11 N/A 9.8 CRITICAL
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in a2 Camera Trap Tracking System allows SQL Injection.This issue affects Camera Trap Tracking System: before 3.1905.
CVE-2023-38759 1 Wger 1 Workout Manager 2023-08-11 N/A 8.8 HIGH
Cross Site Request Forgery (CSRF) vulnerability in wger Project wger Workout Manager 2.2.0a3 allows a remote attacker to gain privileges via the user-management feature in the gym/views/gym.py, templates/gym/reset_user_password.html, templates/user/overview.html, core/views/user.py, and templates/user/preferences.html, core/forms.py components.
CVE-2023-35368 1 Microsoft 1 Exchange Server 2023-08-11 N/A 8.8 HIGH
Microsoft Exchange Remote Code Execution Vulnerability
CVE-2023-35388 1 Microsoft 1 Exchange Server 2023-08-11 N/A 8.0 HIGH
Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2023-38175 1 Microsoft 1 Windows Defender 2023-08-11 N/A 7.8 HIGH
Microsoft Windows Defender Elevation of Privilege Vulnerability
CVE-2023-38178 1 Microsoft 2 .net, Visual Studio 2022 2023-08-11 N/A 7.5 HIGH
.NET Core and Visual Studio Denial of Service Vulnerability
CVE-2023-38176 1 Microsoft 1 Azure Arc-enabled Servers 2023-08-11 N/A 7.0 HIGH
Azure Arc-Enabled Servers Elevation of Privilege Vulnerability
CVE-2023-27163 1 Rbaskets 1 Request Baskets 2023-08-11 N/A 6.5 MEDIUM
request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
CVE-2023-1389 1 Tp-link 2 Archer Ax21, Archer Ax21 Firmware 2023-08-11 N/A 8.8 HIGH
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
CVE-2023-26604 1 Systemd Project 1 Systemd 2023-08-11 N/A 7.8 HIGH
systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.
CVE-2023-35391 1 Microsoft 3 .net, Asp.net Core, Visual Studio 2022 2023-08-11 N/A 7.5 HIGH
ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability
CVE-2023-38181 1 Microsoft 1 Exchange Server 2023-08-11 N/A 8.8 HIGH
Microsoft Exchange Server Spoofing Vulnerability
CVE-2023-38184 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2023-08-11 N/A 7.5 HIGH
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVE-2021-41184 6 Drupal, Fedoraproject, Jqueryui and 3 more 35 Drupal, Fedora, Jquery Ui and 32 more 2023-08-11 4.3 MEDIUM 6.1 MEDIUM
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.
CVE-2023-38182 1 Microsoft 1 Exchange Server 2023-08-11 N/A 8.0 HIGH
Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2023-36540 1 Zoom 1 Zoom 2023-08-11 N/A 7.8 HIGH
Untrusted search path in the installer for Zoom Desktop Client for Windows before 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access.
CVE-2023-30795 1 Siemens 3 Jt Open, Jt Utilities, Parasolid 2023-08-11 N/A 7.8 HIGH
A vulnerability has been identified in JT Open (All versions < V11.4), JT Utilities (All versions < V13.4), Parasolid V34.0 (All versions < V34.0.253), Parasolid V34.1 (All versions < V34.1.243), Parasolid V35.0 (All versions < V35.0.177), Parasolid V35.1 (All versions < V35.1.073). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process.
CVE-2023-36541 1 Zoom 1 Zoom 2023-08-11 N/A 8.8 HIGH
Insufficient verification of data authenticity in Zoom Desktop Client for Windows before 5.14.5 may allow an authenticated user to enable an escalation of privilege via network access.