Security
Headlines
HeadlinesLatestCVEs

Source

CVE

CVE-2023-3112: Elliptic Labs Virtual Lock Sensor Vulnerability - Lenovo Support US

A vulnerability was reported in Elliptic Labs Virtual Lock Sensor for ThinkPad T14 Gen 3 that could allow an attacker with local access to execute code with elevated privileges.

CVE
#vulnerability#lenovo
CVE-2023-3010: Grafana WorldMap Panel Plugin DOM XSS | Grafana Labs

Grafana is an open-source platform for monitoring and observability. The WorldMap panel plugin, versions before 1.0.4 contains a DOM XSS vulnerability.

CVE-2023-29973

Pfsense CE version 2.6.0 is vulnerable to No rate limit which can lead to an attacker creating multiple malicious users in firewall.

CVE-2023-39734: TrackDiner10/10_会員証

The leakage of the client secret in VISION MEAT WORKS TrackDiner10/10_mc Line v13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages.

CVE-2023-39735: 魚政 催事・新着情報

The leakage of the client secret in Uomasa_Saiji_news Line 13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages.

CVE-2023-39736: CVE-reports/CVE-2023-39736.md at main · syz913/CVE-reports

The leakage of the client secret in Fukunaga_memberscard Line 13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages.

CVE-2023-39732: 徳栄丸順番待ち

The leakage of the client secret in Tokueimaru_waiting Line 13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages.

CVE-2023-39733: 山さ紀とんとん亭

The leakage of the client secret in TonTon-Tei Line v13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages.

CVE-2023-39930: We’re here to help

A first-factor authentication bypass vulnerability exists in the PingFederate with PingID Radius PCV when a MSCHAP authentication request is sent via a maliciously crafted RADIUS client request.

CVE-2023-39231: We’re here to help

PingFederate using the PingOne MFA adapter allows a new MFA device to be paired without requiring second factor authentication from an existing registered device. A threat actor may be able to exploit this vulnerability to register their own MFA device if they have knowledge of a victim user's first factor credentials.