Security
Headlines
HeadlinesLatestCVEs

Source

CVE

CVE-2023-4540: http/h1_stream: handle EOF when `body_read_type==length` · daurnimator/lua-http@ddab283

Improper Handling of Exceptional Conditions vulnerability in Daurnimator HTTP Library for Lua allows Excessive Allocation.This issue affects HTTP Library for Lua: before commit ddab283.

CVE
#vulnerability#auth
CVE-2023-41910: daemon: fix read overflow when parsing CDP addresses · lldpd/lldpd@a9aeabd

An issue was discovered in lldpd before 1.0.17. By crafting a CDP PDU packet with specific CDP_TLV_ADDRESSES TLVs, a malicious actor can remotely force the lldpd daemon to perform an out-of-bounds read on heap memory. This occurs in cdp_decode in daemon/protocols/cdp.c.

CVE-2023-33021

Memory corruption in Graphics while processing user packets for command submission.

CVE-2023-41909: Limit scope by donaldsharp · Pull Request #13222 · FRRouting/frr

An issue was discovered in FRRouting FRR through 9.0. bgp_nlri_parse_flowspec in bgpd/bgp_flowspec.c processes malformed requests with no attributes, leading to a NULL pointer dereference.

CVE-2023-4748: mybugs/Yongyou-UFIDA-NC-Arbitrary-File-Read.pdf at main · houseoforange/mybugs

A vulnerability, which was classified as critical, has been found in Yongyou UFIDA-NC up to 20230807. This issue affects some unknown processing of the file PrintTemplateFileServlet.java. The manipulation of the argument filePath leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-238637 was assigned to this vulnerability.

CVE-2023-36307: Program crashes when processing certain maliciously crafted images by pic4xiu · Pull Request #6 · SimonWaldherr/zplgfa

** DISPUTED ** ZPLGFA 1.1.1 allows attackers to cause a panic (because of an integer index out of range during a ConvertToGraphicField call) via an image of zero width. NOTE: it is unclear whether there are common use cases in which this panic could have any security consequence

CVE-2023-36308: Release v1.6.2 · disintegration/imaging

** DISPUTED ** disintegration Imaging 1.6.2 allows attackers to cause a panic (because of an integer index out of range during a Grayscale call) via a crafted TIFF file to the scan function of scanner.go. NOTE: it is unclear whether there are common use cases in which this panic could have any security consequence

CVE-2023-4636: WordPress File Sharing Plugin <= 2.0.3 - Authenticated (Admin+) Stored Cross-Site Scripting — Wordfence Intelligence

The WordPress File Sharing Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 2.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.