Powercms Description Open redirect vulnerability in PowerCMS allows a remote unauthenticated attacker to redirect users to arbitrary web sites via a specially crafted URL. Note that all versions of PowerCMS 3 Series and earlier which are unsupported are also affected by this vulnerability.
Barracuda esg appliance Description Use of a Third Party library produced a vulnerability in Barracuda Networks Inc. Barracuda ESG Appliance which allowed Parameter Injection.
Jp PrimaryVendor - Product buildkite - elastic ci for aws Description A symbolic link following vulnerability in Buildkite Elastic CI for AWS versions prior to 6.7.1 and 5.22.5 allows the buildkite-agent user to change ownership of arbitrary directories via the PIPELINE PATH variable in the fix-buildkite-agent-builds-permissions script.
Qdmetro v4.2.2 allows attackers to open a crafted URL without any filtering or checking.
Documize Description SQL Injection vulnerability in Documize version 5.4.2, allows remote attackers to execute arbitrary code via the user parameter of the /api/dashboard/activity endpoint.
Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism.
Inet - multiple products Description Shell Injection vulnerability GL.iNet A1300 v4.4.6, AX1800 v4.4.6, AXT1800 v4.4.6, MT3000 v4.4.6, MT2500 v4.4.6, MT6000 v4.5.0, MT1300 v4.3.7, MT300N-V2 v4.3.7, AR750S v4.3.7, AR750 v4.3.7, AR300M v4.3.7, and B1300 v4.3.7., allows local attackers to execute arbitrary code via the get system log and get crash log functions of the logread module, as well as the upgrade online function of the upgrade module.
This vulnerability allows attackers to cause a Denial of Service via manipulation of the first two parameters.
Execute of jline-groovy v3.24.1 allows attackers to cause an OOM error.
Smartcamera application through 4.1.9 20231127 for Android allows a remote attacker to execute arbitrary JavaScript code via an implicit intent to the com.
Secure enterprise client Description Support Assistant in NCP Secure Enterprise Client before 13.10 allows attackers to execute DLL files with SYSTEM privileges by creating a symbolic link from a %LOCALAPPDATA%TempNcpSupport* location.
Relative Path Traversal can occur under /oms1350/data/cpb/log of the Network Element Manager via the filename parameter, allowing a remote authenticated attacker to read arbitrary files.
Pl of the VM Manager WebUI via the logfile parameter, allowing a remote authenticated attacker to read arbitrary files.
Console port authentication uses hard-coded credentials, which allows an attacker with physical access and sufficient knowledge to execute arbitrary commands as root.
A missing authorization check in captive portals allows attackers to modify the portals' configurations without prior authentication.
To prevent attack variants, a different solution is required: the smtpd forbid bare newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.
Limited - tv web browser Description An issue in Shenzhen TCL Browser TV Web BrowseHere 6.65.022 dab24cc6 231221 gp allows a remote attacker to execute arbitrary JavaScript code via the com.
Php of thirty bees before 1.5.0 allows attackers to execute arbitrary web script or HTML via $e->getMessage() error mishandling.
An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized.
Perpetual calendar Description An issue in the openFile method of Chinese Perpetual Calendar v9.0.0 allows attackers to read any file via unspecified vectors.
This Cyber News was published on www.cisa.gov. Publication date: Tue, 02 Jan 2024 22:13:04 +0000