Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): Windows
- Search Type: Search All
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-5257 |
A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. It has been rated as problematic. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. VDB-240866 is the identifier assigned to this vulnerability. Published: September 29, 2023; 7:15:41 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2023-32477 |
Dell Common Event Enabler 8.9.8.2 for Windows and prior, contain an improper access control vulnerability. A local low-privileged malicious user may potentially exploit this vulnerability to gain elevated privileges. Published: September 29, 2023; 4:15:09 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2023-43662 |
ShokoServer is a media server which specializes in organizing anime. In affected versions the `/api/Image/WithPath` endpoint is accessible without authentication and is supposed to return default server images. The endpoint accepts the parameter `serverImagePath`, which is not sanitized in any way before being passed to `System.IO.File.OpenRead`, which results in an arbitrary file read. This issue may lead to an arbitrary file read which is exacerbated in the windows installer which installs the ShokoServer as administrator. Any unauthenticated attacker may be able to access sensitive information and read files stored on the server. The `/api/Image/WithPath` endpoint has been removed in commit `6c57ba0f0` which will be included in subsequent releases. Users should limit access to the `/api/Image/WithPath` endpoint or manually patch their installations until a patched release is made. This issue was discovered by the GitHub Security lab and is also indexed as GHSL-2023-191. Published: September 28, 2023; 6:15:10 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2023-5174 |
If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash. *This bug only affects Firefox on Windows when run in non-standard configurations (such as using `runas`). Other operating systems are unaffected.* This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3. Published: September 27, 2023; 11:19:42 AM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-44207 |
Stored cross-site scripting (XSS) vulnerability in protection plan name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. Published: September 27, 2023; 11:19:39 AM -0400 |
V3.1: 5.4 MEDIUM V2.0:(not available) |
CVE-2023-44206 |
Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. Published: September 27, 2023; 11:19:39 AM -0400 |
V3.1: 9.1 CRITICAL V2.0:(not available) |
CVE-2023-44205 |
Sensitive information disclosure due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. Published: September 27, 2023; 11:19:39 AM -0400 |
V3.1: 5.3 MEDIUM V2.0:(not available) |
CVE-2023-44161 |
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. Published: September 27, 2023; 11:19:38 AM -0400 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-44160 |
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. Published: September 27, 2023; 11:19:38 AM -0400 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-44159 |
Sensitive information disclosure due to cleartext storage of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. Published: September 27, 2023; 11:19:38 AM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-44158 |
Sensitive information disclosure due to insufficient token field masking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. Published: September 27, 2023; 11:19:37 AM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-44156 |
Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. Published: September 27, 2023; 11:19:37 AM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-44155 |
Sensitive information leak through log files. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. Published: September 27, 2023; 11:19:37 AM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-44154 |
Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. Published: September 27, 2023; 11:19:37 AM -0400 |
V3.1: 9.1 CRITICAL V2.0:(not available) |
CVE-2023-44153 |
Sensitive information disclosure due to cleartext storage of sensitive information in memory. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979. Published: September 27, 2023; 11:19:37 AM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-44152 |
Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979. Published: September 27, 2023; 11:19:37 AM -0400 |
V3.1: 9.1 CRITICAL V2.0:(not available) |
CVE-2023-40581 |
yt-dlp is a youtube-dl fork with additional features and fixes. yt-dlp allows the user to provide shell command lines to be executed at various stages in its download steps through the `--exec` flag. This flag allows output template expansion in its argument, so that metadata values may be used in the shell commands. The metadata fields can be combined with the `%q` conversion, which is intended to quote/escape these values so they can be safely passed to the shell. However, the escaping used for `cmd` (the shell used by Python's `subprocess` on Windows) does not properly escape special characters, which can allow for remote code execution if `--exec` is used directly with maliciously crafted remote data. This vulnerability only impacts `yt-dlp` on Windows, and the vulnerability is present regardless of whether `yt-dlp` is run from `cmd` or from `PowerShell`. Support for output template expansion in `--exec`, along with this vulnerable behavior, was added to `yt-dlp` in version 2021.04.11. yt-dlp version 2023.09.24 fixes this issue by properly escaping each special character. `\n` will be replaced by `\r` as no way of escaping it has been found. It is recommended to upgrade yt-dlp to version 2023.09.24 as soon as possible. Also, always be careful when using --exec, because while this specific vulnerability has been patched, using unvalidated input in shell commands is inherently dangerous. For Windows users who are not able to upgrade: 1. Avoid using any output template expansion in --exec other than {} (filepath). 2. If expansion in --exec is needed, verify the fields you are using do not contain ", | or &. 3. Instead of using --exec, write the info json and load the fields from it instead. Published: September 25, 2023; 3:15:09 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-0633 |
In Docker Desktop on Windows before 4.12.0 an argument injection to installer may result in local privilege escalation (LPE).This issue affects Docker Desktop: before 4.12.0. Published: September 25, 2023; 12:15:13 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-43090 |
A vulnerability was found in GNOME Shell. GNOME Shell's lock screen allows an unauthenticated local user to view windows of the locked desktop session by using keyboard shortcuts to unlock the restricted functionality of the screenshot tool. Published: September 22, 2023; 2:15:09 AM -0400 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-43764 |
Certain WithSecure products allow Unauthenticated Remote Code Execution via the web server (backend), issue 2 of 2. This affects WithSecure Policy Manager 15 on Windows and Linux. Published: September 22, 2023; 1:15:09 AM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |