Show filters
161 Total Results
Displaying 11-20 of 161
Sort by:
Attacker Value
Unknown

CVE-2023-42189

Disclosure Date: October 10, 2023 (last updated February 16, 2024)
Insecure Permissions vulnerability in Connectivity Standards Alliance Matter Official SDK v.1.1.0.0 , Nanoleaf Light strip v.3.5.10, Govee LED Strip v.3.00.42, switchBot Hub2 v.1.0-0.8, Phillips hue hub v.1.59.1959097030, and yeelight smart lamp v.1.12.69 allows a remote attacker to cause a denial of service via a crafted script to the KeySetRemove function.
Attacker Value
Unknown

CVE-2023-5366

Disclosure Date: October 06, 2023 (last updated October 13, 2023)
A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
Attacker Value
Unknown

CVE-2023-44239

Disclosure Date: October 02, 2023 (last updated October 09, 2023)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jobin Jose WWM Social Share On Image Hover plugin <= 2.2 versions.
Attacker Value
Unknown

CVE-2023-40019

Disclosure Date: September 15, 2023 (last updated October 08, 2023)
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.10, FreeSWITCH allows authorized users to cause a denial of service attack by sending re-INVITE with SDP containing duplicate codec names. When a call in FreeSWITCH completes codec negotiation, the `codec_string` channel variable is set with the result of the negotiation. On a subsequent re-negotiation, if an SDP is offered that contains codecs with the same names but with different formats, there may be too many codec matches detected by FreeSWITCH leading to overflows of its internal arrays. By abusing this vulnerability, an attacker is able to corrupt stack of FreeSWITCH leading to an undefined behavior of the system or simply crash it. Version 1.10.10 contains a patch for this issue.
Attacker Value
Unknown

CVE-2023-40018

Disclosure Date: September 15, 2023 (last updated October 08, 2023)
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.10, FreeSWITCH allows remote users to trigger out of bounds write by offering an ICE candidate with unknown component ID. When an SDP is offered with any ICE candidates with an unknown component ID, FreeSWITCH will make an out of bounds write to its arrays. By abusing this vulnerability, an attacker is able to corrupt FreeSWITCH memory leading to an undefined behavior of the system or a crash of it. Version 1.10.10 contains a patch for this issue.
Attacker Value
Unknown

CVE-2023-2546

Disclosure Date: June 06, 2023 (last updated October 08, 2023)
The WP User Switch plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.0.2. This is due to incorrect authentication checking in the 'wpus_allow_user_to_admin_bar_menu' function with the 'wpus_who_switch' cookie value. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator, if they have access to the username.
Attacker Value
Unknown

CVE-2023-23925

Disclosure Date: February 03, 2023 (last updated November 08, 2023)
Switcher Client is a JavaScript SDK to work with Switcher API which is cloud-based Feature Flag. Unsanitized input flows into Strategy match operation (EXIST), where it is used to build a regular expression. This may result in a Regular expression Denial of Service attack (reDOS). This issue has been patched in version 3.1.4. As a workaround, avoid using Strategy settings that use REGEX in conjunction with EXIST and NOT_EXIST operations.
Attacker Value
Unknown

CVE-2022-4338

Disclosure Date: January 10, 2023 (last updated October 08, 2023)
An integer underflow in Organization Specific TLV was found in various versions of OpenvSwitch.
Attacker Value
Unknown

CVE-2022-4337

Disclosure Date: January 10, 2023 (last updated October 08, 2023)
An out-of-bounds read in Organization Specific TLV was found in various versions of OpenvSwitch.
Attacker Value
Unknown

CVE-2019-25076

Disclosure Date: September 08, 2022 (last updated October 08, 2023)
The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.