TheCyberthrone’s Zero Day Vulnerabilities a review-Year 2023

TheCyberthrone’s Zero Day Vulnerabilities a review-Year 2023


ProductsCVE/CWE Count
Microsoft Windows21
Apple iOS and iPadOS18
Google Chrome8
Adobe ColdFusion3
Qualcomm firmware3
Google Android2
Citrix NetScaler ADC and NetScaler Gateway2
Google Pixel2
Trend Micro Apex One1
QNAP QVR Firmware1
Microsoft ASP.NET Core1
Cisco IOS XE  software1
Royal Elementor Addons plugin for WordPress1
Cisco IOS XE Web UI software1
WinRAR1
acme.sh1
MobileIron Sentry1
Embedded malicious code in Ledger Connect Kit1
Rockwell Automation1
Emby Server1
Skype for Business Server1
FortiOS1
Unitronics Vision Series PLCs and HMIs1
FortiOS and FortiProxy SSL-VPN1
Cisco Adaptive Security Appliance1
FXC routers AE10211
Atlassian Confluence Data Center1
General Bytes Crypto Application Server (CAS)1
MOVEit Transfer1
Gigabyte UEFI firmware1
Barracuda ESG1
GoAnywhere MFT1
Roundcube1
Adobe Acrobat1
Samsung Mobile Firmware1
ARM Mali GPU1
Terrasoft CRM1
3CX Electro1
Ultimate Member plugin1
Ivanti Endpoint Manage1
VMware Tools1
Ivanti Endpoint Manager1
Zimbra Collaboration Suite1
Linux kernel1
MagicLine4NX1
Grand Total96
Advertisements
Vulnerability TypeVulnerability Count
Buffer overflow19
Input validation error6
Use-after-free6
Type Confusion5
OS Command Injection5
Security features bypass5
Out-of-bounds write4
Improper Authentication4
Heap-based buffer overflow4
Integer overflow4
Information disclosure4
Improper access control3
Path traversal4
Backdoor3
Cross-site scripting2
Deserialization of Untrusted Data2
Out-of-bounds read2
Improper Authorization1
Authentication bypass1
Memory leak1
Code Injection1
Missing Authorization1
Privilege Escalation1
Improper input validation1
SQL injection1
Use of Out-of-range Pointer Offset1
Use of default credentials1
Improper Privilege Management1
Inclusion of sensitive information in log files1
Arbitrary file upload1
Information exposure1
Grand Total96
Advertisements
CVEID ProductVulnerability TypeVulnerability Description
CVE-2023-38180Microsoft ASP.NET CoreInput validation errorThe vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send  specially crafted input to the application and perform a denial of service (DoS) attack.
CVE-2023-36033Microsoft WindowsBuffer overflowThe vulnerability exists due to a boundary error in Windows DWM Core Library. A local user can trigger memory corruption and execute arbitrary code with SYSTEM privileges.
CVE-2023-36025Microsoft WindowsSecurity features bypassThe vulnerability exists due to an error in Windows SmartScreen feature. A remote attacker can trick the victim to click on a specially crafted .url file and execute arbitrary code on the system.
CVE-2023-36036Microsoft WindowsBuffer overflowThe vulnerability exists due to a boundary error in Windows Cloud Files Mini Filter Driver. A local user trigger memory corruption and execute arbitrary code with SYSTEM privileges.
CVE-2023-47246Microsoft WindowsPath traversal in SysAidThe vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can upload and execute arbitrary code on the system.
CVE-2023-36563Microsoft WindowsInformation disclosureThe vulnerability exists due to disclosure of NTLM hashes in WordPad. A remote attacker can trick the victim to open a specially crafted file and gain access to sensitive information.
CVE-2023-36802Microsoft WindowsBuffer overflowThe vulnerability exists due to a boundary error within the Microsoft Streaming Service Proxy. A local user can trigger memory corruption and execute arbitrary code with SYSTEM privileges.
CVE-2023-36761Microsoft WindowsInformation disclosureThe vulnerability exists due to the application ca reveal sensitive information to a third-party. A remote attacker can trick the victim to open or preview a specially crafted file and obtain NTLM hash of the current account.
CVE-2023-36884Microsoft WindowsInput validation errorThe vulnerability exists due to insufficient validation of user-supplied input when handling cross-protocol file navigation. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code on the system.
CVE-2023-35311Microsoft WindowsInput validation errorThe vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can trick the victim to click on a specially crafted URL, bypass the Microsoft Outlook Security Notice prompt and execute arbitrary code on the system.
CVE-2023-36874Microsoft WindowsBuffer overflowThe vulnerability exists due to a boundary error within the Windows Error Reporting Service. A local user can use a specially crafted performance trace to trigger memory corruption and execute arbitrary code on the target system.
CVE-2023-32049Microsoft WindowsSecurity features bypassThe vulnerability exists due to improper validation of URLs in Windows SmartScreen. A remote attacker can trick the victim to visit a specially crafted URL, bypass the Open File – Security Warning prompt and execute arbitrary code on the system.
CVE-2023-32046Microsoft WindowsBuffer overflowThe vulnerability exists due to a boundary error when processing HTML content in Windows MSHTML Platform. A remote attacker can trick the victim to open a specially crafted file, trigger memory corruption and execute arbitrary code on the target system.
CVE-2023-24932Microsoft WindowsSecurity features bypassThe vulnerability exists due to improper implementation of the Secure Boot feature. An attacker with physical access to the system or a local user with Administrative rights can bypass Secure Boot.
CVE-2023-29336Microsoft WindowsUse-after-freeThe vulnerability exists due to a boundary error within the Win32k driver. A local user can trigger a use-after-free error and execute arbitrary code with SYSTEM privileges.
CVE-2023-28252Microsoft WindowsBuffer overflowThe vulnerability exists due to a boundary error in Windows Common Log File System Driver. A local user can trigger memory corruption and execute arbitrary code with SYSTEM privileges.
CVE-2023-23397Microsoft WindowsInformation disclosureThe vulnerability exists due to the application leaks the Net-NTLMv2 hash. A remote attacker can send a specially crafted email to the victim and obtain the Net-NTLMv2 hash of the Windows account. The victim does not need to open the email, as the vulnerability is triggered automatically when it is retrieved and processed by the email server, e.g. before the email is viewed in the preview pane.
CVE-2023-24880Microsoft WindowsSecurity features bypassThe vulnerability exists due to incorrect implementation of the Windows SmartScreen Security Feature. A remote attacker can trick the victim to open a specially crafted file and bypass the Mark of the Web (MOTW) defenses.
CVE-2023-21823Microsoft WindowsBuffer overflowThe vulnerability exists due to a boundary error within the Windows Graphics Component. A local user can trigger memory corruption and execute arbitrary code with SYSTEM privileges.
CVE-2023-23376Microsoft WindowsBuffer overflowThe vulnerability exists due to a boundary error in Windows Common Log File System Driver. A local user can trigger memory corruption and execute arbitrary code with SYSTEM privileges.
CVE-2023-21715Microsoft WindowsSecurity features bypassThe vulnerability exists due to unspecified error when processing files. A remote attacker can trick the victim to open a specially crafted file, bypass Office macro policies used to block untrusted or malicious files and execute arbitrary code on the system.
CVE-2023-21674Microsoft WindowsBuffer overflowThe vulnerability exists due to a boundary error within the Windows Advanced Local Procedure Call (ALPC). A local user can trigger memory corruption and execute arbitrary code with SYSTEM privileges.
Advertisements
CVE IDProductVulnerability TypeVulnerability Description
CVE-2023-41990Apple iOS and iPadOSBuffer overflowThe vulnerability exists due to a boundary error in FontParser. A remote attacker can trick the victim to open a specially crafted file or visit a malicious website, trigger memory corruption and execute arbitrary code on the target system.
CVE-2023-38606Apple iOS and iPadOSBuffer overflowThe vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.
CVE-2023-41992Apple iOS and iPadOSInput validation errorThe vulnerability exists due to insufficient validation of user-supplied input within the OS kernel. A local application can execute arbitrary code on the system with elevated privileges.
CVE-2023-37450Apple iOS and iPadOSBuffer overflowThe vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system.
CVE-2023-32373Apple iOS and iPadOSUse-after-freeThe vulnerability exists due to a use-after-free error in WebKit. A remote attacker can trick the victim to visit a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.
CVE-2023-28204Apple iOS and iPadOSOut-of-bounds readThe vulnerability exists due to a boundary condition in WebKit. A remote attacker can trick the victim to visit a specially crafted webpage, trigger an out-of-bounds read error and read contents of memory on the system.
CVE-2023-32409Apple iOS and iPadOSBuffer overflowThe vulnerability exists due to a boundary error in WebKit. A remote attacker can trick the victim to visit a specially crafted web page, trigger memory corruption and break out of Web Content sandbox.
CVE-2023-28205Apple iOS and iPadOSUse-after-freeThe vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to open a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.
CVE-2023-28206Apple iOS and iPadOSOut-of-bounds writeThe vulnerability exists due to a boundary error in IOSurfaceAccelerator. A local application can trigger an out-of-bounds write and execute arbitrary code with kernel privileges.
CVE-2023-23529Apple iOS and iPadOSType ConfusionThe vulnerability exists due to a type confusion error when parsing web content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger a type confusion error and execute arbitrary code on the target system.
CVE-2023-42917Apple iOS and iPadOSBuffer overflowThe vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
CVE-2023-42916Apple iOS and iPadOSOut-of-bounds readThe vulnerability exists due to a boundary error when processing untrusted input. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger an out-of-bounds read and execute arbitrary code on the target system.
CVE-2023-42824Apple iOS and iPadOSBuffer overflowThe vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.
CVE-2023-41061Apple iOS and iPadOSInput validation errorThe vulnerability exists due to insufficient validation of user-supplied input in Wallet. A remote attacker can trick the victim to open a specially crafted attachment and execute arbitrary code on the system.
CVE-2023-41064Apple iOS and iPadOSBuffer overflowThe vulnerability exists due to a boundary error in ImageIO subsystem. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
CVE-2023-32435Apple iOS and iPadOSBuffer overflowThe vulnerability exists due to a boundary error in WebKit. A remote attacker can trick the victim to visit a specially crafted web page, trigger memory corruption and execute arbitrary code on the target system.
CVE-2023-32439Apple iOS and iPadOSType ConfusionThe vulnerability exists due to a type confusion error in WebKit. A remote attacker can trick the victim to open a specially crafted web page, trigger a type confusion error and execute arbitrary code on the target system.
CVE-2023-32434Apple iOS and iPadOSInteger overflowThe vulnerability exists due to an integer overflow within the OS kernel. A local application can trigger an integer overflow and execute arbitrary code with kernel privileges.
Advertisements
CVE IDProductVulnerability TypeVulnerability Description
CVE-2023-35674Google AndroidImproper input validationThe vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
CVE-2023-20963Google AndroidPrivilege EscalationThe vulnerability exists due to improperly imposed security restrictions in Android Framework. A local application can escalate privileges on the device.
CVE-2023-7024Google ChromeHeap-based buffer overflowThe vulnerability exists due to a boundary error when processing untrusted HTML content in WebRTC. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
CVE-2023-6345Google ChromeInteger overflowThe vulnerability exists due to integer overflow in Skia component in Google Chrome. A remote attacker can trick the victim to open a specially crafted web page, trigger an integer overflow and execute arbitrary code on the target system.
CVE-2023-5217Google ChromeHeap-based buffer overflowThe vulnerability exists due to a boundary error when processing untrusted HTML content in vp8 encoding in libvpx. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
CVE-2023-4863Google ChromeHeap-based buffer overflowThe vulnerability exists due to a boundary error when processing WebP images within libwebp library. A remote attacker can trick the victim to visit a malicious website, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
CVE-2023-3079Google ChromeType ConfusionThe vulnerability exists due to a type confusion error within the V8 engine in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger a type confusion error and execute arbitrary code on the target system.
CVE-2023-2136Google ChromeInteger overflowThe vulnerability exists due to integer overflow in Skia component in Google Chrome. A remote attacker can trick the victim to open a specially crafted web page, trigger an integer overflow and execute arbitrary code on the target system.
CVE-2023-2033Google ChromeType ConfusionThe vulnerability exists due to a type confusion error within the V8 engine in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger a type confusion error and execute arbitrary code on the target system.
CVE-2023-4762Google ChromeType ConfusionThe vulnerability allowed a remote attacker to execute arbitrary code via a crafted HTML page.
CVE-2023-4211Google PixelUse-after-freeThe vulnerability exists due to a use-after-free error within Mali GPU Kernel Driver. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.
CVE-2023-21237Google PixelInformation exposureThe vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
CVE/CWE IDProductVulnerability TypeVulnerability Description
CVE-2023-290593CX ElectroBackdoorThe vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that allows a remote attacker to gain unauthorized access to the application.
CWE-78acme.shOS Command InjectionThe vulnerability exists due to improper input validation when parsing certificates. A remote attacker can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
CVE-2023-26369Adobe AcrobatOut-of-bounds writeThe vulnerability exists due to a boundary error when processing PDF. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
CVE-2023-38205Adobe ColdFusionImproper access controlThe vulnerability exists due to improper access restrictions. A remote non-authenticated attacker can bypass implemented security restrictions and gain unauthorized access to the application.
CVE-2023-26360Adobe ColdFusionImproper access controlThe vulnerability exists due to improper access restrictions. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.
CVE-2023-26359Adobe ColdFusionDeserialization of Untrusted DataThe vulnerability exists due to insecure input validation when processing serialized data. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system.
CVE-2023-26083ARM Mali GPUMemory leakThe vulnerability exists due memory leak. A local application can force the driver to leak memory and gain access to sensitive information.
CVE-2023-22515Atlassian Confluence Data CenterImproper AuthenticationThe vulnerability exists due to missing authentication at the “/setup/setupadministrator.action” endpoint. A remote non-authenticated attacker can send specially crafted requests to the server to create an administrative account and gain unauthorized access to the system.
CVE-2023-2868Barracuda ESGOS Command InjectionThe vulnerability exists due to improper input validation when processing .tar archives during email attachment screening. A remote unauthenticated attacker can send a specially crafted email with a malicious attachment to the appliance and execute arbitrary Perl commands on the target system.
CVE-2023-20269Cisco Adaptive Security ApplianceAuthentication bypassThe vulnerability exists due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. A remote user can perform a brute-force attack and establish a clientless SSL VPN session with an unauthorized user.
CVE-2023-20109Cisco IOS XE  softwareOut-of-bounds writeThe vulnerability exists due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols within the Cisco Group Encrypted Transport VPN (GET VPN) feature. A remote authenticated user with administrative control of either a group member or a key server can trigger an out-of-bounds write and execute arbitrary code on the target system.
CVE-2023-20198Cisco IOS XE Web UI softwareImproper Privilege ManagementThe vulnerability exists due to improper privilege management in the web UI feature. A remote non-authenticated attacker can send a specially crafted HTTP request to the affected device and create an account with privilege level 15 access.
CVE-2023-4966Citrix NetScaler ADC and NetScaler GatewayBuffer overflowThe vulnerability exists due to a boundary error. A remote non-authenticated attacker can send specially crafted data to the device, trigger memory corruption and execute arbitrary code on the target system
CVE-2023-3519Citrix NetScaler ADC and NetScaler GatewayCode InjectionThe vulnerability exists due to improper input validation when the appliance is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server. A remote non-authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
CWE-506Embedded malicious code in Ledger Connect KitBackdoorThe vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that allows a remote attacker to drain crypto assets from users’ wallets.
CWE-862 Emby ServerMissing AuthorizationThe vulnerability exists due to insecure default configuration. A remote non-authenticated attacker can send a specially crafted request to the server and execute arbitrary code on the target system.
CVE-2022-41328FortiOSPath traversalThe vulnerability exists due to input validation error when processing certain CLI command. A local user can read and write arbitrary files on the system.
CVE-2023-27997FortiOS and FortiProxy SSL-VPNHeap-based buffer overflowThe vulnerability exists due to a boundary error within the SSL-VPN feature. A remote non-authenticated attacker can send specially crafted requests to the SSL-VPN interface, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
CVE-2023-49897FXC routers AE1021OS Command InjectionThe vulnerability exists due to improper input validation. A remote user on the local network can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
CWE-284General Bytes Crypto Application Server (CAS)Improper access controlThe vulnerability exists due to improper access restrictions in the master service interface on port 7741/TCP. A remote attacker can send a specially crafted request to the affected server and execute arbitrary code on the system.
CWE-506 Gigabyte UEFI firmwareBackdoorThe vulnerability exists due to presence of embedded malicious functionality (aka backdoor) in the UEFI firmware that was downloaded from the official website using the Gigabyte’s App Center. This allows a remote attacker to gain full control over the system.
CVE-2023-0669GoAnywhere MFTDeserialization of Untrusted DataThe vulnerability exists due to insecure input validation when processing serialized data passed to the “/goanywhere/lic/accept” HTTP endpoint of the administrative web interface. A remote attacker can send a specially crafted HTTP request to the application and execute arbitrary code on the target system.
CVE-2023-35078Ivanti Endpoint ManageImproper AuthenticationThe vulnerability exists due to an unspecified error in the authentication process. A remote attacker can bypass authentication and gain unauthorized access to the application.
CVE-2023-35081Ivanti Endpoint ManagerPath TraversalThe vulnerability exists due to input validation error when processing directory traversal sequences. A remote privileged user can send a specially crafted HTTP request and overwrite arbitrary files and compromise the affected system.
CVE-2023-0266Linux kernelUse-after-freeThe vulnerability exists due to a use-after-free error within the snd_ctl_elem_read() function in the Linux kernel sound subsystem. A local user can trigger a use-after-free error and execute arbitrary code on the system.
CVE-2023-45797MagicLine4NXBuffer overflowThe vulnerability exists due to a boundary error. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
CVE-2023-38035MobileIron SentryImproper AuthenticationThe vulnerability exists due to missing authentication on certain APIs. A remote attacker can send a specially crafted HTTP request to port 8443/TCP, bypass authentication process and execute arbitrary code on the system.
CVE-2023-34362MOVEit TransferSQL injectionThe vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
CVE-2023-47565QNAP QVR FirmwareOS Command InjectionThe vulnerability exists due to improper input validation within QNAP VioStor NVR models running QVR firmware. A remote user can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
CVE-2023-33063Qualcomm firmwareUse-after-freeThe vulnerability exists due to a use-after-free error during a remote call from HLOS to DSP. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
CVE-2023-33107Qualcomm firmwareInteger overflowThe vulnerability exists due to integer overflow while assigning shared virtual memory region during IOCTL call. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
CVE-2023-33106Qualcomm firmwareUse of Out-of-range Pointer OffsetThe vulnerability exists due to a boundary error while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.
CVE-2023-3595Rockwell AutomationOut-of-bounds writeThe vulnerability exists due to a boundary error when processing CIP messages. A remote attacker can send specially crafted CIP messages to ports 44818/TCP or 2222/UDP, trigger an out-of-bounds write and execute arbitrary code.
CVE-2023-5631RoundcubeCross-site scriptingThe vulnerability exists due to insufficient sanitization of user-supplied data when processing SVG files in program/lib/Roundcube/rcube_washtml.php. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user’s browser in context of vulnerable website.
CVE-2023-5360Royal Elementor Addons plugin for WordPressArbitrary file uploadThe vulnerability exists due to insufficient validation of file during file upload. A remote attacker can upload a malicious file and execute it on the server.
CVE-2023-21492Samsung Mobile FirmwareInclusion of sensitive information in log filesThe vulnerability exists due to kernel pointers are printed into the log file. A local application can read the log file and use the kernel pointers to bypass ASLR protection.
CVE-2023-41763Skype for Business ServerInformation disclosureThe vulnerability exists due to excessive data output by the application. A remote attacker can gain unauthorized access to IP addresses or port numbers or both to the attacker.
CWE-22Terrasoft CRMPath traversalThe vulnerability exists due to input validation error when processing directory traversal sequences. A remote non-authenticated attacker can send a specially crafted HTTP request and read arbitrary files on the system.
CVE-2023-41179Trend Micro Apex OneOS Command InjectionThe vulnerability exists due to improper input validation within the third-party AV uninstaller module shipped with the software. A local user can execute arbitrary commands with elevated privileges.
CVE-2023-3460Ultimate Member pluginImproper AuthorizationThe vulnerability exists due to improper authorization within the registration functionality. A remote non-authenticated attacker can register a rouge administrative account and compromise the web application.
CVE-2023-6448Unitronics Vision Series PLCs and HMIsUse of default credentialsThe vulnerability exists due to Unitronics Vision Series PLCs and HMIs use default administrative passwords. A remote attacker with network access to a PLC or HMI can gain administrative control over the system.
CVE-2023-20867VMware ToolsImproper AuthenticationThe vulnerability exists due to an error in the vgauth module. An attacker who compromised the ESXi host can bypass authentication process and execute privileged commands across Windows, Linux, and PhotonOS (vCenter) guest VMs without authentication of guest credentials from a compromised ESXi host and no default logging on guest VMs.
CVE-2023-38831WinRaRInput validation errorThe vulnerability exists due to insufficient validation of file names inside .zip archives. A remote attacker can create a specially crafted archive that contains executable malicious files and spoof their file extension to look like .jpeg or .txt.
CVE-2023-37580Zimbra Collaboration SuiteCross-site scriptingThe vulnerability exists due to insufficient sanitization of user-supplied data in the Zimbra Classic Web Client. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user’s browser in context of vulnerable website.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.