
This year 2023, have seen a total of 95+ security vulnerabilities have been exploited as unpatched zero-days in the wild, according to an stats. It affected a wide range of platforms, including Apple iOS, Atlassian Confluence, Chromium, Google Pixel, Windows. This year numbers seen nearly a double fold when compared to the last year 2022 numbers of 53.
Here comes the TheCyberThrone’s analysis of Zeroday Vulnerabilities
Overall Summary
| Products | CVE/CWE Count |
| Microsoft Windows | 21 |
| Apple iOS and iPadOS | 18 |
| Google Chrome | 8 |
| Adobe ColdFusion | 3 |
| Qualcomm firmware | 3 |
| Google Android | 2 |
| Citrix NetScaler ADC and NetScaler Gateway | 2 |
| Google Pixel | 2 |
| Trend Micro Apex One | 1 |
| QNAP QVR Firmware | 1 |
| Microsoft ASP.NET Core | 1 |
| Cisco IOS XE software | 1 |
| Royal Elementor Addons plugin for WordPress | 1 |
| Cisco IOS XE Web UI software | 1 |
| WinRAR | 1 |
| acme.sh | 1 |
| MobileIron Sentry | 1 |
| Embedded malicious code in Ledger Connect Kit | 1 |
| Rockwell Automation | 1 |
| Emby Server | 1 |
| Skype for Business Server | 1 |
| FortiOS | 1 |
| Unitronics Vision Series PLCs and HMIs | 1 |
| FortiOS and FortiProxy SSL-VPN | 1 |
| Cisco Adaptive Security Appliance | 1 |
| FXC routers AE1021 | 1 |
| Atlassian Confluence Data Center | 1 |
| General Bytes Crypto Application Server (CAS) | 1 |
| MOVEit Transfer | 1 |
| Gigabyte UEFI firmware | 1 |
| Barracuda ESG | 1 |
| GoAnywhere MFT | 1 |
| Roundcube | 1 |
| Adobe Acrobat | 1 |
| Samsung Mobile Firmware | 1 |
| ARM Mali GPU | 1 |
| Terrasoft CRM | 1 |
| 3CX Electro | 1 |
| Ultimate Member plugin | 1 |
| Ivanti Endpoint Manage | 1 |
| VMware Tools | 1 |
| Ivanti Endpoint Manager | 1 |
| Zimbra Collaboration Suite | 1 |
| Linux kernel | 1 |
| MagicLine4NX | 1 |
| Grand Total | 96 |
Advertisements
Vulnerability Types
| Vulnerability Type | Vulnerability Count |
| Buffer overflow | 19 |
| Input validation error | 6 |
| Use-after-free | 6 |
| Type Confusion | 5 |
| OS Command Injection | 5 |
| Security features bypass | 5 |
| Out-of-bounds write | 4 |
| Improper Authentication | 4 |
| Heap-based buffer overflow | 4 |
| Integer overflow | 4 |
| Information disclosure | 4 |
| Improper access control | 3 |
| Path traversal | 4 |
| Backdoor | 3 |
| Cross-site scripting | 2 |
| Deserialization of Untrusted Data | 2 |
| Out-of-bounds read | 2 |
| Improper Authorization | 1 |
| Authentication bypass | 1 |
| Memory leak | 1 |
| Code Injection | 1 |
| Missing Authorization | 1 |
| Privilege Escalation | 1 |
| Improper input validation | 1 |
| SQL injection | 1 |
| Use of Out-of-range Pointer Offset | 1 |
| Use of default credentials | 1 |
| Improper Privilege Management | 1 |
| Inclusion of sensitive information in log files | 1 |
| Arbitrary file upload | 1 |
| Information exposure | 1 |
| Grand Total | 96 |
Advertisements
OEM Wise Detailed Summary
Microsoft
| CVEID | Product | Vulnerability Type | Vulnerability Description |
| CVE-2023-38180 | Microsoft ASP.NET Core | Input validation error | The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send specially crafted input to the application and perform a denial of service (DoS) attack. |
| CVE-2023-36033 | Microsoft Windows | Buffer overflow | The vulnerability exists due to a boundary error in Windows DWM Core Library. A local user can trigger memory corruption and execute arbitrary code with SYSTEM privileges. |
| CVE-2023-36025 | Microsoft Windows | Security features bypass | The vulnerability exists due to an error in Windows SmartScreen feature. A remote attacker can trick the victim to click on a specially crafted .url file and execute arbitrary code on the system. |
| CVE-2023-36036 | Microsoft Windows | Buffer overflow | The vulnerability exists due to a boundary error in Windows Cloud Files Mini Filter Driver. A local user trigger memory corruption and execute arbitrary code with SYSTEM privileges. |
| CVE-2023-47246 | Microsoft Windows | Path traversal in SysAid | The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can upload and execute arbitrary code on the system. |
| CVE-2023-36563 | Microsoft Windows | Information disclosure | The vulnerability exists due to disclosure of NTLM hashes in WordPad. A remote attacker can trick the victim to open a specially crafted file and gain access to sensitive information. |
| CVE-2023-36802 | Microsoft Windows | Buffer overflow | The vulnerability exists due to a boundary error within the Microsoft Streaming Service Proxy. A local user can trigger memory corruption and execute arbitrary code with SYSTEM privileges. |
| CVE-2023-36761 | Microsoft Windows | Information disclosure | The vulnerability exists due to the application ca reveal sensitive information to a third-party. A remote attacker can trick the victim to open or preview a specially crafted file and obtain NTLM hash of the current account. |
| CVE-2023-36884 | Microsoft Windows | Input validation error | The vulnerability exists due to insufficient validation of user-supplied input when handling cross-protocol file navigation. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code on the system. |
| CVE-2023-35311 | Microsoft Windows | Input validation error | The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can trick the victim to click on a specially crafted URL, bypass the Microsoft Outlook Security Notice prompt and execute arbitrary code on the system. |
| CVE-2023-36874 | Microsoft Windows | Buffer overflow | The vulnerability exists due to a boundary error within the Windows Error Reporting Service. A local user can use a specially crafted performance trace to trigger memory corruption and execute arbitrary code on the target system. |
| CVE-2023-32049 | Microsoft Windows | Security features bypass | The vulnerability exists due to improper validation of URLs in Windows SmartScreen. A remote attacker can trick the victim to visit a specially crafted URL, bypass the Open File – Security Warning prompt and execute arbitrary code on the system. |
| CVE-2023-32046 | Microsoft Windows | Buffer overflow | The vulnerability exists due to a boundary error when processing HTML content in Windows MSHTML Platform. A remote attacker can trick the victim to open a specially crafted file, trigger memory corruption and execute arbitrary code on the target system. |
| CVE-2023-24932 | Microsoft Windows | Security features bypass | The vulnerability exists due to improper implementation of the Secure Boot feature. An attacker with physical access to the system or a local user with Administrative rights can bypass Secure Boot. |
| CVE-2023-29336 | Microsoft Windows | Use-after-free | The vulnerability exists due to a boundary error within the Win32k driver. A local user can trigger a use-after-free error and execute arbitrary code with SYSTEM privileges. |
| CVE-2023-28252 | Microsoft Windows | Buffer overflow | The vulnerability exists due to a boundary error in Windows Common Log File System Driver. A local user can trigger memory corruption and execute arbitrary code with SYSTEM privileges. |
| CVE-2023-23397 | Microsoft Windows | Information disclosure | The vulnerability exists due to the application leaks the Net-NTLMv2 hash. A remote attacker can send a specially crafted email to the victim and obtain the Net-NTLMv2 hash of the Windows account. The victim does not need to open the email, as the vulnerability is triggered automatically when it is retrieved and processed by the email server, e.g. before the email is viewed in the preview pane. |
| CVE-2023-24880 | Microsoft Windows | Security features bypass | The vulnerability exists due to incorrect implementation of the Windows SmartScreen Security Feature. A remote attacker can trick the victim to open a specially crafted file and bypass the Mark of the Web (MOTW) defenses. |
| CVE-2023-21823 | Microsoft Windows | Buffer overflow | The vulnerability exists due to a boundary error within the Windows Graphics Component. A local user can trigger memory corruption and execute arbitrary code with SYSTEM privileges. |
| CVE-2023-23376 | Microsoft Windows | Buffer overflow | The vulnerability exists due to a boundary error in Windows Common Log File System Driver. A local user can trigger memory corruption and execute arbitrary code with SYSTEM privileges. |
| CVE-2023-21715 | Microsoft Windows | Security features bypass | The vulnerability exists due to unspecified error when processing files. A remote attacker can trick the victim to open a specially crafted file, bypass Office macro policies used to block untrusted or malicious files and execute arbitrary code on the system. |
| CVE-2023-21674 | Microsoft Windows | Buffer overflow | The vulnerability exists due to a boundary error within the Windows Advanced Local Procedure Call (ALPC). A local user can trigger memory corruption and execute arbitrary code with SYSTEM privileges. |
Advertisements
Apple
| CVE ID | Product | Vulnerability Type | Vulnerability Description |
| CVE-2023-41990 | Apple iOS and iPadOS | Buffer overflow | The vulnerability exists due to a boundary error in FontParser. A remote attacker can trick the victim to open a specially crafted file or visit a malicious website, trigger memory corruption and execute arbitrary code on the target system. |
| CVE-2023-38606 | Apple iOS and iPadOS | Buffer overflow | The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with elevated privileges. |
| CVE-2023-41992 | Apple iOS and iPadOS | Input validation error | The vulnerability exists due to insufficient validation of user-supplied input within the OS kernel. A local application can execute arbitrary code on the system with elevated privileges. |
| CVE-2023-37450 | Apple iOS and iPadOS | Buffer overflow | The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system. |
| CVE-2023-32373 | Apple iOS and iPadOS | Use-after-free | The vulnerability exists due to a use-after-free error in WebKit. A remote attacker can trick the victim to visit a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system. |
| CVE-2023-28204 | Apple iOS and iPadOS | Out-of-bounds read | The vulnerability exists due to a boundary condition in WebKit. A remote attacker can trick the victim to visit a specially crafted webpage, trigger an out-of-bounds read error and read contents of memory on the system. |
| CVE-2023-32409 | Apple iOS and iPadOS | Buffer overflow | The vulnerability exists due to a boundary error in WebKit. A remote attacker can trick the victim to visit a specially crafted web page, trigger memory corruption and break out of Web Content sandbox. |
| CVE-2023-28205 | Apple iOS and iPadOS | Use-after-free | The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to open a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system. |
| CVE-2023-28206 | Apple iOS and iPadOS | Out-of-bounds write | The vulnerability exists due to a boundary error in IOSurfaceAccelerator. A local application can trigger an out-of-bounds write and execute arbitrary code with kernel privileges. |
| CVE-2023-23529 | Apple iOS and iPadOS | Type Confusion | The vulnerability exists due to a type confusion error when parsing web content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger a type confusion error and execute arbitrary code on the target system. |
| CVE-2023-42917 | Apple iOS and iPadOS | Buffer overflow | The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system. |
| CVE-2023-42916 | Apple iOS and iPadOS | Out-of-bounds read | The vulnerability exists due to a boundary error when processing untrusted input. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger an out-of-bounds read and execute arbitrary code on the target system. |
| CVE-2023-42824 | Apple iOS and iPadOS | Buffer overflow | The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with elevated privileges. |
| CVE-2023-41061 | Apple iOS and iPadOS | Input validation error | The vulnerability exists due to insufficient validation of user-supplied input in Wallet. A remote attacker can trick the victim to open a specially crafted attachment and execute arbitrary code on the system. |
| CVE-2023-41064 | Apple iOS and iPadOS | Buffer overflow | The vulnerability exists due to a boundary error in ImageIO subsystem. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system. |
| CVE-2023-32435 | Apple iOS and iPadOS | Buffer overflow | The vulnerability exists due to a boundary error in WebKit. A remote attacker can trick the victim to visit a specially crafted web page, trigger memory corruption and execute arbitrary code on the target system. |
| CVE-2023-32439 | Apple iOS and iPadOS | Type Confusion | The vulnerability exists due to a type confusion error in WebKit. A remote attacker can trick the victim to open a specially crafted web page, trigger a type confusion error and execute arbitrary code on the target system. |
| CVE-2023-32434 | Apple iOS and iPadOS | Integer overflow | The vulnerability exists due to an integer overflow within the OS kernel. A local application can trigger an integer overflow and execute arbitrary code with kernel privileges. |
Advertisements
| CVE ID | Product | Vulnerability Type | Vulnerability Description |
| CVE-2023-35674 | Google Android | Improper input validation | The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code. |
| CVE-2023-20963 | Google Android | Privilege Escalation | The vulnerability exists due to improperly imposed security restrictions in Android Framework. A local application can escalate privileges on the device. |
| CVE-2023-7024 | Google Chrome | Heap-based buffer overflow | The vulnerability exists due to a boundary error when processing untrusted HTML content in WebRTC. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger a heap-based buffer overflow and execute arbitrary code on the target system. |
| CVE-2023-6345 | Google Chrome | Integer overflow | The vulnerability exists due to integer overflow in Skia component in Google Chrome. A remote attacker can trick the victim to open a specially crafted web page, trigger an integer overflow and execute arbitrary code on the target system. |
| CVE-2023-5217 | Google Chrome | Heap-based buffer overflow | The vulnerability exists due to a boundary error when processing untrusted HTML content in vp8 encoding in libvpx. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger a heap-based buffer overflow and execute arbitrary code on the target system. |
| CVE-2023-4863 | Google Chrome | Heap-based buffer overflow | The vulnerability exists due to a boundary error when processing WebP images within libwebp library. A remote attacker can trick the victim to visit a malicious website, trigger a heap-based buffer overflow and execute arbitrary code on the target system. |
| CVE-2023-3079 | Google Chrome | Type Confusion | The vulnerability exists due to a type confusion error within the V8 engine in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger a type confusion error and execute arbitrary code on the target system. |
| CVE-2023-2136 | Google Chrome | Integer overflow | The vulnerability exists due to integer overflow in Skia component in Google Chrome. A remote attacker can trick the victim to open a specially crafted web page, trigger an integer overflow and execute arbitrary code on the target system. |
| CVE-2023-2033 | Google Chrome | Type Confusion | The vulnerability exists due to a type confusion error within the V8 engine in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger a type confusion error and execute arbitrary code on the target system. |
| CVE-2023-4762 | Google Chrome | Type Confusion | The vulnerability allowed a remote attacker to execute arbitrary code via a crafted HTML page. |
| CVE-2023-4211 | Google Pixel | Use-after-free | The vulnerability exists due to a use-after-free error within Mali GPU Kernel Driver. A local application can trigger memory corruption and execute arbitrary code with elevated privileges. |
| CVE-2023-21237 | Google Pixel | Information exposure | The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information. |
Others
| CVE/CWE ID | Product | Vulnerability Type | Vulnerability Description |
| CVE-2023-29059 | 3CX Electro | Backdoor | The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that allows a remote attacker to gain unauthorized access to the application. |
| CWE-78 | acme.sh | OS Command Injection | The vulnerability exists due to improper input validation when parsing certificates. A remote attacker can pass specially crafted data to the application and execute arbitrary OS commands on the target system. |
| CVE-2023-26369 | Adobe Acrobat | Out-of-bounds write | The vulnerability exists due to a boundary error when processing PDF. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system. |
| CVE-2023-38205 | Adobe ColdFusion | Improper access control | The vulnerability exists due to improper access restrictions. A remote non-authenticated attacker can bypass implemented security restrictions and gain unauthorized access to the application. |
| CVE-2023-26360 | Adobe ColdFusion | Improper access control | The vulnerability exists due to improper access restrictions. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application. |
| CVE-2023-26359 | Adobe ColdFusion | Deserialization of Untrusted Data | The vulnerability exists due to insecure input validation when processing serialized data. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system. |
| CVE-2023-26083 | ARM Mali GPU | Memory leak | The vulnerability exists due memory leak. A local application can force the driver to leak memory and gain access to sensitive information. |
| CVE-2023-22515 | Atlassian Confluence Data Center | Improper Authentication | The vulnerability exists due to missing authentication at the “/setup/setupadministrator.action” endpoint. A remote non-authenticated attacker can send specially crafted requests to the server to create an administrative account and gain unauthorized access to the system. |
| CVE-2023-2868 | Barracuda ESG | OS Command Injection | The vulnerability exists due to improper input validation when processing .tar archives during email attachment screening. A remote unauthenticated attacker can send a specially crafted email with a malicious attachment to the appliance and execute arbitrary Perl commands on the target system. |
| CVE-2023-20269 | Cisco Adaptive Security Appliance | Authentication bypass | The vulnerability exists due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. A remote user can perform a brute-force attack and establish a clientless SSL VPN session with an unauthorized user. |
| CVE-2023-20109 | Cisco IOS XE software | Out-of-bounds write | The vulnerability exists due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols within the Cisco Group Encrypted Transport VPN (GET VPN) feature. A remote authenticated user with administrative control of either a group member or a key server can trigger an out-of-bounds write and execute arbitrary code on the target system. |
| CVE-2023-20198 | Cisco IOS XE Web UI software | Improper Privilege Management | The vulnerability exists due to improper privilege management in the web UI feature. A remote non-authenticated attacker can send a specially crafted HTTP request to the affected device and create an account with privilege level 15 access. |
| CVE-2023-4966 | Citrix NetScaler ADC and NetScaler Gateway | Buffer overflow | The vulnerability exists due to a boundary error. A remote non-authenticated attacker can send specially crafted data to the device, trigger memory corruption and execute arbitrary code on the target system |
| CVE-2023-3519 | Citrix NetScaler ADC and NetScaler Gateway | Code Injection | The vulnerability exists due to improper input validation when the appliance is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server. A remote non-authenticated attacker can send a specially crafted request and execute arbitrary code on the target system. |
| CWE-506 | Embedded malicious code in Ledger Connect Kit | Backdoor | The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that allows a remote attacker to drain crypto assets from users’ wallets. |
| CWE-862 | Emby Server | Missing Authorization | The vulnerability exists due to insecure default configuration. A remote non-authenticated attacker can send a specially crafted request to the server and execute arbitrary code on the target system. |
| CVE-2022-41328 | FortiOS | Path traversal | The vulnerability exists due to input validation error when processing certain CLI command. A local user can read and write arbitrary files on the system. |
| CVE-2023-27997 | FortiOS and FortiProxy SSL-VPN | Heap-based buffer overflow | The vulnerability exists due to a boundary error within the SSL-VPN feature. A remote non-authenticated attacker can send specially crafted requests to the SSL-VPN interface, trigger a heap-based buffer overflow and execute arbitrary code on the target system. |
| CVE-2023-49897 | FXC routers AE1021 | OS Command Injection | The vulnerability exists due to improper input validation. A remote user on the local network can pass specially crafted data to the application and execute arbitrary OS commands on the target system. |
| CWE-284 | General Bytes Crypto Application Server (CAS) | Improper access control | The vulnerability exists due to improper access restrictions in the master service interface on port 7741/TCP. A remote attacker can send a specially crafted request to the affected server and execute arbitrary code on the system. |
| CWE-506 | Gigabyte UEFI firmware | Backdoor | The vulnerability exists due to presence of embedded malicious functionality (aka backdoor) in the UEFI firmware that was downloaded from the official website using the Gigabyte’s App Center. This allows a remote attacker to gain full control over the system. |
| CVE-2023-0669 | GoAnywhere MFT | Deserialization of Untrusted Data | The vulnerability exists due to insecure input validation when processing serialized data passed to the “/goanywhere/lic/accept” HTTP endpoint of the administrative web interface. A remote attacker can send a specially crafted HTTP request to the application and execute arbitrary code on the target system. |
| CVE-2023-35078 | Ivanti Endpoint Manage | Improper Authentication | The vulnerability exists due to an unspecified error in the authentication process. A remote attacker can bypass authentication and gain unauthorized access to the application. |
| CVE-2023-35081 | Ivanti Endpoint Manager | Path Traversal | The vulnerability exists due to input validation error when processing directory traversal sequences. A remote privileged user can send a specially crafted HTTP request and overwrite arbitrary files and compromise the affected system. |
| CVE-2023-0266 | Linux kernel | Use-after-free | The vulnerability exists due to a use-after-free error within the snd_ctl_elem_read() function in the Linux kernel sound subsystem. A local user can trigger a use-after-free error and execute arbitrary code on the system. |
| CVE-2023-45797 | MagicLine4NX | Buffer overflow | The vulnerability exists due to a boundary error. A remote attacker can trigger memory corruption and execute arbitrary code on the target system. |
| CVE-2023-38035 | MobileIron Sentry | Improper Authentication | The vulnerability exists due to missing authentication on certain APIs. A remote attacker can send a specially crafted HTTP request to port 8443/TCP, bypass authentication process and execute arbitrary code on the system. |
| CVE-2023-34362 | MOVEit Transfer | SQL injection | The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database. |
| CVE-2023-47565 | QNAP QVR Firmware | OS Command Injection | The vulnerability exists due to improper input validation within QNAP VioStor NVR models running QVR firmware. A remote user can pass specially crafted data to the application and execute arbitrary OS commands on the target system. |
| CVE-2023-33063 | Qualcomm firmware | Use-after-free | The vulnerability exists due to a use-after-free error during a remote call from HLOS to DSP. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges. |
| CVE-2023-33107 | Qualcomm firmware | Integer overflow | The vulnerability exists due to integer overflow while assigning shared virtual memory region during IOCTL call. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges. |
| CVE-2023-33106 | Qualcomm firmware | Use of Out-of-range Pointer Offset | The vulnerability exists due to a boundary error while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND. A local user can trigger memory corruption and execute arbitrary code with elevated privileges. |
| CVE-2023-3595 | Rockwell Automation | Out-of-bounds write | The vulnerability exists due to a boundary error when processing CIP messages. A remote attacker can send specially crafted CIP messages to ports 44818/TCP or 2222/UDP, trigger an out-of-bounds write and execute arbitrary code. |
| CVE-2023-5631 | Roundcube | Cross-site scripting | The vulnerability exists due to insufficient sanitization of user-supplied data when processing SVG files in program/lib/Roundcube/rcube_washtml.php. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user’s browser in context of vulnerable website. |
| CVE-2023-5360 | Royal Elementor Addons plugin for WordPress | Arbitrary file upload | The vulnerability exists due to insufficient validation of file during file upload. A remote attacker can upload a malicious file and execute it on the server. |
| CVE-2023-21492 | Samsung Mobile Firmware | Inclusion of sensitive information in log files | The vulnerability exists due to kernel pointers are printed into the log file. A local application can read the log file and use the kernel pointers to bypass ASLR protection. |
| CVE-2023-41763 | Skype for Business Server | Information disclosure | The vulnerability exists due to excessive data output by the application. A remote attacker can gain unauthorized access to IP addresses or port numbers or both to the attacker. |
| CWE-22 | Terrasoft CRM | Path traversal | The vulnerability exists due to input validation error when processing directory traversal sequences. A remote non-authenticated attacker can send a specially crafted HTTP request and read arbitrary files on the system. |
| CVE-2023-41179 | Trend Micro Apex One | OS Command Injection | The vulnerability exists due to improper input validation within the third-party AV uninstaller module shipped with the software. A local user can execute arbitrary commands with elevated privileges. |
| CVE-2023-3460 | Ultimate Member plugin | Improper Authorization | The vulnerability exists due to improper authorization within the registration functionality. A remote non-authenticated attacker can register a rouge administrative account and compromise the web application. |
| CVE-2023-6448 | Unitronics Vision Series PLCs and HMIs | Use of default credentials | The vulnerability exists due to Unitronics Vision Series PLCs and HMIs use default administrative passwords. A remote attacker with network access to a PLC or HMI can gain administrative control over the system. |
| CVE-2023-20867 | VMware Tools | Improper Authentication | The vulnerability exists due to an error in the vgauth module. An attacker who compromised the ESXi host can bypass authentication process and execute privileged commands across Windows, Linux, and PhotonOS (vCenter) guest VMs without authentication of guest credentials from a compromised ESXi host and no default logging on guest VMs. |
| CVE-2023-38831 | WinRaR | Input validation error | The vulnerability exists due to insufficient validation of file names inside .zip archives. A remote attacker can create a specially crafted archive that contains executable malicious files and spoof their file extension to look like .jpeg or .txt. |
| CVE-2023-37580 | Zimbra Collaboration Suite | Cross-site scripting | The vulnerability exists due to insufficient sanitization of user-supplied data in the Zimbra Classic Web Client. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user’s browser in context of vulnerable website. |
This brings end of this security coverage. Thanks for visiting TheCyberThrone. If you like us please follow us on Facebook, Twitter, Instagram


