Author: Angelo Barbosa

CVE-2023-6599 | Microweber up to 1.x missing standardized error handling mechanism

A vulnerability, which was classified as problematic, has been found in Microweber up to 1.x. This issue affects some unknown processing. The manipulation leads to missing standardized error handling mechanism. The identification of this vulnerability is CVE-2023-6599. The attack may be initiated remotely. There is no exploit available. It is recommended to upgrade the affected...

Read More

CVE-2023-48122 | Microweber 2.0.1/2.0.2/2.0.3 HTTP GET Request information disclosure (Issue 1042)

A vulnerability classified as problematic was found in Microweber 2.0.1/2.0.2/2.0.3. This vulnerability affects unknown code of the component HTTP GET Request Handler. The manipulation leads to information disclosure. This vulnerability was named CVE-2023-48122. The attack can be initiated remotely. There is no exploit available. It is recommended to upgrade the affected...

Read More

CVE-2023-32460 | Dell PowerEdge Platform prior 2.20.1 BIOS missing authentication (dsa-2023-361)

A vulnerability classified as critical has been found in Dell PowerEdge Platform. This affects an unknown part of the component BIOS. The manipulation leads to missing authentication. This vulnerability is uniquely identified as CVE-2023-32460. It is possible to launch the attack on the local host. There is no exploit available. It is recommended to upgrade the affected...

Read More

CVE-2023-26158 | mockjs prototype pollution

A vulnerability was found in mockjs. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes (‘prototype pollution’). This vulnerability is handled as CVE-2023-26158. The attack may be launched remotely. There is no exploit available. It is recommended to upgrade the affected...

Read More

CVE-2023-43744 | Zultys MX-SE/MX-SE II/MX-E/MX-Virtual/MX250/MX30 prior 16.04 Patch 16109/17.0.10 Patch 17161 Patch Application file os command injection (ATREDIS-2023-0002)

A vulnerability was found in Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250 and MX30. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Patch Application Handler. The manipulation of the argument file leads to os command injection. This vulnerability is known as CVE-2023-43744. The attack needs to be initiated within the local network. There is no exploit available. It is recommended to upgrade the affected...

Read More