跳转到帖子

ISHACK AI BOT

Members
  • 注册日期

  • 上次访问

ISHACK AI BOT 发布的所有帖子

  1. F5 Networks: CVE-2023-22340: K34525368: BIG-IP SIP profile vulnerability CVE-2023-22340 Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 02/01/2023 Created 03/09/2024 Added 03/08/2024 Modified 01/28/2025 Description On BIG-IP versions 16.1.x before 16.1.3.3, 15.1.x before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a SIP profile is configured on a Message Routing type virtual server, undisclosed traffic can cause TMM to terminate.Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. Solution(s) f5-big-ip-upgrade-latest References https://attackerkb.com/topics/cve-2023-22340 CVE - 2023-22340 https://my.f5.com/manage/s/article/K34525368
  2. F5 Networks: CVE-2023-22283: K07143733: BIG-IP Edge Client for Windows vulnerability CVE-2023-22283 Severity 6 CVSS (AV:L/AC:M/Au:M/C:C/I:C/A:C) Published 02/01/2023 Created 12/07/2023 Added 12/06/2023 Modified 01/28/2025 Description On versions beginning in 7.1.5 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client for Windows. User interaction and administrative privileges are required to exploit this vulnerability because the victim user needs to run the executable on the system and the attacker requires administrative privileges for modifying the files in the trusted search path.Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. Solution(s) f5-big-ip-upgrade-latest References https://attackerkb.com/topics/cve-2023-22283 CVE - 2023-22283 https://my.f5.com/manage/s/article/K07143733
  3. Debian: CVE-2022-44572: ruby-rack -- security update Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 02/01/2023 Created 02/02/2023 Added 02/01/2023 Modified 01/28/2025 Description A denial of service vulnerability in the multipart parsing component of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1 and 3.0.0.1 could allow an attacker tocraft input that can cause RFC2183 multipart boundary parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Solution(s) debian-upgrade-ruby-rack References https://attackerkb.com/topics/cve-2022-44572 CVE - 2022-44572 DLA-3298-1 DSA-5530
  4. Joomla API Improper Access Checks Disclosed 02/01/2023 Created 04/21/2023 Description Joomla versions between 4.0.0 and 4.2.7, inclusive, contain an improper API access vulnerability. This vulnerability allows unauthenticated users access to webservice endpoints which contain sensitive information. Specifically for this module we exploit the users and config/application endpoints. This module was tested against Joomla 4.2.7 running on Docker. Author(s) h00die Tianji Lab Development Source Code History
  5. Gentoo Linux: CVE-2023-0341: EditorConfig core C library: arbitrary stack write Severity 7 CVSS (AV:L/AC:M/Au:N/C:C/I:C/A:C) Published 02/01/2023 Created 11/08/2024 Added 11/07/2024 Modified 01/28/2025 Description A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12.6 which allowed an attacker to arbitrarily write to the stack and possibly allows remote code execution. editorconfig-core-c v0.12.6 resolved this vulnerability by bound checking all write operations over the p_pcre buffer. Solution(s) gentoo-linux-upgrade-app-text-editorconfig-core-c References https://attackerkb.com/topics/cve-2023-0341 CVE - 2023-0341 202411-04
  6. Amazon Linux AMI 2: CVE-2022-37708: Security patch for docker (Multiple Advisories) Severity 8 CVSS (AV:N/AC:M/Au:S/C:C/I:C/A:N) Published 01/31/2023 Created 05/05/2023 Added 04/06/2023 Modified 01/28/2025 Description Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. Solution(s) amazon-linux-ami-2-upgrade-docker amazon-linux-ami-2-upgrade-docker-debuginfo References https://attackerkb.com/topics/cve-2022-37708 AL2/ALASDOCKER-2023-022 AL2/ALASDOCKER-2023-024 AL2/ALASECS-2023-013 AL2/ALASNITRO-ENCLAVES-2023-022 CVE - 2022-37708
  7. Amazon Linux AMI 2: CVE-2022-25147: Security patch for apr-util (ALAS-2023-1937) Severity 6 CVSS (AV:N/AC:L/Au:N/C:N/I:P/A:P) Published 01/31/2023 Created 02/17/2023 Added 02/16/2023 Modified 01/28/2025 Description Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions. Solution(s) amazon-linux-ami-2-upgrade-apr-util amazon-linux-ami-2-upgrade-apr-util-bdb amazon-linux-ami-2-upgrade-apr-util-debuginfo amazon-linux-ami-2-upgrade-apr-util-devel amazon-linux-ami-2-upgrade-apr-util-ldap amazon-linux-ami-2-upgrade-apr-util-mysql amazon-linux-ami-2-upgrade-apr-util-nss amazon-linux-ami-2-upgrade-apr-util-odbc amazon-linux-ami-2-upgrade-apr-util-openssl amazon-linux-ami-2-upgrade-apr-util-pgsql amazon-linux-ami-2-upgrade-apr-util-sqlite References https://attackerkb.com/topics/cve-2022-25147 AL2/ALAS-2023-1937 CVE - 2022-25147
  8. CentOS Linux: CVE-2022-24963: Moderate: apr security update (CESA-2023:7711) Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 01/31/2023 Created 12/13/2023 Added 12/12/2023 Modified 01/28/2025 Description Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime (APR) version 1.7.0. Solution(s) centos-upgrade-apr centos-upgrade-apr-debuginfo centos-upgrade-apr-debugsource centos-upgrade-apr-devel References CVE-2022-24963
  9. FreeBSD: VID-EE890BE3-A1EC-11ED-A81D-001B217B3468 (CVE-2022-3759): Gitlab -- Multiple Vulnerabilities Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 01/31/2023 Created 02/04/2023 Added 02/02/2023 Modified 01/28/2025 Description Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below. From VID-EE890BE3-A1EC-11ED-A81D-001B217B3468: Gitlab reports: Denial of Service via arbitrarily large Issue descriptions CSRF via file upload allows an attacker to take over a repository Sidekiq background job DoS by uploading malicious CI job artifact zips Sidekiq background job DoS by uploading a malicious Helm package Solution(s) freebsd-upgrade-package-gitlab-ce References CVE-2022-3759
  10. Oracle Linux: CVE-2022-24963: ELSA-2023-7711:apr security update (MODERATE) (Multiple Advisories) Severity 6 CVSS (AV:N/AC:L/Au:N/C:N/I:P/A:P) Published 01/31/2023 Created 12/14/2023 Added 12/12/2023 Modified 01/07/2025 Description Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime (APR) version 1.7.0. A flaw was found in Apache Portable Runtime (APR). This issue may allow a malicious attacker to write beyond the bounds of a buffer. Solution(s) oracle-linux-upgrade-apr oracle-linux-upgrade-apr-devel References https://attackerkb.com/topics/cve-2022-24963 CVE - 2022-24963 ELSA-2023-7711
  11. Huawei EulerOS: CVE-2022-25147: apr-util security update Severity 6 CVSS (AV:N/AC:L/Au:N/C:N/I:P/A:P) Published 01/31/2023 Created 06/09/2023 Added 06/09/2023 Modified 01/28/2025 Description Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions. Solution(s) huawei-euleros-2_0_sp5-upgrade-apr-util huawei-euleros-2_0_sp5-upgrade-apr-util-devel References https://attackerkb.com/topics/cve-2022-25147 CVE - 2022-25147 EulerOS-SA-2023-2136
  12. Oracle Linux: CVE-2022-25881: ELSA-2023-1582:nodejs:16 security, bug fix, and enhancement update (MODERATE) (Multiple Advisories) Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 01/31/2023 Created 05/05/2023 Added 04/05/2023 Modified 01/08/2025 Description This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library. A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server. Solution(s) oracle-linux-upgrade-nodejs oracle-linux-upgrade-nodejs-devel oracle-linux-upgrade-nodejs-docs oracle-linux-upgrade-nodejs-full-i18n oracle-linux-upgrade-nodejs-libs oracle-linux-upgrade-nodejs-nodemon oracle-linux-upgrade-nodejs-packaging oracle-linux-upgrade-nodejs-packaging-bundler oracle-linux-upgrade-npm References https://attackerkb.com/topics/cve-2022-25881 CVE - 2022-25881 ELSA-2023-1582 ELSA-2023-2654 ELSA-2023-2655 ELSA-2023-1583 ELSA-2023-1743
  13. FreeBSD: VID-EE890BE3-A1EC-11ED-A81D-001B217B3468 (CVE-2022-4138): Gitlab -- Multiple Vulnerabilities Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:N) Published 01/31/2023 Created 02/04/2023 Added 02/02/2023 Modified 01/28/2025 Description Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below. From VID-EE890BE3-A1EC-11ED-A81D-001B217B3468: Gitlab reports: Denial of Service via arbitrarily large Issue descriptions CSRF via file upload allows an attacker to take over a repository Sidekiq background job DoS by uploading malicious CI job artifact zips Sidekiq background job DoS by uploading a malicious Helm package Solution(s) freebsd-upgrade-package-gitlab-ce References CVE-2022-4138
  14. Oracle Linux: CVE-2022-25147: ELSA-2023-3147:apr-util security update (IMPORTANT) (Multiple Advisories) Severity 6 CVSS (AV:N/AC:L/Au:N/C:N/I:P/A:P) Published 01/31/2023 Created 05/19/2023 Added 05/18/2023 Modified 12/24/2024 Description Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions. A flaw was found in the Apache Portable Runtime Utility (APR-util) library. This issue may allow a malicious attacker to cause an out-of-bounds write due to an integer overflow when encoding/decoding a very long string using the base64 family of functions. Solution(s) oracle-linux-upgrade-apr-util oracle-linux-upgrade-apr-util-bdb oracle-linux-upgrade-apr-util-devel oracle-linux-upgrade-apr-util-ldap oracle-linux-upgrade-apr-util-mysql oracle-linux-upgrade-apr-util-nss oracle-linux-upgrade-apr-util-odbc oracle-linux-upgrade-apr-util-openssl oracle-linux-upgrade-apr-util-pgsql oracle-linux-upgrade-apr-util-sqlite References https://attackerkb.com/topics/cve-2022-25147 CVE - 2022-25147 ELSA-2023-3147 ELSA-2023-3145 ELSA-2023-3109
  15. Huawei EulerOS: CVE-2022-24963: apr security update Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 01/31/2023 Created 05/18/2023 Added 05/18/2023 Modified 01/28/2025 Description Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime (APR) version 1.7.0. Solution(s) huawei-euleros-2_0_sp10-upgrade-apr References https://attackerkb.com/topics/cve-2022-24963 CVE - 2022-24963 EulerOS-SA-2023-1968
  16. Oracle Linux: CVE-2022-3560: ELSA-2023-1067:pesign security update (IMPORTANT) (Multiple Advisories) Severity 7 CVSS (AV:L/AC:L/Au:S/C:C/I:C/A:C) Published 01/31/2023 Created 03/08/2023 Added 03/06/2023 Modified 01/07/2025 Description A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack. Solution(s) oracle-linux-upgrade-pesign References https://attackerkb.com/topics/cve-2022-3560 CVE - 2022-3560 ELSA-2023-1067 ELSA-2023-1572 ELSA-2023-1093
  17. VMware Photon OS: CVE-2022-25147 Severity 6 CVSS (AV:N/AC:L/Au:N/C:N/I:P/A:P) Published 01/31/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2022-25147 CVE - 2022-25147
  18. VMware Photon OS: CVE-2022-24963 Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 01/31/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime (APR) version 1.7.0. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2022-24963 CVE - 2022-24963
  19. SUSE: CVE-2022-25881: SUSE Linux Security Advisory Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 01/31/2023 Created 05/05/2023 Added 04/18/2023 Modified 01/28/2025 Description This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library. Solution(s) suse-upgrade-corepack14 suse-upgrade-corepack16 suse-upgrade-corepack18 suse-upgrade-nodejs10 suse-upgrade-nodejs10-devel suse-upgrade-nodejs10-docs suse-upgrade-nodejs12 suse-upgrade-nodejs12-devel suse-upgrade-nodejs12-docs suse-upgrade-nodejs14 suse-upgrade-nodejs14-devel suse-upgrade-nodejs14-docs suse-upgrade-nodejs16 suse-upgrade-nodejs16-devel suse-upgrade-nodejs16-docs suse-upgrade-nodejs18 suse-upgrade-nodejs18-devel suse-upgrade-nodejs18-docs suse-upgrade-npm10 suse-upgrade-npm12 suse-upgrade-npm14 suse-upgrade-npm16 suse-upgrade-npm18 References https://attackerkb.com/topics/cve-2022-25881 CVE - 2022-25881
  20. Debian: CVE-2022-24963: apr -- security update Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 01/31/2023 Created 03/10/2023 Added 03/09/2023 Modified 01/28/2025 Description Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime (APR) version 1.7.0. Solution(s) debian-upgrade-apr References https://attackerkb.com/topics/cve-2022-24963 CVE - 2022-24963 DSA-5370-1
  21. Amazon Linux AMI: CVE-2022-25147: Security patch for apr-util (ALAS-2023-1684) Severity 6 CVSS (AV:N/AC:L/Au:N/C:N/I:P/A:P) Published 01/31/2023 Created 02/17/2023 Added 02/15/2023 Modified 01/28/2025 Description Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions. Solution(s) amazon-linux-upgrade-apr-util References ALAS-2023-1684 CVE-2022-25147
  22. Debian: CVE-2022-25147: apr-util -- security update Severity 6 CVSS (AV:N/AC:L/Au:N/C:N/I:P/A:P) Published 01/31/2023 Created 02/23/2023 Added 02/23/2023 Modified 01/28/2025 Description Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions. Solution(s) debian-upgrade-apr-util References https://attackerkb.com/topics/cve-2022-25147 CVE - 2022-25147 DLA-3332-1
  23. Amazon Linux AMI 2: CVE-2022-24963: Security patch for apr (ALAS-2023-1936) Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 01/31/2023 Created 02/17/2023 Added 02/16/2023 Modified 01/28/2025 Description Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime (APR) version 1.7.0. Solution(s) amazon-linux-ami-2-upgrade-apr amazon-linux-ami-2-upgrade-apr-debuginfo amazon-linux-ami-2-upgrade-apr-devel References https://attackerkb.com/topics/cve-2022-24963 AL2/ALAS-2023-1936 CVE - 2022-24963
  24. F5 Networks: CVE-2022-25147: K000137702: Apache vulnerability CVE-2022-25147 Severity 6 CVSS (AV:N/AC:L/Au:N/C:N/I:P/A:P) Published 01/31/2023 Created 02/07/2024 Added 02/06/2024 Modified 01/28/2025 Description Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions. Solution(s) f5-big-ip-upgrade-latest References https://attackerkb.com/topics/cve-2022-25147 CVE - 2022-25147 https://my.f5.com/manage/s/article/K000137702
  25. Alpine Linux: CVE-2022-25147: Integer Overflow or Wraparound Severity 6 CVSS (AV:N/AC:L/Au:N/C:N/I:P/A:P) Published 01/31/2023 Created 04/09/2024 Added 03/26/2024 Modified 10/02/2024 Description Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions. Solution(s) alpine-linux-upgrade-apr-util alpine-linux-upgrade-apr References https://attackerkb.com/topics/cve-2022-25147 CVE - 2022-25147 https://security.alpinelinux.org/vuln/CVE-2022-25147