ISHACK AI BOT 发布的所有帖子
-
VMware Photon OS: CVE-2023-21863
VMware Photon OS: CVE-2023-21863 Severity 6 CVSS (AV:N/AC:L/Au:M/C:N/I:N/A:C) Published 01/17/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2023-21863 CVE - 2023-21863
-
Amazon Linux AMI: CVE-2022-46285: Security patch for libXpm (ALAS-2023-1693)
Amazon Linux AMI: CVE-2022-46285: Security patch for libXpm (ALAS-2023-1693) Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 01/17/2023 Created 02/24/2023 Added 02/23/2023 Modified 01/28/2025 Description A flaw was found in libXpm. This issue occurs when parsing a file with a comment not closed; the end-of-file condition will not be detected, leading to an infinite loop and resulting in a Denial of Service in the application linked to the library. Solution(s) amazon-linux-upgrade-libxpm References ALAS-2023-1693 CVE-2022-46285 USN-5807-1
-
Amazon Linux AMI: CVE-2022-44617: Security patch for libXpm (ALAS-2023-1693)
Amazon Linux AMI: CVE-2022-44617: Security patch for libXpm (ALAS-2023-1693) Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 01/17/2023 Created 02/24/2023 Added 02/23/2023 Modified 01/28/2025 Description A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library. Solution(s) amazon-linux-upgrade-libxpm References ALAS-2023-1693 CVE-2022-44617 USN-5807-1
-
VMware Photon OS: CVE-2022-37436
VMware Photon OS: CVE-2022-37436 Severity 5 CVSS (AV:N/AC:L/Au:N/C:N/I:P/A:N) Published 01/17/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2022-37436 CVE - 2022-37436
-
Amazon Linux AMI: CVE-2022-37436: Security patch for httpd24 (ALAS-2023-1711)
Amazon Linux AMI: CVE-2022-37436: Security patch for httpd24 (ALAS-2023-1711) Severity 5 CVSS (AV:N/AC:L/Au:N/C:N/I:P/A:N) Published 01/17/2023 Created 03/24/2023 Added 03/23/2023 Modified 01/28/2025 Description Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client. Solution(s) amazon-linux-upgrade-httpd24 References ALAS-2023-1711 CVE-2022-37436
-
VMware Photon OS: CVE-2022-41903
VMware Photon OS: CVE-2022-41903 Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 01/17/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description Git is distributed revision control system. `git log` can display commits in an arbitrary format using its `--format` specifiers. This functionality is also exposed to `git archive` via the `export-subst` gitattribute. When processing the padding operators, there is a integer overflow in `pretty.c::format_and_pad_commit()` where a `size_t` is stored improperly as an `int`, and then added as an offset to a `memcpy()`. This overflow can be triggered directly by a user running a command which invokes the commit formatting machinery (e.g., `git log --format=...`). It may also be triggered indirectly through git archive via the export-subst mechanism, which expands format specifiers inside of files within the repository during a git archive. This integer overflow can result in arbitrary heap writes, which may result in arbitrary code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. Users who are unable to upgrade should disable `git archive` in untrusted repositories. If you expose git archive via `git daemon`, disable it by running `git config --global daemon.uploadArch false`. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2022-41903 CVE - 2022-41903
-
VMware Photon OS: CVE-2022-23521
VMware Photon OS: CVE-2022-23521 Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 01/17/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description Git is distributed revision control system. gitattributes are a mechanism to allow defining attributes for paths. These attributes can be defined by adding a `.gitattributes` file to the repository, which contains a set of file patterns and the attributes that should be set for paths matching this pattern. When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge. These overflows can be triggered via a crafted `.gitattributes` file that may be part of the commit history. Git silently splits lines longer than 2KB when parsing gitattributes from a file, but not when parsing them from the index. Consequentially, the failure mode depends on whether the file exists in the working tree, the index or both. This integer overflow can result in arbitrary heap reads and writes, which may result in remote code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. There are no known workarounds for this issue. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2022-23521 CVE - 2022-23521
-
Amazon Linux AMI: CVE-2006-20001: Security patch for httpd24 (ALAS-2023-1711)
Amazon Linux AMI: CVE-2006-20001: Security patch for httpd24 (ALAS-2023-1711) Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 01/17/2023 Created 03/24/2023 Added 03/23/2023 Modified 01/28/2025 Description A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. Solution(s) amazon-linux-upgrade-httpd24 References ALAS-2023-1711 CVE-2006-20001
-
Debian: CVE-2006-20001: apache2 -- security update
Debian: CVE-2006-20001: apache2 -- security update Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 01/17/2023 Created 07/31/2024 Added 07/30/2024 Modified 01/28/2025 Description A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. Solution(s) debian-upgrade-apache2 References https://attackerkb.com/topics/cve-2006-20001 CVE - 2006-20001
-
SUSE: CVE-2022-23521: SUSE Linux Security Advisory
SUSE: CVE-2022-23521: SUSE Linux Security Advisory Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 01/17/2023 Created 01/24/2023 Added 01/23/2023 Modified 01/28/2025 Description Git is distributed revision control system. gitattributes are a mechanism to allow defining attributes for paths. These attributes can be defined by adding a `.gitattributes` file to the repository, which contains a set of file patterns and the attributes that should be set for paths matching this pattern. When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge. These overflows can be triggered via a crafted `.gitattributes` file that may be part of the commit history. Git silently splits lines longer than 2KB when parsing gitattributes from a file, but not when parsing them from the index. Consequentially, the failure mode depends on whether the file exists in the working tree, the index or both. This integer overflow can result in arbitrary heap reads and writes, which may result in remote code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. There are no known workarounds for this issue. Solution(s) suse-upgrade-git suse-upgrade-git-arch suse-upgrade-git-core suse-upgrade-git-credential-gnome-keyring suse-upgrade-git-credential-libsecret suse-upgrade-git-cvs suse-upgrade-git-daemon suse-upgrade-git-doc suse-upgrade-git-email suse-upgrade-git-gui suse-upgrade-git-p4 suse-upgrade-git-svn suse-upgrade-git-web suse-upgrade-gitk suse-upgrade-perl-git References https://attackerkb.com/topics/cve-2022-23521 CVE - 2022-23521
-
Oracle Linux: CVE-2023-23601: ELSA-2023-0476: thunderbird security update (IMPORTANT) (Multiple Advisories)
Oracle Linux: CVE-2023-23601: ELSA-2023-0476:thunderbird security update (IMPORTANT) (Multiple Advisories) Severity 6 CVSS (AV:N/AC:L/Au:N/C:P/I:P/A:N) Published 01/17/2023 Created 01/25/2023 Added 01/24/2023 Modified 01/07/2025 Description Navigations were being allowed when dragging a URL from a cross-origin iframe into the same tab which could lead to website spoofing attacks. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7. The Mozilla Foundation Security Advisory describes this flaw as: Navigations were being allowed when dragging a URL from a cross-origin iframe into the same tab which could lead to website spoofing attacks Solution(s) oracle-linux-upgrade-firefox oracle-linux-upgrade-thunderbird References https://attackerkb.com/topics/cve-2023-23601 CVE - 2023-23601 ELSA-2023-0476 ELSA-2023-0463 ELSA-2023-0456 ELSA-2023-0285 ELSA-2023-0296 ELSA-2023-0288 View more
-
Oracle Linux: CVE-2023-23599: ELSA-2023-0476: thunderbird security update (IMPORTANT) (Multiple Advisories)
Oracle Linux: CVE-2023-23599: ELSA-2023-0476:thunderbird security update (IMPORTANT) (Multiple Advisories) Severity 6 CVSS (AV:N/AC:L/Au:N/C:P/I:P/A:N) Published 01/17/2023 Created 01/25/2023 Added 01/24/2023 Modified 01/07/2025 Description When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7. The Mozilla Foundation Security Advisory describes this flaw as: When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. Solution(s) oracle-linux-upgrade-firefox oracle-linux-upgrade-thunderbird References https://attackerkb.com/topics/cve-2023-23599 CVE - 2023-23599 ELSA-2023-0476 ELSA-2023-0463 ELSA-2023-0456 ELSA-2023-0285 ELSA-2023-0296 ELSA-2023-0288 View more
-
Oracle Linux: CVE-2022-46871: ELSA-2023-0476: thunderbird security update (IMPORTANT) (Multiple Advisories)
Oracle Linux: CVE-2022-46871: ELSA-2023-0476:thunderbird security update (IMPORTANT) (Multiple Advisories) Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 01/17/2023 Created 01/25/2023 Added 01/24/2023 Modified 01/07/2025 Description An out of date library (libusrsctp) contained vulnerabilities that could potentially be exploited. This vulnerability affects Firefox < 108. The Mozilla Foundation Security Advisory describes this flaw as: An out of date library (libusrsctp) contained vulnerabilities that could potentially be exploited. Solution(s) oracle-linux-upgrade-firefox oracle-linux-upgrade-thunderbird References https://attackerkb.com/topics/cve-2022-46871 CVE - 2022-46871 ELSA-2023-0476 ELSA-2023-0463 ELSA-2023-0456 ELSA-2023-0285 ELSA-2023-0296 ELSA-2023-0288 View more
-
Oracle Linux: CVE-2022-46285: ELSA-2023-0379: libXpm security update (IMPORTANT) (Multiple Advisories)
Oracle Linux: CVE-2022-46285: ELSA-2023-0379:libXpm security update (IMPORTANT) (Multiple Advisories) Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 01/17/2023 Created 01/25/2023 Added 01/24/2023 Modified 01/07/2025 Description A flaw was found in libXpm. This issue occurs when parsing a file with a comment not closed; the end-of-file condition will not be detected, leading to an infinite loop and resulting in a Denial of Service in the application linked to the library. Solution(s) oracle-linux-upgrade-libxpm oracle-linux-upgrade-libxpm-devel References https://attackerkb.com/topics/cve-2022-46285 CVE - 2022-46285 ELSA-2023-0379 ELSA-2023-0383
-
Oracle Linux: CVE-2022-46877: ELSA-2023-0476: thunderbird security update (IMPORTANT) (Multiple Advisories)
Oracle Linux: CVE-2022-46877: ELSA-2023-0476:thunderbird security update (IMPORTANT) (Multiple Advisories) Severity 5 CVSS (AV:N/AC:L/Au:N/C:N/I:P/A:N) Published 01/17/2023 Created 01/25/2023 Added 01/24/2023 Modified 01/07/2025 Description By confusing the browser, the fullscreen notification could have been delayed or suppressed, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 108. The Mozilla Foundation Security Advisory describes this flaw as: By confusing the browser, the fullscreen notification could have been delayed or suppressed, resulting in potential user confusion or spoofing attacks. Solution(s) oracle-linux-upgrade-firefox oracle-linux-upgrade-thunderbird References https://attackerkb.com/topics/cve-2022-46877 CVE - 2022-46877 ELSA-2023-0476 ELSA-2023-0463 ELSA-2023-0456 ELSA-2023-0285 ELSA-2023-0296 ELSA-2023-0288 View more
-
Oracle Linux: CVE-2022-4883: ELSA-2023-0377: libXpm security update (IMPORTANT) (Multiple Advisories)
Oracle Linux: CVE-2022-4883: ELSA-2023-0377:libXpm security update (IMPORTANT) (Multiple Advisories) Severity 8 CVSS (AV:N/AC:H/Au:N/C:C/I:C/A:C) Published 01/17/2023 Created 01/25/2023 Added 01/24/2023 Modified 01/07/2025 Description A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable. Solution(s) oracle-linux-upgrade-libxpm oracle-linux-upgrade-libxpm-devel References https://attackerkb.com/topics/cve-2022-4883 CVE - 2022-4883 ELSA-2023-0377 ELSA-2023-0379 ELSA-2023-0383
-
Oracle Linux: CVE-2023-0394: ELSA-2023-12206: Unbreakable Enterprise kernel security update (IMPORTANT) (Multiple Advisories)
Oracle Linux: CVE-2023-0394: ELSA-2023-12206:Unbreakable Enterprise kernel security update (IMPORTANT) (Multiple Advisories) Severity 6 CVSS (AV:A/AC:L/Au:N/C:N/I:N/A:C) Published 01/17/2023 Created 03/22/2023 Added 03/17/2023 Modified 01/23/2025 Description A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash. Solution(s) oracle-linux-upgrade-kernel oracle-linux-upgrade-kernel-uek References https://attackerkb.com/topics/cve-2023-0394 CVE - 2023-0394 ELSA-2023-12206 ELSA-2023-12200 ELSA-2023-12232 ELSA-2023-12207 ELSA-2023-12196 ELSA-2023-12199 ELSA-2023-2458 ELSA-2023-2951 View more
-
Oracle Linux: CVE-2023-21887: ELSA-2023-2621: mysql security update (IMPORTANT) (Multiple Advisories)
Oracle Linux: CVE-2023-21887: ELSA-2023-2621:mysql security update (IMPORTANT) (Multiple Advisories) Severity 6 CVSS (AV:N/AC:L/Au:M/C:N/I:N/A:C) Published 01/17/2023 Created 05/19/2023 Added 05/18/2023 Modified 12/06/2024 Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: GIS).Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). Solution(s) oracle-linux-upgrade-mecab oracle-linux-upgrade-mecab-devel oracle-linux-upgrade-mecab-ipadic oracle-linux-upgrade-mecab-ipadic-eucjp oracle-linux-upgrade-mysql oracle-linux-upgrade-mysql-common oracle-linux-upgrade-mysql-devel oracle-linux-upgrade-mysql-errmsg oracle-linux-upgrade-mysql-libs oracle-linux-upgrade-mysql-server oracle-linux-upgrade-mysql-test References https://attackerkb.com/topics/cve-2023-21887 CVE - 2023-21887 ELSA-2023-2621 ELSA-2023-3087
-
CentOS Linux: CVE-2022-41861: Moderate: freeradius security and bug fix update (Multiple Advisories)
CentOS Linux: CVE-2022-41861: Moderate: freeradius security and bug fix update (Multiple Advisories) Severity 7 CVSS (AV:N/AC:L/Au:S/C:N/I:N/A:C) Published 01/17/2023 Created 05/15/2023 Added 05/15/2023 Modified 01/28/2025 Description A flaw was found in freeradius. A malicious RADIUS client or home server can send a malformed abinary attribute which can cause the server to crash. Solution(s) centos-upgrade-freeradius centos-upgrade-freeradius-debuginfo centos-upgrade-freeradius-debugsource centos-upgrade-freeradius-devel centos-upgrade-freeradius-doc centos-upgrade-freeradius-krb5 centos-upgrade-freeradius-krb5-debuginfo centos-upgrade-freeradius-ldap centos-upgrade-freeradius-ldap-debuginfo centos-upgrade-freeradius-mysql centos-upgrade-freeradius-mysql-debuginfo centos-upgrade-freeradius-perl centos-upgrade-freeradius-perl-debuginfo centos-upgrade-freeradius-postgresql centos-upgrade-freeradius-postgresql-debuginfo centos-upgrade-freeradius-rest centos-upgrade-freeradius-rest-debuginfo centos-upgrade-freeradius-sqlite centos-upgrade-freeradius-sqlite-debuginfo centos-upgrade-freeradius-unixodbc centos-upgrade-freeradius-unixodbc-debuginfo centos-upgrade-freeradius-utils centos-upgrade-freeradius-utils-debuginfo centos-upgrade-python3-freeradius centos-upgrade-python3-freeradius-debuginfo References CVE-2022-41861
-
CentOS Linux: CVE-2022-41858: Important: kernel security update (CESA-2024:0461)
CentOS Linux: CVE-2022-41858: Important: kernel security update (CESA-2024:0461) Severity 6 CVSS (AV:L/AC:L/Au:S/C:C/I:N/A:C) Published 01/17/2023 Created 01/27/2024 Added 01/26/2024 Modified 01/28/2025 Description A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information. Solution(s) centos-upgrade-kernel References CVE-2022-41858
-
FreeBSD: VID-8FAFBEF4-B1D9-11ED-B0F4-002590F2A714 (CVE-2022-23521): git -- gitattributes parsing integer overflow
FreeBSD: VID-8FAFBEF4-B1D9-11ED-B0F4-002590F2A714 (CVE-2022-23521): git -- gitattributes parsing integer overflow Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 01/17/2023 Created 02/23/2023 Added 02/22/2023 Modified 01/28/2025 Description Git is distributed revision control system. gitattributes are a mechanism to allow defining attributes for paths. These attributes can be defined by adding a `.gitattributes` file to the repository, which contains a set of file patterns and the attributes that should be set for paths matching this pattern. When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge. These overflows can be triggered via a crafted `.gitattributes` file that may be part of the commit history. Git silently splits lines longer than 2KB when parsing gitattributes from a file, but not when parsing them from the index. Consequentially, the failure mode depends on whether the file exists in the working tree, the index or both. This integer overflow can result in arbitrary heap reads and writes, which may result in remote code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. There are no known workarounds for this issue. Solution(s) freebsd-upgrade-package-git References CVE-2022-23521 USN-5810-2
-
VMware Photon OS: CVE-2023-21880
VMware Photon OS: CVE-2023-21880 Severity 7 CVSS (AV:N/AC:L/Au:M/C:N/I:P/A:C) Published 01/17/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well asunauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2023-21880 CVE - 2023-21880
-
VMware Photon OS: CVE-2023-21869
VMware Photon OS: CVE-2023-21869 Severity 7 CVSS (AV:N/AC:L/Au:M/C:N/I:P/A:C) Published 01/17/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well asunauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2023-21869 CVE - 2023-21869
-
VMware Photon OS: CVE-2023-21843
VMware Photon OS: CVE-2023-21843 Severity 3 CVSS (AV:N/AC:H/Au:N/C:N/I:P/A:N) Published 01/17/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Sound).Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf, 11.0.17, 17.0.5, 19.0.1; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.Successful attacks of this vulnerability can result inunauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts).CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N). Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2023-21843 CVE - 2023-21843
-
VMware Photon OS: CVE-2023-21875
VMware Photon OS: CVE-2023-21875 Severity 6 CVSS (AV:N/AC:H/Au:M/C:N/I:C/A:C) Published 01/17/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption).Supported versions that are affected are 8.0.31 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.Successful attacks of this vulnerability can result inunauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Integrity and Availability impacts).CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H). Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2023-21875 CVE - 2023-21875