Skip to content
iPRESIDIUM
Security Without Compromise
  • Home
  • Cyber Security Services
    • Incident Response
    • Penetration Testing
    • Security Training
    • Secure Code Review
  • Cyber Security Solutions
    • Deception Technology
    • Threat Protection
    • Information Protection
    • Risk Analytics
  • Managed Security Services
    • NextGen Anti-Virus
    • Anti-Ransomware
    • Log Management
    • Threat Hunting as a Service (THaaS)
  • Resources
    • Datasheets & Tech Notes
    • Case Studies & White Papers
    • Blog
    • Video and Podcasts
    • News
  • Contact Us
Menu
  • Home
  • Cyber Security Services
    • Incident Response
    • Penetration Testing
    • Security Training
    • Secure Code Review
  • Cyber Security Solutions
    • Deception Technology
    • Threat Protection
    • Information Protection
    • Risk Analytics
  • Managed Security Services
    • NextGen Anti-Virus
    • Anti-Ransomware
    • Log Management
    • Threat Hunting as a Service (THaaS)
  • Resources
    • Datasheets & Tech Notes
    • Case Studies & White Papers
    • Blog
    • Video and Podcasts
    • News
  • Contact Us

Blog

RSS VUNERABILITIES
  • CVE-2023-3057 June 2, 2023
    A vulnerability was found in YFCMF up to 3.0.4. It has been rated as problematic. This issue affects some unknown processing of the file app/admin/controller/Ajax.php. The manipulation of the argument controllername leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The […]
  • CVE-2023-3058 June 2, 2023
    A vulnerability was found in 07FLY CRM up to 1.2.0. It has been declared as problematic. This vulnerability affects unknown code of the component User Profile Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of […]
  • CVE-2023-3059 June 2, 2023
    A vulnerability, which was classified as critical, was found in SourceCodester Online Exam Form Submission 1.0. This affects an unknown part of the file /admin/update_s6.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. […]
  • CVE-2023-3031 June 2, 2023
    Improper Limitation of a Pathname leads to a Path Traversal vulnerability in the module King-Avis for Prestashop, allowing a user knowing the download token to read arbitrary local files.This issue affects King-Avis: before 17.3.15.
  • CVE-2023-3032 June 2, 2023
    Unrestricted Upload of File with Dangerous Type vulnerability in Mobatime web application (Documentary proof upload modules) allows a malicious user to Upload a Web Shell to a Web Server.This issue affects Mobatime web application: through 06.7.22.
  • CVE-2023-3033 June 2, 2023
    Incorrect Authorization vulnerability in Mobatime web application allows Privilege Escalation, Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Mobatime web application: through 06.7.22.
  • CVE-2023-28469 June 2, 2023
    An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU processing operations to gain access to already freed memory. This affects Valhall r29p0 through r42p0 before r43p0, and Arm's GPU Architecture Gen5 r41p0 through r42p0 before r43p0.
  • CVE-2023-33717 June 2, 2023
    mp4v2 v2.1.3 was discovered to contain a memory leak when a method calling MP4File::ReadBytes() had allocated memory but did not catch exceptions thrown by ReadBytes()
  • CVE-2023-3056 June 2, 2023
    A vulnerability was found in YFCMF up to 3.0.4. It has been declared as problematic. This vulnerability affects unknown code of the file index.php. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230542 is the identifier assigned to […]
  • CVE-2022-24695 June 2, 2023
    Bluetooth Classic in Bluetooth Core Specification through 5.3 does not properly conceal device information for Bluetooth transceivers in Non-Discoverable mode. By conducting an efficient over-the-air attack, an attacker can fully extract the permanent, unique Bluetooth MAC identifier, along with device capabilities and identifiers, some of which may contain identifying information about the device owner. This […]
  • CVE-2023-33731 June 2, 2023
    Reflected Cross Site Scripting (XSS) in the view dashboard detail feature in Microworld Technologies eScan management console 14.0.1400.2281 allows remote attacker to inject arbitrary code via the URL directly.
  • CVE-2023-28698 June 2, 2023
    Wade Graphic Design FANTSY has a vulnerability of insufficient authorization check. An unauthenticated remote user can exploit this vulnerability by modifying URL parameters to gain administrator privileges to perform arbitrary system operation or disrupt service.
  • CVE-2023-30602 June 2, 2023
    Hitron Technologies CODA-5310’s Telnet function transfers sensitive data in plaintext. An unauthenticated remote attacker can exploit this vulnerability to access credentials of normal users and administrator.
  • CVE-2023-28705 June 2, 2023
    Openfind Mail2000 has insufficient filtering special characters of email content of its content filtering function. A remote attacker can exploit this vulnerability using phishing emails that contain malicious web pages injected with JavaScript. When users access the system and open the email, it triggers an XSS (Reflected Cross-site scripting) attack.
  • CVE-2023-30603 June 2, 2023
    Hitron Technologies CODA-5310 Telnet function with the default account and password, and there is no warning or prompt to ask users to change the default password and account. An unauthenticated remote attackers can exploit this vulnerability to obtain the administrator’s privilege, resulting in performing arbitrary system operation or disrupt service.
  • CVE-2022-47617 June 2, 2023
    Hitron CODA-5310 has hard-coded encryption/decryption keys in the program code. A remote attacker authenticated as an administrator can decrypt system files using the hard-coded keys for file access, modification, and cause service disruption.
  • CVE-2023-28699 June 2, 2023
    Wade Graphic Design FANTSY has a vulnerability of insufficient filtering for file type in its file update function. An authenticated remote attacker with general user privilege can exploit this vulnerability to upload a PHP file containing a webshell to perform arbitrary system operation or disrupt service.
  • CVE-2023-28701 June 2, 2023
    ELITE TECHNOLOGY CORP. Web Fax has a vulnerability of SQL Injection. An unauthenticated remote attacker can inject SQL commands into the input field of the login page to perform arbitrary system commands, disrupt service or terminate service.
  • CVE-2023-28700 June 2, 2023
    OMICARD EDM backend system’s file uploading function does not restrict upload of file with dangerous type. A local area network attacker with administrator privileges can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.
  • CVE-2023-28703 June 2, 2023
    ASUS RT-AC86U’s specific cgi function has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A remote attacker with administrator privileges can exploit this vulnerability to execute arbitrary system commands, disrupt system or terminate service.
LATEST POSTS
EVENTS
CONTACT US
info@ipresidium.com
Office: (949) 721-6612
Fax: (866) 205-2904
620 Newport Center Dr. STE 1100
Newport Beach, CA 92660
Career Opportunities
COPYRIGHT © iPRESIDIUM 2020 | Privacy Policy | Careers
Envelope Facebook Twitter Linkedin