CVE-2023-42471
https://notcve.org/view.php?id=CVE-2023-42471
The wave.ai.browser application through 1.0.35 for Android allows a remote attacker to execute arbitrary JavaScript code via a crafted intent. It contains a manifest entry that exports the wave.ai.browser.ui.splash.SplashScreen activity. This activity uses a WebView component to display web content and doesn't adequately validate or sanitize the URI or any extra data passed in the intent by a third party application (with no permissions). La aplicación wave.ai.browser hasta la versión 1.0.35 para Android permite a un atacante remoto ejecutar código JavaScript arbitrario mediante un intento manipulado. Contiene una entrada de manifiesto que exporta la actividad wave.ai.browser.ui.splash.SplashScreen. • https://github.com/actuator/cve/blob/main/CVE-2023-42471 https://github.com/actuator/wave.ai.browser/blob/main/CWE-94.md https://github.com/actuator/wave.ai.browser/blob/main/poc.apk • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2023-39320 – Arbitrary code execution via go.mod toolchain directive in cmd/go
https://notcve.org/view.php?id=CVE-2023-39320
The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software. La directiva de cadena de herramientas go.mod, introducida en Go 1.21, se puede aprovechar para ejecutar scripts y binarios relativos a la raíz del módulo cuando el comando "go" se ejecutó dentro del módulo. Esto se aplica a los módulos descargados utilizando el comando "go" desde el proxy del módulo, así como a los módulos descargados directamente mediante el software VCS. • https://go.dev/cl/526158 https://go.dev/issue/62198 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://pkg.go.dev/vuln/GO-2023-2042 https://security.gentoo.org/glsa/202311-09 https://security.netapp.com/advisory/ntap-20231020-0004 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2023-41064 – Apple iOS, iPadOS, and macOS ImageIO Buffer Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2023-41064
Processing a maliciously crafted image may lead to arbitrary code execution. • https://github.com/alsaeroth/CVE-2023-41064-POC https://github.com/MrR0b0t19/CVE-2023-41064 https://github.com/MrR0b0t19/vulnerabilidad-LibWebP-CVE-2023-41064 https://github.com/sarsaeroth/CVE-2023-41064-POC http://www.openwall.com/lists/oss-security/2023/09/21/4 https://support.apple.com/en-us/HT213905 https://support.apple.com/en-us/HT213906 https://support.apple.com/en-us/HT213913 https://support.apple.com/en-us/HT213914 https://support.apple.com/en-us/HT213915 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2023-41061 – Apple iOS, iPadOS, and watchOS Wallet Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-41061
A maliciously crafted attachment may result in arbitrary code execution. • http://seclists.org/fulldisclosure/2023/Sep/4 http://seclists.org/fulldisclosure/2023/Sep/5 https://support.apple.com/en-us/HT213905 https://support.apple.com/en-us/HT213907 https://support.apple.com/kb/HT213905 https://support.apple.com/kb/HT213907 • CWE-20: Improper Input Validation •
CVE-2023-39240 – ASUS RT-AX55、RT-AX56U_V2 - Format String - 3
https://notcve.org/view.php?id=CVE-2023-39240
A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. • https://www.twcert.org.tw/tw/cp-132-7356-021bf-1.html • CWE-134: Use of Externally-Controlled Format String •