
CVE-2023-48740 – WordPress Easy Social Feed plugin <= 6.5.1 - Broken Access Control vulnerability
https://notcve.org/view.php?id=CVE-2023-48740
23 Nov 2023 — Missing Authorization vulnerability in Easy Social Feed Easy Social Feed allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Social Feed: from n/a through 6.5.1. The Easy Social Feed plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the hide_free_sidebar() function in versions up to, and including, 6.5.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to dismiss... • https://patchstack.com/database/wordpress/plugin/easy-facebook-likebox/vulnerability/wordpress-easy-social-feed-plugin-6-5-1-broken-access-control-vulnerability?_s_id=cve • CWE-862: Missing Authorization •

CVE-2023-5654
https://notcve.org/view.php?id=CVE-2023-5654
19 Oct 2023 — The React Developer Tools extension registers a message listener with window.addEventListener('message',

CVE-2023-44487 – HTTP/2 Rapid Reset Attack Vulnerability
https://notcve.org/view.php?id=CVE-2023-44487
10 Oct 2023 — The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. El protocolo HTTP/2 permite una denegación de servicio (consumo de recursos del servidor) porque la cancelación de solicitudes puede restablecer muchas transmisiones rápidamente, como se explotó en la naturaleza entre agosto y octubre de 2023. A flaw was found in handling multiplexed streams in the HTTP/2 protocol. ... • https://github.com/imabee101/CVE-2023-44487 • CWE-400: Uncontrolled Resource Consumption •

CVE-2023-45239 – Gentoo Linux Security Advisory 202402-13
https://notcve.org/view.php?id=CVE-2023-45239
06 Oct 2023 — A lack of input validation exists in tac_plus prior to commit 4fdf178 which, when pre or post auth commands are enabled, allows an attacker who can control the username, rem-addr, or NAC address sent to tac_plus to inject shell commands and gain remote code execution on the tac_plus server. Existe una falta de validación de entrada en tac_plus antes del commit 4fdf178 que, cuando los comandos de autenticación previa o posterior están habilitados, permite a un atacante que puede controlar el nombre de usuari... • https://github.com/takeshixx/tac_plus-pre-auth-rce • CWE-790: Improper Filtering of Special Elements •

CVE-2023-30470
https://notcve.org/view.php?id=CVE-2023-30470
18 May 2023 — A use-after-free related to unsound inference in the bytecode generation when optimizations are enabled for Hermes prior to commit da8990f737ebb9d9810633502f65ed462b819c09 could have been used by an attacker to achieve remote code execution. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected. • https://github.com/facebook/hermes/commit/da8990f737ebb9d9810633502f65ed462b819c09 • CWE-416: Use After Free •

CVE-2023-28753
https://notcve.org/view.php?id=CVE-2023-28753
18 May 2023 — netconsd prior to v0.2 was vulnerable to an integer overflow in its parse_packet function. A malicious individual could leverage this overflow to create heap memory corruption with attacker controlled data. • https://github.com/pingjuiliao/CVE-2023-28753 • CWE-787: Out-of-bounds Write •

CVE-2023-28081
https://notcve.org/view.php?id=CVE-2023-28081
18 May 2023 — A bytecode optimization bug in Hermes prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could be used to cause an use-after-free and obtain arbitrary code execution via a carefully crafted payload. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected. • https://github.com/facebook/hermes/commit/e6ed9c1a4b02dc219de1648f44cd808a56171b81 • CWE-416: Use After Free •

CVE-2023-25933
https://notcve.org/view.php?id=CVE-2023-25933
18 May 2023 — A type confusion bug in TypedArray prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could have been used by a malicious attacker to execute arbitrary code via untrusted JavaScript. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected. • https://github.com/facebook/hermes/commit/e6ed9c1a4b02dc219de1648f44cd808a56171b81 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVE-2023-24833
https://notcve.org/view.php?id=CVE-2023-24833
18 May 2023 — A use-after-free in BigIntPrimitive addition in Hermes prior to commit a6dcafe6ded8e61658b40f5699878cd19a481f80 could have been used by an attacker to leak raw data from Hermes VM’s heap. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected. • https://github.com/facebook/hermes/commit/a6dcafe6ded8e61658b40f5699878cd19a481f80 • CWE-416: Use After Free •

CVE-2023-24832
https://notcve.org/view.php?id=CVE-2023-24832
18 May 2023 — A null pointer dereference bug in Hermes prior to commit 5cae9f72975cf0e5a62b27fdd8b01f103e198708 could have been used by an attacker to crash an Hermes runtime where the EnableHermesInternal config option was set to true. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected. • https://github.com/facebook/hermes/commit/5cae9f72975cf0e5a62b27fdd8b01f103e198708 • CWE-476: NULL Pointer Dereference •