
CVE-2024-22410 – Binary Planting Attack on Windows Platforms in Creditcoin
https://notcve.org/view.php?id=CVE-2024-22410
17 Jan 2024 — Creditcoin is a network that enables cross-blockchain credit transactions. The Windows binary of the Creditcoin node loads a suite of DLLs provided by Microsoft at startup. If a malicious user has access to overwrite the program files directory it is possible to replace these DLLs and execute arbitrary code. It is the view of the blockchain development team that the threat posed by a hypothetical binary planting attack is minimal and represents a low-security risk. The vulnerable DLL files are from the Wind... • https://github.com/gluwa/creditcoin/security/advisories/GHSA-cx5c-xwcv-vhmq • CWE-426: Untrusted Search Path •

CVE-2023-6335
https://notcve.org/view.php?id=CVE-2023-6335
16 Jan 2024 — Improper Link Resolution Before File Access ('Link Following') vulnerability in HYPR Workforce Access on Windows allows User-Controlled Filename.This issue affects Workforce Access: before 8.7. La vulnerabilidad de resolución de enlace incorrecta antes del acceso al archivo ("Link Following") en HYPR Workforce Access en Windows permite el nombre de archivo controlado por el usuario. Este problema afecta a Workforce Access: antes de 8.7. • https://www.hypr.com/security-advisories • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2023-6334
https://notcve.org/view.php?id=CVE-2023-6334
16 Jan 2024 — Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in HYPR Workforce Access on Windows allows Overflow Buffers.This issue affects Workforce Access: before 8.7. Vulnerabilidad de restricción inadecuada de operaciones dentro de los límites en búfer de memoria en HYPR Workforce Access en Windows permite desbordamiento de búferes. Este problema afecta a Workforce Access: versiones anteriores a 8.7. • https://www.hypr.com/security-advisories • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2023-5097
https://notcve.org/view.php?id=CVE-2023-5097
16 Jan 2024 — Improper Input Validation vulnerability in HYPR Workforce Access on Windows allows Path Traversal.This issue affects Workforce Access: before 8.7. La vulnerabilidad de validación de entrada incorrecta en HYPR Workforce Access en Windows permite path traversal. Este problema afecta a Workforce Access: versiones anteriores a 8.7. • https://www.hypr.com/security-advisories • CWE-20: Improper Input Validation CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2023-49107 – Generation of Error Message Containing Sensitive Information Vulnerability in Hitachi Device Manager
https://notcve.org/view.php?id=CVE-2023-49107
16 Jan 2024 — Generation of Error Message Containing Sensitive Information vulnerability in Hitachi Device Manager on Windows, Linux (Device Manager Agent modules).This issue affects Hitachi Device Manager: before 8.8.5-04. Vulnerabilidad de generación de mensaje de error que contiene información confidencial en Hitachi Device Manager en Windows, Linux (módulos Device Manager Agent). Este problema afecta a Hitachi Device Manager: versiones anteriores a 8.8.5-04. • https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-101/index.html • CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2023-49106 – Missing Password Field Masking Vulnerability in Hitachi Device Manager
https://notcve.org/view.php?id=CVE-2023-49106
16 Jan 2024 — Missing Password Field Masking vulnerability in Hitachi Device Manager on Windows, Linux (Device Manager Agent component).This issue affects Hitachi Device Manager: before 8.8.5-04. Vulnerabilidad de enmascaramiento de campo de contraseña faltante en Hitachi Device Manager en Windows, Linux (componente Device Manager Agent). Este problema afecta a Hitachi Device Manager: versiones anteriores a 8.8.5-04. • https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-101/index.html • CWE-522: Insufficiently Protected Credentials CWE-549: Missing Password Field Masking •

CVE-2023-49647 – Zoom Desktop Client for Windows - Improper Access Control
https://notcve.org/view.php?id=CVE-2023-49647
12 Jan 2024 — Improper access control in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows before version 5.16.10 may allow an authenticated user to conduct an escalation of privilege via local access. Un control de acceso inadecuado en Zoom Desktop Client para Windows, Zoom VDI Client para Windows y Zoom SDK para Windows anteriores a la versión 5.16.10 puede permitir que un usuario autenticado realice una escalada de privilegios a través del acceso local. • https://www.zoom.com/en/trust/security-bulletin/ZSB-24001 • CWE-266: Incorrect Privilege Assignment CWE-284: Improper Access Control •

CVE-2023-31036
https://notcve.org/view.php?id=CVE-2023-31036
12 Jan 2024 — NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where, when it is launched with the non-default command line option --model-control explicit, an attacker may use the model load API to cause a relative path traversal. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. NVIDIA Triton Inference Server para Linux y Windows contiene una vulnerabilidad en la que, cuando se inic... • https://nvidia.custhelp.com/app/answers/detail/a_id/5509 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •

CVE-2023-40250
https://notcve.org/view.php?id=CVE-2023-40250
12 Jan 2024 — Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Hancom HCell on Windows allows Overflow Buffers.This issue affects HCell: 12.0.0.893. La vulnerabilidad de copia de búfer sin verificar el tamaño de la entrada ('desbordamiento de búfer clásico') en Hancom HCell en Windows permite desbordamiento de búferes. Este problema afecta a HCell: 12.0.0.893. • https://www.hancom.com/cs_center/csDownload.do?gnb0=25gnb1=80 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2023-51750
https://notcve.org/view.php?id=CVE-2023-51750
11 Jan 2024 — ScaleFusion 10.5.2 does not properly limit users to the Edge application because file downloads can occur. NOTE: the vendor's position is "Not vulnerable if the default Windows device profile configuration is used which utilizes modern management with website allow-listing rules." ScaleFusion 10.5.2 no limita adecuadamente a los usuarios a la aplicación Edge porque pueden ocurrir descargas de archivos. • https://help.scalefusion.com/docs/security-advisory-for-windows-mdm-agent • CWE-286: Incorrect User Management •