A vulnerability classified as problematic has been found in WP Ultimate CSV Importer Plugin 3.7.2 on WordPress. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 3.7.3 is able to address this issue. The identifier of the patch is 13c30af721d3f989caac72dd0f56cf0dc40fad7e. It is recommended to upgrade the affected component. The identifier VDB-241317 was assigned to this vulnerability.
Daily Archives: October 5, 2023
tacacs-F4.0.4.28.7fb~20231005g4fdf178-2.el8
FEDORA-EPEL-2023-a6d0c485c1
Packages in this update:
tacacs-F4.0.4.28.7fb~20231005g4fdf178-2.el8
Update description:
Update to git snapshot 4fdf178 for CVE-2023-45239; Fixes: RHBZ#2242402
tacacs-F4.0.4.28.7fb~20231005g4fdf178-2.el9
FEDORA-EPEL-2023-4aac16fe21
Packages in this update:
tacacs-F4.0.4.28.7fb~20231005g4fdf178-2.el9
Update description:
Update to git snapshot 4fdf178 for CVE-2023-45239; Fixes: RHBZ#2242402
tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc37
FEDORA-2023-ef2653f707
Packages in this update:
tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc37
Update description:
Update to git snapshot 4fdf178 for CVE-2023-45239; Fixes: RHBZ#2242402
tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc38
FEDORA-2023-6f9e904861
Packages in this update:
tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc38
Update description:
Update to git snapshot 4fdf178 for CVE-2023-45239; Fixes: RHBZ#2242402
tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc39
FEDORA-2023-96c21ed09c
Packages in this update:
tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc39
Update description:
Update to git snapshot 4fdf178 for CVE-2023-45239; Fixes: RHBZ#2242402
tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc40
FEDORA-2023-a219299297
Packages in this update:
tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc40
Update description:
Automatic update for tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc40.
Changelog
* Thu Oct 5 2023 Davide Cavalca <dcavalca@fedoraproject.org> – F4.0.4.28.7fb~20231005g4fdf178-1
– Update to git snapshot 4fdf178 for CVE-2023-45239; Fixes: RHBZ#2242402
Multiple Vulnerabilities in Progress WS_FTP Server Could Allow for Remote Command Execution.
Multiple vulnerabilities in Progress WS_FTP Server have been discovered, the most severe of which could allow for remote command execution. Progress WS_FTP Server is used is to securely store, share and transfer information between systems, applications, groups and individuals. Successful exploitation of the most severe of these vulnerabilities could allow for remote command execution in the context of the service account. Depending on the privileges associated with the service account, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Service accounts that are configured to have fewer user rights on the system could be less impacted than those that operate with administrative user rights.
A Vulnerability in Atlassian Confluence Server and Data Center Could Allow for Privilege Escalation
A vulnerability has been discovered in Atlassian Confluence Server and Data Center, which could allow for Privilege Escalation. Confluence is a collaboration tool that brings people, knowledge, and ideas together in a shared workspace. Successful exploitation of this vulnerability could allow an attacker to create unauthorized Confluence administrator accounts to access the instance. An attacker could then perform administrator actions in the context of the confluence instance.
A Vulnerability in Cisco Emergency Responder Could Allow for Arbitrary Code Execution
A vulnerability has been discovered in Cisco Emergency Responder that could allow for arbitrary code execution on a targeted host. Successful exploitation could allow an unauthenticated remote attacker to log in to the affected system using the root account and execute arbitrary commands. Cisco Emergency Responder is used to enhance the existing emergency 9-1-1 functionality offered by Cisco Unified Communications Manager. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.