Show filters
881 Total Results
Displaying 151-160 of 881
Sort by:
Attacker Value
Unknown

CVE-2023-32009

Disclosure Date: June 14, 2023 (last updated February 25, 2025)
Windows Collaborative Translation Framework Elevation of Privilege Vulnerability
Attacker Value
Unknown

CVE-2023-24546

Disclosure Date: June 13, 2023 (last updated February 25, 2025)
On affected versions of the CloudVision Portal improper access controls on the connection from devices to CloudVision could enable a malicious actor with network access to CloudVision to get broader access to telemetry and configuration data within the system than intended. This advisory impacts the Arista CloudVision Portal product when run on-premise. It does not impact CloudVision as-a-Service.
Attacker Value
Unknown

CVE-2022-39946

Disclosure Date: June 13, 2023 (last updated February 25, 2025)
An access control vulnerability [CWE-284] in FortiNAC version 9.4.2 and below, version 9.2.7 and below, 9.1 all versions, 8.8 all versions, 8.7 all versions, 8.6 all versions, 8.5 all versions may allow a remote attacker authenticated on the administrative interface to perform unauthorized jsp calls via crafted HTTP requests.
Attacker Value
Unknown

CVE-2023-2183

Disclosure Date: June 06, 2023 (last updated February 25, 2025)
Grafana is an open-source platform for monitoring and observability. The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function. This might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server. Users may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.
Attacker Value
Unknown

CVE-2023-21670

Disclosure Date: June 06, 2023 (last updated February 25, 2025)
Memory Corruption in GPU Subsystem due to arbitrary command execution from GPU in privileged mode.
Attacker Value
Unknown

CVE-2022-40529

Disclosure Date: June 06, 2023 (last updated February 25, 2025)
Memory corruption due to improper access control in kernel while processing a mapping request from root process.
Attacker Value
Unknown

CVE-2023-3099

Disclosure Date: June 05, 2023 (last updated February 25, 2025)
A vulnerability classified as critical was found in KylinSoft youker-assistant on KylinOS. Affected by this vulnerability is the function delete_file in the library dbus.SystemBus of the component Arbitrary File Handler. The manipulation leads to improper access controls. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.2-0kylin6k70-23 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-230689 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Attacker Value
Unknown

CVE-2023-3096

Disclosure Date: June 05, 2023 (last updated February 25, 2025)
A vulnerability was found in KylinSoft kylin-software-properties on KylinOS. It has been declared as critical. This vulnerability affects the function changedSource. The manipulation leads to improper access controls. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 0.0.1-130 is able to address this issue. It is recommended to upgrade the affected component. VDB-230686 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Attacker Value
Unknown

CVE-2023-3095

Disclosure Date: June 04, 2023 (last updated February 25, 2025)
Improper Access Control in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
Attacker Value
Unknown

CVE-2023-28066

Disclosure Date: June 01, 2023 (last updated February 25, 2025)
Dell OS Recovery Tool, versions 2.2.4013 and 2.3.7012.0, contain an Improper Access Control Vulnerability. A local authenticated non-administrator user could potentially exploit this vulnerability in order to elevate privileges on the system.