Show filters
881 Total Results
Displaying 151-160 of 881
Sort by:
Attacker Value
Unknown
CVE-2023-32009
Disclosure Date: June 14, 2023 (last updated February 25, 2025)
Windows Collaborative Translation Framework Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2023-24546
Disclosure Date: June 13, 2023 (last updated February 25, 2025)
On affected versions of the CloudVision Portal improper access controls on the connection from devices to CloudVision could enable a malicious actor with network access to CloudVision to get broader access to telemetry and configuration data within the system than intended. This advisory impacts the Arista CloudVision Portal product when run on-premise. It does not impact CloudVision as-a-Service.
0
Attacker Value
Unknown
CVE-2022-39946
Disclosure Date: June 13, 2023 (last updated February 25, 2025)
An access control vulnerability [CWE-284] in FortiNAC version 9.4.2 and below, version 9.2.7 and below, 9.1 all versions, 8.8 all versions, 8.7 all versions, 8.6 all versions, 8.5 all versions may allow a remote attacker authenticated on the administrative interface to perform unauthorized jsp calls via crafted HTTP requests.
0
Attacker Value
Unknown
CVE-2023-2183
Disclosure Date: June 06, 2023 (last updated February 25, 2025)
Grafana is an open-source platform for monitoring and observability.
The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function.
This might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server.
Users may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.
0
Attacker Value
Unknown
CVE-2023-21670
Disclosure Date: June 06, 2023 (last updated February 25, 2025)
Memory Corruption in GPU Subsystem due to arbitrary command execution from GPU in privileged mode.
0
Attacker Value
Unknown
CVE-2022-40529
Disclosure Date: June 06, 2023 (last updated February 25, 2025)
Memory corruption due to improper access control in kernel while processing a mapping request from root process.
0
Attacker Value
Unknown
CVE-2023-3099
Disclosure Date: June 05, 2023 (last updated February 25, 2025)
A vulnerability classified as critical was found in KylinSoft youker-assistant on KylinOS. Affected by this vulnerability is the function delete_file in the library dbus.SystemBus of the component Arbitrary File Handler. The manipulation leads to improper access controls. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.2-0kylin6k70-23 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-230689 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2023-3096
Disclosure Date: June 05, 2023 (last updated February 25, 2025)
A vulnerability was found in KylinSoft kylin-software-properties on KylinOS. It has been declared as critical. This vulnerability affects the function changedSource. The manipulation leads to improper access controls. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 0.0.1-130 is able to address this issue. It is recommended to upgrade the affected component. VDB-230686 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2023-3095
Disclosure Date: June 04, 2023 (last updated February 25, 2025)
Improper Access Control in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
0
Attacker Value
Unknown
CVE-2023-28066
Disclosure Date: June 01, 2023 (last updated February 25, 2025)
Dell OS Recovery Tool, versions 2.2.4013 and 2.3.7012.0, contain an Improper Access Control Vulnerability. A local authenticated non-administrator user could potentially exploit this vulnerability in order to elevate privileges on the system.
0