Show filters
905 Total Results
Displaying 251-260 of 905
Sort by:
Attacker Value
Unknown

CVE-2023-30612

Disclosure Date: April 19, 2023 (last updated February 24, 2025)
Cloud hypervisor is a Virtual Machine Monitor for Cloud workloads. This vulnerability allows users to close arbitrary open file descriptors in the Cloud Hypervisor process via sending malicious HTTP request through the HTTP API socket. As a result, the Cloud Hypervisor process can be easily crashed, causing Deny-of-Service (DoS). This can also be a potential Use-After-Free (UAF) vulnerability. Users require to have the write access to the API socket file to trigger this vulnerability. Impacted versions of Cloud Hypervisor include upstream main branch, v31.0, and v30.0. The vulnerability was initially detected by our `http_api_fuzzer` via oss-fuzz. This issue has been addressed in versions 30.1 and 31.1. Users unable to upgrade may mitigate this issue by ensuring the write access to the API socket file is granted to trusted users only.
Attacker Value
Unknown

CVE-2023-29413

Disclosure Date: April 18, 2023 (last updated February 24, 2025)
A CWE-306: Missing Authentication for Critical Function vulnerability exists that could cause Denial-of-Service when accessed by an unauthenticated user on the Schneider UPS Monitor service.
Attacker Value
Unknown

CVE-2023-29411

Disclosure Date: April 18, 2023 (last updated February 24, 2025)
A CWE-306: Missing Authentication for Critical Function vulnerability exists that could allow changes to administrative credentials, leading to potential remote code execution without requiring prior authentication on the Java RMI interface.
Attacker Value
Unknown

CVE-2023-21979

Disclosure Date: April 18, 2023 (last updated February 24, 2025)
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Attacker Value
Unknown

CVE-2023-27571

Disclosure Date: April 15, 2023 (last updated February 24, 2025)
An issue was discovered in DG3450 Cable Gateway AR01.02.056.18_041520_711.NCS.10. The troubleshooting_logs_download.php log file download functionality does not check the session cookie. Thus, an attacker can download all log files.
Attacker Value
Unknown

CVE-2023-24934

Disclosure Date: April 14, 2023 (last updated February 24, 2025)
Microsoft Defender Security Feature Bypass Vulnerability
Attacker Value
Unknown

CVE-2023-27747

Disclosure Date: April 13, 2023 (last updated February 24, 2025)
BlackVue DR750-2CH LTE v.1.012_2022.10.26 does not employ authentication in its web server. This vulnerability allows attackers to access sensitive information such as configurations and recordings.
Attacker Value
Unknown

CVE-2022-41331

Disclosure Date: April 11, 2023 (last updated February 24, 2025)
A missing authentication for critical function vulnerability [CWE-306] in FortiPresence infrastructure server before version 1.2.1 allows a remote, unauthenticated attacker to access the Redis and MongoDB instances via crafted authentication requests.
Attacker Value
Unknown

CVE-2023-28761

Disclosure Date: April 11, 2023 (last updated February 24, 2025)
In SAP NetWeaver Enterprise Portal - version 7.50, an unauthenticated attacker can attach to an open interface and make use of an open API to access a service which will enable them to access or modify server settings and data, leading to limited impact on confidentiality and integrity.
Attacker Value
Unknown

CVE-2023-27497

Disclosure Date: April 11, 2023 (last updated February 24, 2025)
Due to missing authentication and input sanitization of code the EventLogServiceCollector of SAP Diagnostics Agent - version 720, allows an attacker to execute malicious scripts on all connected Diagnostics Agents running on Windows. On successful exploitation, the attacker can completely compromise confidentiality, integrity and availability of the system.