Show filters
1,007 Total Results
Displaying 281-290 of 1,007
Sort by:
Attacker Value
Unknown
CVE-2023-4815
Disclosure Date: September 07, 2023 (last updated February 25, 2025)
Missing Authentication for Critical Function in GitHub repository answerdev/answer prior to v1.1.3.
0
Attacker Value
Unknown
CVE-2023-31132
Disclosure Date: September 05, 2023 (last updated February 25, 2025)
Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a privilege escalation vulnerability. A low-privileged OS user with access to a Windows host where Cacti is installed can create arbitrary PHP files in a web document directory. The user can then execute the PHP files under the security context of SYSTEM. This allows an attacker to escalate privilege from a normal user account to SYSTEM. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
0
Attacker Value
Unknown
CVE-2023-39981
Disclosure Date: September 02, 2023 (last updated February 25, 2025)
A vulnerability that allows for unauthorized access has been discovered in MXsecurity versions prior to v1.0.1. This vulnerability arises from inadequate authentication measures, potentially leading to the disclosure of device information by a remote attacker.
0
Attacker Value
Unknown
CVE-2023-34392
Disclosure Date: August 31, 2023 (last updated February 25, 2025)
A Missing Authentication for Critical Function vulnerability in the Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator could allow an attacker to run arbitrary commands on managed devices by an authorized device operator.
See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.
This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.
0
Attacker Value
Unknown
CVE-2023-40598
Disclosure Date: August 30, 2023 (last updated February 25, 2025)
In Splunk Enterprise versions below 8.2.12, 9.0.6, and 9.1.1, an attacker can create an external lookup that calls a legacy internal function. The attacker can use this internal function to insert code into the Splunk platform installation directory. From there, a user can execute arbitrary code on the Splunk platform Instance.
0
Attacker Value
Unknown
CVE-2023-40170
Disclosure Date: August 28, 2023 (last updated February 25, 2025)
jupyter-server is the backend for Jupyter web applications. Improper cross-site credential checks on `/files/` URLs could allow exposure of certain file contents, or accessing files when opening untrusted files via "Open image in new tab". This issue has been addressed in commit `87a49272728` which has been included in release `2.7.2`. Users are advised to upgrade. Users unable to upgrade may use the lower performance `--ContentsManager.files_handler_class=jupyter_server.files.handlers.FilesHandler`, which implements the correct checks.
0
Attacker Value
Unknown
CVE-2023-38030
Disclosure Date: August 28, 2023 (last updated February 25, 2025)
Saho’s attendance devices ADM100 and ADM-100FP have a vulnerability of missing authentication for critical functions. An unauthenticated remote attacker can execute system commands in partial website URLs to read sensitive device information without permissions.
0
Attacker Value
Unknown
CVE-2023-38028
Disclosure Date: August 28, 2023 (last updated February 25, 2025)
Saho’s attendance devices ADM100 and ADM-100FP have insufficient authentication. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication to read system information and operate user's data, but can’t control system or disrupt service.
0
Attacker Value
Unknown
CVE-2023-40585
Disclosure Date: August 25, 2023 (last updated February 25, 2025)
ironic-image is a container image to run OpenStack Ironic as part of Metal³. Prior to version capm3-v1.4.3, if Ironic is not deployed with TLS and it does not have API and Conductor split into separate services, access to the API is not protected by any authentication. Ironic API is also listening in host network. In case the node is not behind a firewall, the API could be accessed by anyone via network without authentication. By default, Ironic API in Metal3 is protected by TLS and basic authentication, so this vulnerability requires operator to configure API without TLS for it to be vulnerable. TLS and authentication however should not be coupled as they are in versions prior to capm3-v1.4.3. A patch exists in versions capm3-v1.4.3 and newer. Some workarounds are available. Either configure TLS for Ironic API (`deploy.sh -t ...`, `IRONIC_TLS_SETUP=true`) or split Ironic API and Conductor via configuration change (old implementation, not recommended). With both workarounds, services …
0
Attacker Value
Unknown
CVE-2023-38422
Disclosure Date: August 23, 2023 (last updated February 25, 2025)
Walchem Intuition 9 firmware versions prior to v4.21 are missing authentication for some of the API routes of the management web server. This could allow an attacker to download and export sensitive data.
0