Show filters
751 Total Results
Displaying 211-220 of 751
Sort by:
Attacker Value
Unknown

CVE-2023-27084

Disclosure Date: March 16, 2023 (last updated February 24, 2025)
Permissions vulnerability found in isoftforce Dreamer CMS v.4.0.1 allows local attackers to obtain sensitive information via the AttachmentController parameter.
Attacker Value
Unknown

CVE-2023-23939

Disclosure Date: March 06, 2023 (last updated February 24, 2025)
Azure/setup-kubectl is a GitHub Action for installing Kubectl. This vulnerability only impacts versions before version 3. An insecure temporary creation of a file allows other actors on the Actions runner to replace the Kubectl binary created by this action because it is world writable. This Kubectl tool installer runs `fs.chmodSync(kubectlPath, 777)` to set permissions on the Kubectl binary, however, this allows any local user to replace the Kubectl binary. This allows privilege escalation to the user that can also run kubectl, most likely root. This attack is only possible if an attacker somehow breached the GitHub actions runner or if a user is utilizing an Action that maliciously executes this attack. This has been fixed and released in all versions `v3` and later. 775 permissions are used instead. Users are advised to upgrade. There are no known workarounds for this issue.
Attacker Value
Unknown

CVE-2023-1105

Disclosure Date: March 01, 2023 (last updated February 24, 2025)
External Control of File Name or Path in GitHub repository flatpressblog/flatpress prior to 1.3.
Attacker Value
Unknown

CVE-2023-1070

Disclosure Date: February 27, 2023 (last updated February 24, 2025)
External Control of File Name or Path in GitHub repository nilsteampassnet/teampass prior to 3.0.0.22.
Attacker Value
Unknown

CVE-2023-24205

Disclosure Date: February 23, 2023 (last updated February 24, 2025)
Clash for Windows v0.20.12 was discovered to contain a remote code execution (RCE) vulnerability which is exploited via overwriting the configuration file (cfw-setting.yaml).
Attacker Value
Unknown

CVE-2022-25992

Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Insecure inherited permissions in the Intel(R) oneAPI Toolkits oneapi-cli before version 0.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2023-21566

Disclosure Date: February 14, 2023 (last updated February 24, 2025)
Visual Studio Elevation of Privilege Vulnerability
Attacker Value
Unknown

CVE-2023-21800

Disclosure Date: February 14, 2023 (last updated February 24, 2025)
Windows Installer Elevation of Privilege Vulnerability
Attacker Value
Unknown

CVE-2022-21939

Disclosure Date: February 09, 2023 (last updated February 24, 2025)
Sensitive Cookie Without 'HttpOnly' Flag vulnerability in Johnson Controls System Configuration Tool (SCT) version 14 prior to 14.2.3 and version 15 prior to 15.0.3 could allow access to the cookie.
Attacker Value
Unknown

CVE-2023-25150

Disclosure Date: February 08, 2023 (last updated February 24, 2025)
Nextcloud office/richdocuments is an office suit for the nextcloud server platform. In affected versions the Collabora integration can be tricked to provide access to any file without proper permission validation. As a result any user with access to Collabora can obtain the content of other users files. It is recommended that the Nextcloud Office App (Collabora Integration) is updated to 7.0.2 (Nextcloud 25), 6.3.2 (Nextcloud 24), 5.0.10 (Nextcloud 23), 4.2.9 (Nextcloud 21-22), or 3.8.7 (Nextcloud 15-20). There are no known workarounds for this issue.