Show filters
1,326 Total Results
Displaying 111-120 of 1,326
Sort by:
Attacker Value
Unknown
CVE-2023-48662
Disclosure Date: December 14, 2023 (last updated February 25, 2025)
Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system.
0
Attacker Value
Unknown
CVE-2023-48661
Disclosure Date: December 14, 2023 (last updated February 25, 2025)
Dell vApp Manager, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability to read arbitrary files from the target system.
0
Attacker Value
Unknown
CVE-2023-48660
Disclosure Date: December 14, 2023 (last updated February 25, 2025)
Dell vApp Manger, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote attacker could potentially exploit this vulnerability to read arbitrary files from the target system.
0
Attacker Value
Unknown
CVE-2023-20275
Disclosure Date: December 12, 2023 (last updated February 25, 2025)
A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to send packets with another VPN user's source IP address. This vulnerability is due to improper validation of the packet's inner source IP address after decryption. An attacker could exploit this vulnerability by sending crafted packets through the tunnel. A successful exploit could allow the attacker to send a packet impersonating another VPN user's IP address. It is not possible for the attacker to receive return packets.
0
Attacker Value
Unknown
CVE-2023-32460
Disclosure Date: December 08, 2023 (last updated February 25, 2025)
Dell PowerEdge BIOS contains an improper privilege management security vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to privilege escalation.
0
Attacker Value
Unknown
CVE-2021-36806
Disclosure Date: November 30, 2023 (last updated February 25, 2025)
A reflected XSS vulnerability allows an open redirect when the victim clicks a malicious link to an error page on
Sophos Email Appliance
older than version 4.5.3.4.
0
Attacker Value
Unknown
CVE-2023-6287
Disclosure Date: November 27, 2023 (last updated February 25, 2025)
Sensitive data exposure in Webconf in Tribe29 Checkmk Appliance before 1.6.8 allows local attacker to retrieve passwords via reading log files.
0
Attacker Value
Unknown
CVE-2023-46176
Disclosure Date: November 03, 2023 (last updated February 25, 2025)
IBM MQ Appliance 9.3 CD could allow a local attacker to gain elevated privileges on the system, caused by improper validation of security keys. IBM X-Force ID: 269535.
0
Attacker Value
Unknown
CVE-2023-20264
Disclosure Date: November 01, 2023 (last updated February 25, 2025)
A vulnerability in the implementation of Security Assertion Markup Language (SAML) 2.0 single sign-on (SSO) for remote access VPN in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to intercept the SAML assertion of a user who is authenticating to a remote access VPN session. This vulnerability is due to insufficient validation of the login URL. An attacker could exploit this vulnerability by persuading a user to access a site that is under the control of the attacker, allowing the attacker to modify the login URL. A successful exploit could allow the attacker to intercept a successful SAML assertion and use that assertion to establish a remote access VPN session toward the affected device with the identity and permissions of the hijacked user, resulting in access to the protected network.
0
Attacker Value
Unknown
CVE-2023-20247
Disclosure Date: November 01, 2023 (last updated February 25, 2025)
A vulnerability in the remote access SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to bypass a configured multiple certificate authentication policy and connect using only a valid username and password. This vulnerability is due to improper error handling during remote access VPN authentication. An attacker could exploit this vulnerability by sending crafted requests during remote access VPN session establishment. A successful exploit could allow the attacker to bypass the configured multiple certificate authentication policy while retaining the privileges and permissions associated with the original connection profile.
0