Show filters
223 Total Results
Displaying 21-30 of 223
Sort by:
Attacker Value
Unknown

CVE-2024-3727

Disclosure Date: May 14, 2024 (last updated January 20, 2025)
A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
0
Attacker Value
Unknown

CVE-2024-0967

Disclosure Date: March 01, 2024 (last updated March 02, 2024)
A potential vulnerability has been identified in OpenText / Micro Focus ArcSight Enterprise Security Manager (ESM). The vulnerability could be remotely exploited.
0
Attacker Value
Unknown

CVE-2023-32479

Disclosure Date: February 06, 2024 (last updated February 14, 2024)
Dell Encryption, Dell Endpoint Security Suite Enterprise, and Dell Security Management Server versions prior to 11.9.0 contain privilege escalation vulnerability due to improper ACL of the non-default installation directory. A local malicious user could potentially exploit this vulnerability by replacing binaries in installed directory and taking reverse shell of the system leading to Privilege Escalation.
Attacker Value
Unknown

CVE-2024-22165

Disclosure Date: January 09, 2024 (last updated January 17, 2024)
In Splunk Enterprise Security (ES) versions lower than 7.1.2, an attacker can create a malformed Investigation to perform a denial of service (DoS). The malformed investigation prevents the generation and rendering of the Investigations manager until it is deleted.<br>The vulnerability requires an authenticated session and access to create an Investigation. It only affects the availability of the Investigations manager, but without the manager, the Investigations functionality becomes unusable for most users.
Attacker Value
Unknown

CVE-2024-22164

Disclosure Date: January 09, 2024 (last updated January 17, 2024)
In Splunk Enterprise Security (ES) versions below 7.1.2, an attacker can use investigation attachments to perform a denial of service (DoS) to the Investigation. The attachment endpoint does not properly limit the size of the request which lets an attacker cause the Investigation to become inaccessible.
Attacker Value
Unknown

CVE-2023-6071

Disclosure Date: November 30, 2023 (last updated December 06, 2023)
An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. This is possible as the input isn't correctly sanitized when adding a new data source.
Attacker Value
Unknown

CVE-2023-6070

Disclosure Date: November 29, 2023 (last updated December 06, 2023)
A server-side request forgery vulnerability in ESM prior to version 11.6.8 allows a low privileged authenticated user to upload arbitrary content, potentially altering configuration. This is possible through the certificate validation functionality where the API accepts uploaded content and doesn't parse for invalid data
Attacker Value
Unknown

CVE-2023-39246

Disclosure Date: November 16, 2023 (last updated November 30, 2023)
Dell Encryption, Dell Endpoint Security Suite Enterprise, and Dell Security Management Server version prior to 11.8.1 contain an Insecure Operation on Windows Junction Vulnerability during installation. A local malicious user could potentially exploit this vulnerability to create an arbitrary folder inside a restricted directory, leading to Privilege Escalation
Attacker Value
Unknown

CVE-2022-4132

Disclosure Date: October 04, 2023 (last updated October 09, 2023)
A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page).
Attacker Value
Unknown

CVE-2023-3314

Disclosure Date: July 03, 2023 (last updated October 08, 2023)
A vulnerability arises out of a failure to comprehensively sanitize the processing of a zip file(s). Incomplete neutralization of external commands used to control the process execution of the .zip application allows an authorized user to obtain control of the .zip application to execute arbitrary commands or obtain elevation of system privileges.