Show filters
223 Total Results
Displaying 21-30 of 223
Sort by:
Attacker Value
Unknown
CVE-2024-3727
Disclosure Date: May 14, 2024 (last updated January 20, 2025)
A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
0
Attacker Value
Unknown
CVE-2024-0967
Disclosure Date: March 01, 2024 (last updated March 02, 2024)
A potential vulnerability has been identified in OpenText / Micro Focus ArcSight Enterprise Security Manager (ESM). The vulnerability could be remotely exploited.
0
Attacker Value
Unknown
CVE-2023-32479
Disclosure Date: February 06, 2024 (last updated February 14, 2024)
Dell Encryption, Dell Endpoint Security Suite Enterprise, and Dell Security Management Server versions prior to 11.9.0 contain privilege escalation vulnerability due to improper ACL of the non-default installation directory. A local malicious user could potentially exploit this vulnerability by replacing binaries in installed directory and taking reverse shell of the system leading to Privilege Escalation.
0
Attacker Value
Unknown
CVE-2024-22165
Disclosure Date: January 09, 2024 (last updated January 17, 2024)
In Splunk Enterprise Security (ES) versions lower than 7.1.2, an attacker can create a malformed Investigation to perform a denial of service (DoS). The malformed investigation prevents the generation and rendering of the Investigations manager until it is deleted.<br>The vulnerability requires an authenticated session and access to create an Investigation. It only affects the availability of the Investigations manager, but without the manager, the Investigations functionality becomes unusable for most users.
0
Attacker Value
Unknown
CVE-2024-22164
Disclosure Date: January 09, 2024 (last updated January 17, 2024)
In Splunk Enterprise Security (ES) versions below 7.1.2, an attacker can use investigation attachments to perform a denial of service (DoS) to the Investigation. The attachment endpoint does not properly limit the size of the request which lets an attacker cause the Investigation to become inaccessible.
0
Attacker Value
Unknown
CVE-2023-6071
Disclosure Date: November 30, 2023 (last updated December 06, 2023)
An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. This is possible as the input isn't correctly sanitized when adding a new data source.
0
Attacker Value
Unknown
CVE-2023-6070
Disclosure Date: November 29, 2023 (last updated December 06, 2023)
A server-side request forgery vulnerability in ESM prior to version 11.6.8 allows a low privileged authenticated user to upload arbitrary content, potentially altering configuration. This is possible through the certificate validation functionality where the API accepts uploaded content and doesn't parse for invalid data
0
Attacker Value
Unknown
CVE-2023-39246
Disclosure Date: November 16, 2023 (last updated November 30, 2023)
Dell Encryption, Dell Endpoint Security Suite Enterprise, and Dell Security Management Server version prior to 11.8.1 contain an Insecure Operation on Windows Junction Vulnerability during installation. A local malicious user could potentially exploit this vulnerability to create an arbitrary folder inside a restricted directory, leading to Privilege Escalation
0
Attacker Value
Unknown
CVE-2022-4132
Disclosure Date: October 04, 2023 (last updated October 09, 2023)
A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page).
0
Attacker Value
Unknown
CVE-2023-3314
Disclosure Date: July 03, 2023 (last updated October 08, 2023)
A vulnerability arises out of a failure to comprehensively sanitize the processing of a zip file(s). Incomplete neutralization of external commands used to control the process execution of the .zip application allows an authorized user to obtain control of the .zip application to execute arbitrary commands or obtain elevation of system privileges.
0