Show filters
3,546 Total Results
Displaying 211-220 of 3,546
Sort by:
Attacker Value
Unknown
CVE-2023-0627
Disclosure Date: September 25, 2023 (last updated February 25, 2025)
Docker Desktop 4.11.x allows --no-windows-containers flag bypass via IPC response spoofing which may lead to Local Privilege Escalation (LPE).This issue affects Docker Desktop: 4.11.X.
0
Attacker Value
Unknown
CVE-2023-0626
Disclosure Date: September 25, 2023 (last updated February 25, 2025)
Docker Desktop before 4.12.0 is vulnerable to RCE via query parameters in message-box route.
This issue affects Docker Desktop: before 4.12.0.
0
Attacker Value
Unknown
CVE-2023-0625
Disclosure Date: September 25, 2023 (last updated February 25, 2025)
Docker Desktop before 4.12.0 is vulnerable to RCE via a crafted extension description or changelog.
This issue affects Docker Desktop: before 4.12.0.
0
Attacker Value
Unknown
CVE-2023-32182
Disclosure Date: September 19, 2023 (last updated February 25, 2025)
A Improper Link Resolution Before File Access ('Link Following') vulnerability in SUSE SUSE Linux Enterprise Desktop 15 SP5 postfix, SUSE SUSE Linux Enterprise High Performance Computing 15 SP5 postfix, SUSE openSUSE Leap 15.5 postfix.This issue affects SUSE Linux Enterprise Desktop 15 SP5: before 3.7.3-150500.3.5.1; SUSE Linux Enterprise High Performance Computing 15 SP5: before 3.7.3-150500.3.5.1; openSUSE Leap 15.5 : before 3.7.3-150500.3.5.1.
0
Attacker Value
Unknown
CVE-2023-39215
Disclosure Date: September 12, 2023 (last updated February 25, 2025)
Improper authentication in Zoom clients may allow an authenticated user to conduct a denial of service via network access.
0
Attacker Value
Unknown
CVE-2023-3899
Disclosure Date: August 23, 2023 (last updated February 25, 2025)
A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.
0
Attacker Value
Unknown
CVE-2023-4417
Disclosure Date: August 21, 2023 (last updated February 25, 2025)
Improper access controls in the entry duplication component in Devolutions Remote Desktop Manager 2023.2.19 and earlier versions on Windows allows an authenticated user, under specific circumstances, to inadvertently share their personal vault entry with shared vaults via an incorrect vault in the duplication write process.
0
Attacker Value
Unknown
CVE-2023-4373
Disclosure Date: August 21, 2023 (last updated February 25, 2025)
Inadequate validation of permissions when employing remote tools and macros within Devolutions Remote Desktop Manager versions 2023.2.19 and earlier permits a user to initiate a connection without proper execution rights via the remote tools feature.
0
Attacker Value
Unknown
CVE-2023-40168
Disclosure Date: August 17, 2023 (last updated February 25, 2025)
TurboWarp is a desktop application that compiles scratch projects to JavaScript. TurboWarp Desktop versions prior to version 1.8.0 allowed a malicious project or custom extension to read arbitrary files from disk and upload them to a remote server. The only required user interaction is opening the sb3 file or loading the extension. The web version of TurboWarp is not affected. This bug has been addressed in commit `55e07e99b59` after an initial fix which was reverted. Users are advised to upgrade to version 1.8.0 or later. Users unable to upgrade should avoid opening sb3 files or loading extensions from untrusted sources.
0
Attacker Value
Unknown
CVE-2023-32453
Disclosure Date: August 16, 2023 (last updated February 25, 2025)
Dell BIOS contains an improper authentication vulnerability. A malicious user with physical access to the system may potentially exploit this vulnerability in order to modify a security-critical UEFI variable without knowledge of the BIOS administrator.
0