Show filters
3,546 Total Results
Displaying 261-270 of 3,546
Sort by:
Attacker Value
Unknown

CVE-2023-28267

Disclosure Date: April 11, 2023 (last updated February 24, 2025)
Remote Desktop Protocol Client Information Disclosure Vulnerability
Attacker Value
Unknown

CVE-2023-1980

Disclosure Date: April 11, 2023 (last updated February 24, 2025)
Two factor authentication bypass on login in Devolutions Remote Desktop Manager 2022.3.35 and earlier allow user to cancel the two factor authentication via the application user interface and open entries.
Attacker Value
Unknown

CVE-2023-1939

Disclosure Date: April 11, 2023 (last updated February 24, 2025)
No access control for the OTP key   on OTP entries in Devolutions Remote Desktop Manager Windows 2022.3.33.0 and prior versions and Remote Desktop Manager Linux 2022.3.2.0 and prior versions allows non admin users to see OTP keys via the user interface.
Attacker Value
Unknown

CVE-2023-1802

Disclosure Date: April 06, 2023 (last updated February 24, 2025)
In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a disclosure of sensitive information. Only users who have Access Experimental Features enabled and have logged in to a private registry are affected.
Attacker Value
Unknown

CVE-2023-29000

Disclosure Date: April 04, 2023 (last updated February 24, 2025)
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.7.0, by trusting that the server will return a certificate that belongs to the keypair of the user, a malicious server could get the desktop client to encrypt files with a key known to the attacker. This issue is fixed in Nextcloud Desktop 3.7.0. No known workarounds are available.
Attacker Value
Unknown

CVE-2023-28999

Disclosure Date: April 04, 2023 (last updated February 24, 2025)
Nextcloud is an open-source productivity platform. In Nextcloud Desktop client 3.0.0 until 3.8.0, Nextcloud Android app 3.13.0 until 3.25.0, and Nextcloud iOS app 3.0.5 until 4.8.0, a malicious server administrator can gain full access to an end-to-end encrypted folder. They can decrypt files, recover the folder structure and add new files.​ This issue is fixed in Nextcloud Desktop 3.8.0, Nextcloud Android 3.25.0, and Nextcloud iOS 4.8.0. No known workarounds are available.
Attacker Value
Unknown

CVE-2023-28998

Disclosure Date: April 04, 2023 (last updated February 24, 2025)
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.6.5, a malicious server administrator can gain full access to an end-to-end encrypted folder. They can decrypt files, recover the folder structure, and add new files.​ Users should upgrade the Nextcloud Desktop client to 3.6.5 to receive a patch. No known workarounds are available.
Attacker Value
Unknown

CVE-2023-28997

Disclosure Date: April 04, 2023 (last updated February 24, 2025)
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.6.5, a malicious server administrator can recover and modify the contents of end-to-end encrypted files. Users should upgrade the Nextcloud Desktop client to 3.6.5 to receive a patch. No known workarounds are available.
Attacker Value
Unknown

CVE-2023-1574

Disclosure Date: April 02, 2023 (last updated February 24, 2025)
Information disclosure in the user creation feature of a MSSQL data source in Devolutions Remote Desktop Manager 2023.1.9 and below on Windows allows an attacker with access to the user interface to obtain sensitive information via the error message dialog that displays the password in clear text.
Attacker Value
Unknown

CVE-2023-1202

Disclosure Date: April 02, 2023 (last updated February 24, 2025)
Permission bypass when importing or synchronizing entries in User vault in Devolutions Remote Desktop Manager 2023.1.9 and prior versions allows users with restricted rights to bypass entry permission via id collision.