Show filters
3,317 Total Results
Displaying 381-390 of 3,317
Sort by:
Attacker Value
Unknown

CVE-2023-2622

Disclosure Date: November 01, 2023 (last updated February 25, 2025)
Authenticated clients can read arbitrary files on the MAIN Computer system using the remote procedure call (RPC) of the InspectSetup service endpoint. The low privilege client is then allowed to read arbitrary files that they do not have authorization to read.
Attacker Value
Unknown

CVE-2023-2621

Disclosure Date: November 01, 2023 (last updated February 25, 2025)
The McFeeder server (distributed as part of SSW package), is susceptible to an arbitrary file write vulnerability on the MAIN computer system. This vulnerability stems from the use of an outdated version of a third-party library, which is used to extract archives uploaded to McFeeder server. An authenticated malicious client can exploit this vulnerability by uploading a crafted ZIP archive via the network to McFeeder’s service endpoint.
Attacker Value
Unknown

CVE-2023-5839

Disclosure Date: October 29, 2023 (last updated February 25, 2025)
Privilege Chaining in GitHub repository hestiacp/hestiacp prior to 1.8.9.
Attacker Value
Unknown

CVE-2023-35794

Disclosure Date: October 27, 2023 (last updated February 25, 2025)
An issue was discovered in Cassia Access Controller 2.1.1.2303271039. The Web SSH terminal endpoint (spawned console) can be accessed without authentication. Specifically, there is no session cookie validation on the Access Controller; instead, there is only Basic Authentication to the SSH console.
Attacker Value
Unknown

CVE-2023-4967

Disclosure Date: October 27, 2023 (last updated February 25, 2025)
Denial of Service in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA Virtual Server
Attacker Value
Unknown

CVE-2023-22083

Disclosure Date: October 17, 2023 (last updated October 24, 2023)
Vulnerability in the Oracle Enterprise Session Border Controller product of Oracle Communications (component: Web UI). Supported versions that are affected are 9.0-9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Enterprise Session Border Controller. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Enterprise Session Border Controller accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
Attacker Value
Unknown

CVE-2023-4089

Disclosure Date: October 17, 2023 (last updated February 25, 2025)
On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected.
Attacker Value
Unknown

CVE-2023-45219

Disclosure Date: October 10, 2023 (last updated February 25, 2025)
Exposure of Sensitive Information vulnerability exist in an undisclosed BIG-IP TMOS shell (tmsh) command which may allow an authenticated attacker with resource administrator role privileges to view sensitive information.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Attacker Value
Unknown

CVE-2023-43746

Disclosure Date: October 10, 2023 (last updated February 25, 2025)
When running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing BIG-IP external monitor on a BIG-IP system.  A successful exploit can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Attacker Value
Unknown

CVE-2023-43611

Disclosure Date: October 10, 2023 (last updated February 25, 2025)
The BIG-IP Edge Client Installer on macOS does not follow best practices for elevating privileges during the installation process.  This vulnerability is due to an incomplete fix for CVE-2023-38418.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated