Show filters
3,317 Total Results
Displaying 381-390 of 3,317
Sort by:
Attacker Value
Unknown
CVE-2023-2622
Disclosure Date: November 01, 2023 (last updated February 25, 2025)
Authenticated clients can read arbitrary files on the MAIN Computer
system using the remote procedure call (RPC) of the InspectSetup
service endpoint. The low privilege client is then allowed to read arbitrary files that they do not have authorization to read.
0
Attacker Value
Unknown
CVE-2023-2621
Disclosure Date: November 01, 2023 (last updated February 25, 2025)
The McFeeder server (distributed as part of SSW package), is susceptible to an arbitrary file write vulnerability on the MAIN computer
system. This vulnerability stems from the use of an outdated version of a third-party library, which is used to extract archives uploaded to McFeeder server. An authenticated malicious client can
exploit this vulnerability by uploading a crafted ZIP archive via the
network to McFeeder’s service endpoint.
0
Attacker Value
Unknown
CVE-2023-5839
Disclosure Date: October 29, 2023 (last updated February 25, 2025)
Privilege Chaining in GitHub repository hestiacp/hestiacp prior to 1.8.9.
0
Attacker Value
Unknown
CVE-2023-35794
Disclosure Date: October 27, 2023 (last updated February 25, 2025)
An issue was discovered in Cassia Access Controller 2.1.1.2303271039. The Web SSH terminal endpoint (spawned console) can be accessed without authentication. Specifically, there is no session cookie validation on the Access Controller; instead, there is only Basic Authentication to the SSH console.
0
Attacker Value
Unknown
CVE-2023-4967
Disclosure Date: October 27, 2023 (last updated February 25, 2025)
Denial of Service in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA Virtual Server
0
Attacker Value
Unknown
CVE-2023-22083
Disclosure Date: October 17, 2023 (last updated October 24, 2023)
Vulnerability in the Oracle Enterprise Session Border Controller product of Oracle Communications (component: Web UI). Supported versions that are affected are 9.0-9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Enterprise Session Border Controller. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Enterprise Session Border Controller accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
0
Attacker Value
Unknown
CVE-2023-4089
Disclosure Date: October 17, 2023 (last updated February 25, 2025)
On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected.
0
Attacker Value
Unknown
CVE-2023-45219
Disclosure Date: October 10, 2023 (last updated February 25, 2025)
Exposure of Sensitive Information vulnerability exist in an undisclosed BIG-IP TMOS shell (tmsh) command which may allow an authenticated attacker with resource administrator role privileges to view sensitive information.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2023-43746
Disclosure Date: October 10, 2023 (last updated February 25, 2025)
When running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing BIG-IP external monitor on a BIG-IP system. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2023-43611
Disclosure Date: October 10, 2023 (last updated February 25, 2025)
The BIG-IP Edge Client Installer on macOS does not follow best practices for elevating privileges during the installation process. This vulnerability is due to an incomplete fix for CVE-2023-38418. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
0