Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2023-52944

Description: Incorrect authorization vulnerability in ActionRule webapi component in Synology Surveillance Station before 9.2.0-11289 and 9.2.0-9289 allows remote authenticated users to perform limited actions on the set action rules function via unspecified vectors.

CVSS: MEDIUM (4.3)

EPSS Score: 0.04%

Source: CVE
December 5th, 2024 (5 months ago)

CVE-2023-52943

Description: Incorrect authorization vulnerability in Alert.Setting webapi component in Synology Surveillance Station before 9.2.0-11289 and 9.2.0-9289 allows remote authenticated users to to perform limited actions on the alerting function via unspecified vectors.

CVSS: MEDIUM (4.3)

EPSS Score: 0.04%

Source: CVE
December 5th, 2024 (5 months ago)

CVE-2023-35979

Description: There is an unauthenticated buffer overflow vulnerability in the process controlling the ArubaOS web-based management interface. Successful exploitation of this vulnerability results in a Denial-of-Service (DoS) condition affecting the web-based management interface of the controller.

CVSS: MEDIUM (5.3)

EPSS Score: 0.09%

Source: CVE
December 5th, 2024 (5 months ago)

CVE-2023-35977

Description: Vulnerabilities exist which allow an authenticated attacker to access sensitive information on the ArubaOS command line interface. Successful exploitation could allow access to data beyond what is authorized by the users existing privilege level.

CVSS: MEDIUM (6.5)

EPSS Score: 0.06%

Source: CVE
December 5th, 2024 (5 months ago)

CVE-2023-35976

Description: Vulnerabilities exist which allow an authenticated attacker to access sensitive information on the ArubaOS command line interface. Successful exploitation could allow access to data beyond what is authorized by the users existing privilege level.

CVSS: MEDIUM (6.5)

EPSS Score: 0.06%

Source: CVE
December 5th, 2024 (5 months ago)

CVE-2023-35975

Description: An authenticated path traversal vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to delete arbitrary files in the underlying operating system.

CVSS: MEDIUM (6.5)

EPSS Score: 0.08%

Source: CVE
December 5th, 2024 (5 months ago)

CVE-2023-33842

Description: IBM SPSS Modeler on Windows 17.0, 18.0, 18.2.2, 18.3, 18.4, and 18.5 requires the end user to have access to the server SSL key which could allow a local user to decrypt and obtain sensitive information. IBM X-Force ID: 256117.

CVSS: MEDIUM (6.2)

EPSS Score: 0.04%

Source: CVE
December 5th, 2024 (5 months ago)

CVE-2023-3114

Description: Terraform Enterprise since v202207-1 did not properly implement authorization rules for agent pools, allowing the workspace to be targeted by unauthorized agents. This authorization flaw could potentially allow a workspace to access resources from a separate, higher-privileged workspace in the same organization that targeted an agent pool. This vulnerability, CVE-2023-3114, is fixed in Terraform Enterprise v202306-1.

CVSS: MEDIUM (5.0)

EPSS Score: 0.06%

Source: CVE
December 5th, 2024 (5 months ago)

CVE-2023-28065

Description: Dell Command | Update, Dell Update, and Alienware Update versions 4.8.0 and prior contain an Insecure Operation on Windows Junction / Mount Point vulnerability. A local malicious user could potentially exploit this vulnerability leading to privilege escalation.

CVSS: MEDIUM (6.7)

EPSS Score: 0.04%

Source: CVE
December 5th, 2024 (5 months ago)

CVE-2023-28026

Description: Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.

CVSS: MEDIUM (5.1)

EPSS Score: 0.04%

Source: CVE
December 5th, 2024 (5 months ago)