A logged in user can modify specific files that may lead to unauthorized changes in system-wide configuration settings. This vulnerability could be exploited to compromise the integrity and security of the network on the affected system.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published: 2023-11-14T23:18:08.379Z

Updated: 2024-08-29T17:18:34.932Z

Reserved: 2023-07-20T01:00:12.443Z

Link: CVE-2023-38544

cve-icon Vulnrichment

Updated: 2024-08-02T17:46:55.653Z

cve-icon NVD

Status : Analyzed

Published: 2023-11-15T00:15:08.237

Modified: 2023-11-22T15:07:44.133

Link: CVE-2023-38544

cve-icon Redhat

No data.