A vulnerability allows unauthorized access to functionality inadequately constrained by ACLs. Attackers may exploit this to unauthenticated execute commands potentially leading to unauthorized data manipulation, access to privileged functions, or even the execution of arbitrary code.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: NCSC-NL
Published: 2024-07-02T07:42:08.260Z
Updated: 2024-08-02T19:09:49.350Z
Reserved: 2023-09-05T10:14:50.216Z
Link: CVE-2023-41918
Vulnrichment
Updated: 2024-08-02T19:09:49.350Z
NVD
Status : Awaiting Analysis
Published: 2024-07-02T08:15:03.490
Modified: 2024-07-02T12:09:16.907
Link: CVE-2023-41918
Redhat
No data.