A vulnerability allows unauthorized access to functionality inadequately constrained by ACLs. Attackers may exploit this to unauthenticated execute commands potentially leading to unauthorized data manipulation, access to privileged functions, or even the execution of arbitrary code.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC-NL

Published: 2024-07-02T07:42:08.260Z

Updated: 2024-08-02T19:09:49.350Z

Reserved: 2023-09-05T10:14:50.216Z

Link: CVE-2023-41918

cve-icon Vulnrichment

Updated: 2024-08-02T19:09:49.350Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-02T08:15:03.490

Modified: 2024-07-02T12:09:16.907

Link: CVE-2023-41918

cve-icon Redhat

No data.