A vulnerability allows unauthorized access to functionality inadequately constrained by ACLs. Attackers may exploit this to unauthenticated execute commands potentially leading to unauthorized data manipulation, access to privileged functions, or even the execution of arbitrary code.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273 |
|
History
No history.
Status: PUBLISHED
Assigner: NCSC-NL
Published: 2024-07-02T07:42:08.260Z
Updated: 2024-08-02T19:09:49.350Z
Reserved: 2023-09-05T10:14:50.216Z
Link: CVE-2023-41918
Updated: 2024-08-02T19:09:49.350Z
Status : Awaiting Analysis
Published: 2024-07-02T08:15:03.490
Modified: 2024-11-21T08:21:55.230
Link: CVE-2023-41918
No data.