A vulnerability allows unauthorized access to functionality inadequately constrained by ACLs. Attackers may exploit this to execute commands potentially leading to unauthorized data manipulation, access to privileged functions, or the execution of arbitrary code
Reporter | Title | Published | Views | Family All 3 |
---|---|---|---|---|
![]() | CVE-2023-41918 Missing Authentication for Critical Function in Kiloview P1/P2 devices | 2 Jul 202407:42 | – | cvelist |
![]() | CVE-2023-41918 Missing Authentication for Critical Function in Kiloview P1/P2 devices | 2 Jul 202407:42 | – | vulnrichment |
![]() | CVE-2023-41918 | 2 Jul 202408:15 | – | cve |
Source | Link |
---|---|
advisories | www.advisories.ncsc.nl/advisory |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo