A vulnerability allows unauthorized access to functionality inadequately constrained by ACLs. Attackers may exploit this to unauthenticated execute commands potentially leading to unauthorized data manipulation, access to privileged functions, or even the execution of arbitrary code.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273 |
![]() ![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: NCSC-NL
Published: 2024-07-02T07:42:08.260Z
Updated: 2024-08-02T19:09:49.350Z
Reserved: 2023-09-05T10:14:50.216Z
Link: CVE-2023-41918

Updated: 2024-08-02T19:09:49.350Z

Status : Awaiting Analysis
Published: 2024-07-02T08:15:03.490
Modified: 2024-11-21T08:21:55.230
Link: CVE-2023-41918

No data.