Vulnerabilities > Exposure of System Data to an Unauthorized Control Sphere
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-11-14 | CVE-2023-41366 | Exposure of System Data to an Unauthorized Control Sphere vulnerability in SAP Netweaver Application Server Abap Under certain condition SAP NetWeaver Application Server ABAP - versions KERNEL 722, KERNEL 7.53, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.91, KERNEL 7.92, KERNEL 7.93, KERNEL 7.94, KERNEL64UC 7.22, KERNEL64UC 7.22EXT, KERNEL64UC 7.53, KERNEL64NUC 7.22, KERNEL64NUC 7.22EXT, allows an unauthenticated attacker to access the unintended data due to the lack of restrictions applied which may lead to low impact in confidentiality and no impact on the integrity and availability of the application. | 5.3 |
2022-09-01 | CVE-2022-1902 | Exposure of System Data to an Unauthorized Control Sphere vulnerability in Redhat Advanced Cluster Security 3.68/3.69/3.70 A flaw was found in the Red Hat Advanced Cluster Security for Kubernetes. | 8.8 |
2022-09-01 | CVE-2022-2403 | Exposure of System Data to an Unauthorized Control Sphere vulnerability in Redhat Openshift 4.9 A credentials leak was found in the OpenShift Container Platform. | 6.5 |
2021-06-04 | CVE-2021-1544 | Exposure of System Data to an Unauthorized Control Sphere vulnerability in Cisco Webex Meetings A vulnerability in logging mechanisms of Cisco Webex Meetings client software could allow an authenticated, local attacker to gain access to sensitive information. | 5.5 |
2021-05-06 | CVE-2021-1535 | Exposure of System Data to an Unauthorized Control Sphere vulnerability in Cisco Sd-Wan Vmanage A vulnerability in the cluster management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to view sensitive information on an affected system. | 5.3 |
2021-01-20 | CVE-2021-1235 | Exposure of System Data to an Unauthorized Control Sphere vulnerability in Cisco Sd-Wan Vmanage 18.2.0 A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to read sensitive database files on an affected system. | 4.9 |