A logged in user can modify specific files that may lead to unauthorized changes in system-wide configuration settings. This vulnerability could be exploited to compromise the integrity and security of the network on the affected system.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: hackerone

Published: 2023-11-14T23:18:08.379Z

Updated: 2023-11-14T23:18:08.379Z

Reserved: 2023-07-20T01:00:12.443Z


Link: CVE-2023-38544

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-11-15T00:15:08.237

Modified: 2023-11-22T15:07:44.133


Link: CVE-2023-38544

JSON object: View

cve-icon Redhat Information

No data.