Cisco encourages users to update to an unaffected version of its Adaptive Security Appliance (ASA) software since there are no workarounds for the 2014 vulnerability.
A vulnerability has been found in Google Android 11/12/12L/13/14 and classified as problematic. This vulnerability affects unknown code of the component PDF Output Handler. The manipulation leads to information disclosure.
This vulnerability was named CVE-2023-40093. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic has been found in Apple macOS. This affects an unknown part of the component App. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2023-42878. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Apple watchOS. This vulnerability affects unknown code of the component App. The manipulation leads to improper access controls.
This vulnerability was named CVE-2023-42878. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Apple iOS and iPadOS. This issue affects some unknown processing of the component App. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2023-42878. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Apple macOS. Affected by this issue is some unknown functionality of the component App. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2023-42859. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Apple macOS 12.6/13.5/14.0. This affects an unknown part. The manipulation leads to permission issues.
This vulnerability is uniquely identified as CVE-2023-42860. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Open Networking Foundation SD-RAN ONOS onos-lib-go 0.10.25. Affected by this vulnerability is the function parseAlignBits. The manipulation leads to improper validation of array index.
This vulnerability is known as CVE-2023-52727. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability has been found in Apple macOS and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2023-42858. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Apple iOS and iPadOS up to 17.0. This vulnerability affects unknown code of the component Apple ID Handler. The manipulation leads to state issue.
This vulnerability was named CVE-2023-42855. It is possible to launch the attack on the physical device. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Oracle Banking Enterprise Collections 2.7.0/2.8.0. It has been declared as critical. This vulnerability affects unknown code of the component User Interface. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2020-11022. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Openswan. It has been classified as problematic. Affected is an unknown function of the file ipseclive.conn. The manipulation leads to link following.
This vulnerability is traded as CVE-2008-4190. The attack needs to be approached locally. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Cowonamerica Cowon Media Center-jetaudio 7.5.3 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improper resource management.
This vulnerability is handled as CVE-2009-3948. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Softonic SciTE 1.72. This vulnerability affects unknown code. The manipulation leads to memory corruption.
This vulnerability was named CVE-2009-3857. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic was found in FreeBSD 6.0/8.0. Affected by this vulnerability is an unknown functionality of the file dev. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2009-2649. Attacking locally is a requirement. Furthermore, there is an exploit available.