A vulnerability was found in Apple macOS up to 13.2.1. It has been declared as problematic. This vulnerability affects unknown code of the component TCC. The manipulation leads to improper access controls.
This vulnerability was named CVE-2023-27931. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple iOS and iPadOS up to 16.3.1. It has been rated as problematic. This issue affects some unknown processing of the component AppleMobileFileIntegrity. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2023-27931. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple iOS and iPadOS up to 16.3.1 and classified as problematic. This issue affects some unknown processing of the component TCC. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2023-27931. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in llvm-project a0138390. It has been classified as critical. This affects an unknown part. The manipulation leads to reachable assertion.
This vulnerability is uniquely identified as CVE-2023-29935. It is possible to launch the attack on the local host. There is no exploit available.
A vulnerability was found in llvm-project 6c01b5c. It has been rated as problematic. This issue affects the function mlir::Type::getDialect. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2023-29934. An attack has to be approached locally. There is no exploit available.
A vulnerability, which was classified as critical, has been found in llvm-project a0138390. Affected by this issue is the function mlir::spirv::TargetEnv::TargetEnv(mlir::spirv::TargetEnvAttr). The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2023-29939. It is possible to launch the attack on the local host. There is no exploit available.
A vulnerability, which was classified as critical, was found in llvm-project a0138390. This affects the function mlir::Type::isa<mlir::LLVM::LLVMVoidType. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2023-29942. The attack needs to be approached locally. There is no exploit available.
A vulnerability has been found in S-CMS 5.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/ajax.php. The manipulation leads to Privilege Escalation.
This vulnerability is known as CVE-2023-29963. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in FiiO M6 1.0.4. Affected is an unknown function of the file /proc/ftxxxx-debug. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2023-30257. The attack can only be done within the local network. Furthermore, there is an exploit available.
A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. This vulnerability affects unknown code. The manipulation of the argument QTY leads to sql injection.
This vulnerability was named CVE-2023-30092. The attack can be initiated remotely. There is no exploit available.
Italy’s data privacy regulator Garante has requested information from Chinese AI company DeepSeek regarding its data practices. Italy’s Data Protection Authority Garante has asked the AI firm DeepSeek to clarify its data collection, sources, purposes, legal basis, and storage, citing potential risks to user data. “The Italian Data Protection Authority has sent a request for […]
A vulnerability, which was classified as critical, was found in Pluck CMS up to 4.7.13. Affected is an unknown function. The manipulation leads to unrestricted upload.
This vulnerability is traded as CVE-2020-29607. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.