Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-3632

EPSS 1.21% · P79
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-3632

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Red Hat产品权限许可和访问控制问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat Enterprise Linux是美国红帽(Red Hat)公司的面向企业用户的Linux操作系统 Red Hat openstack-neutron package 2014.1.2-4之前版本、Red Hat Enterprise Linux Open Stack Platform 5.0版本存在权限许可和访问控制问题漏洞。远程攻击者利用该漏洞获取权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-3632

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-3632

登录查看更多情报信息。

Same Patch Batch · n/a · 2014-10-07 · 20 CVEs total

CVE-2014-7235FreePBX 代码注入漏洞
CVE-2014-4871NetCommWireless NB604N Routers 跨站脚本漏洞
CVE-2014-4870Brocade Vyatta 5400 vRouter 输入验证漏洞
CVE-2014-4869Brocade Vyatta 5400 vRouter 权限许可和访问控制漏洞
CVE-2014-4868Brocade Vyatta 5400 vRouter 操作系统命令注入漏洞
CVE-2014-4802IBM Business Process Manager 权限许可和访问控制漏洞
CVE-2014-3399Cisco Adaptive Security Appliances 代码注入漏洞
CVE-2014-0940IBM Tivoli Service Automation Manager 跨站脚本漏洞
CVE-2014-6287Rejetto HTTP File Server‘ParserLib.pas’代码注入漏洞
CVE-2014-7295MediaWiki 跨站脚本漏洞
CVE-2014-3565Net-SNMP 资源管理错误漏洞
CVE-2014-7204Exuberant Ctags 资源管理错误漏洞
CVE-2014-7189Google Go 权限许可和访问控制漏洞
CVE-2014-6603Suricata 资源管理错误漏洞
CVE-2014-6434GoPro HERO 3+ 操作系统命令注入漏洞
CVE-2014-6433GoPro HERO 3+ 代码注入漏洞
CVE-2014-5503Sophos Cyberoam appliances with CyberoamOS SQL注入漏洞
CVE-2014-5502Sophos Cyberoam appliances with CyberoamOS 操作系统命令注入漏洞
CVE-2014-5501Sophos Cyberoam appliances with CyberoamOS 基于栈的缓冲区溢出漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2014-3632

No comments yet


Leave a comment