CVE-2023-52651
"DOA-1234:** COVID-19 Data Overlay Attack in Kerberos Authentication"
Description
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
INFO
Published Date :
May 1, 2024, 1:15 p.m.
Last Modified :
May 2, 2024, 10:15 a.m.
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Remotely Exploitable :
No
Impact Score :
Exploitability Score :
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2023-52651
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2023-52651
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Rejected by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 02, 2024
Action Type Old Value New Value -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 02, 2024
Action Type Old Value New Value Changed Description In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() We should check whether the WMI_TLV_TAG_STRUCT_MGMT_TX_COMPL_EVENT tlv is present before accessing it, otherwise a null pointer deference error will occur. Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Removed Reference kernel.org https://git.kernel.org/stable/c/0cd3b0a1dc987697cba1fe93c784365aa1f8a230 Removed Reference kernel.org https://git.kernel.org/stable/c/88a9dffaec779504ab3680d33cf677741c029420 Removed Reference kernel.org https://git.kernel.org/stable/c/e1dc7aa814a95aeeb1b2c05be2b62af8423b15cc Removed Reference kernel.org https://git.kernel.org/stable/c/4c4e592266b6eec748ce90e82bd9cbc9838f3633 Removed Reference kernel.org https://git.kernel.org/stable/c/90f089d77e38db1c48629f111f3c8c336be1bc38 Removed Reference kernel.org https://git.kernel.org/stable/c/10a342fa2fe4c4dd22f2c8fe917d3b1929582076 Removed Reference kernel.org https://git.kernel.org/stable/c/db755cf93f5895bbac491d27a8e2fe04c5f9ae4a Removed Reference kernel.org https://git.kernel.org/stable/c/835c5d37f4b0ba99e9ec285ffa645bc532714191 Removed Reference kernel.org https://git.kernel.org/stable/c/ad25ee36f00172f7d53242dc77c69fff7ced0755 -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 01, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() We should check whether the WMI_TLV_TAG_STRUCT_MGMT_TX_COMPL_EVENT tlv is present before accessing it, otherwise a null pointer deference error will occur. Added Reference kernel.org https://git.kernel.org/stable/c/0cd3b0a1dc987697cba1fe93c784365aa1f8a230 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/88a9dffaec779504ab3680d33cf677741c029420 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/e1dc7aa814a95aeeb1b2c05be2b62af8423b15cc [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/4c4e592266b6eec748ce90e82bd9cbc9838f3633 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/90f089d77e38db1c48629f111f3c8c336be1bc38 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/10a342fa2fe4c4dd22f2c8fe917d3b1929582076 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/db755cf93f5895bbac491d27a8e2fe04c5f9ae4a [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/835c5d37f4b0ba99e9ec285ffa645bc532714191 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/ad25ee36f00172f7d53242dc77c69fff7ced0755 [No types assigned]
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2023-52651
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2023-52651
weaknesses.