The vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user and/or modify the contents of any data on the filesystem.
References
Configurations
No configuration.
History
13 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-13 19:15
Updated : 2025-02-13 19:15
NVD link : CVE-2025-1127
Mitre link : CVE-2025-1127
CVE.ORG link : CVE-2025-1127
JSON object : View
Products Affected
No product.