A vulnerability was found in Cilium up to 1.14.17/1.15.11/1.16.4. It has been classified as problematic. Affected is an unknown function of the component DNS Handler. The manipulation leads to allocation of resources.
This vulnerability is traded as CVE-2025-23028. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in IBM Robotic Process Automation for Cloud Pak up to 21.0.7.19/23.0.19 and classified as problematic. This issue affects some unknown processing of the component Web UI. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-51457. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
American business services giant and government contractor Conduent confirmed today that a recent outage resulted from what it described as a "cyber security incident." [...]
A vulnerability has been found in Cisco BroadWorks and classified as critical. This vulnerability affects unknown code of the component SIP Processing Subsystem. The manipulation leads to uncontrolled memory allocation.
This vulnerability was named CVE-2025-20165. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as very critical, was found in Cisco Meeting Management up to 3.9.0. This affects an unknown part of the component REST API. The manipulation leads to improper handling of insufficient privileges.
This vulnerability is uniquely identified as CVE-2025-20156. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Cisco Secure Endpoint. Affected by this issue is some unknown functionality of the component ClamAV. The manipulation leads to heap-based buffer overflow.
This vulnerability is handled as CVE-2025-20128. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Umbraco CMS 14.3.1. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-55488. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in ps_contactinfo Module up to 3.3.2 on PrestaShop. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-24027. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in IBM Sterling B2B Integrator Standard Edition up to 6.1.2.5/6.2.0.2. It has been rated as very critical. This issue affects some unknown processing. The manipulation leads to deserialization.
The identification of this vulnerability is CVE-2024-31903. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in ARM Cortex-A72, Cortex-A73 and Cortex-A75. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to Privilege Escalation.
This vulnerability was named CVE-2024-10929. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in NLnet Labs Routinator. It has been classified as critical. This affects an unknown part. The manipulation leads to improper validation of syntactic correctness of input.
This vulnerability is uniquely identified as CVE-2025-0638. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Grau Data Blocky up to 3.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Login Screen. The manipulation leads to missing encryption of sensitive data.
This vulnerability is handled as CVE-2024-42012. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Grau Data Blocky up to 3.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component GUI. The manipulation leads to Privilege Escalation.
This vulnerability is known as CVE-2024-42013. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Synnefo Internet Management Software 2023. Affected is an unknown function. The manipulation leads to sql injection.
This vulnerability is traded as CVE-2023-37777. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in NextEPC MME up to 1.0.1. This issue affects some unknown processing of the component Emergency Number List Handler. The manipulation leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2023-36998. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical was found in Quick Count Plugin up to 3.00 on WordPress. This vulnerability affects unknown code. The manipulation leads to deserialization.
This vulnerability was named CVE-2025-23932. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as problematic has been found in PQINA Snippy Plugin up to 1.4.1 on WordPress. This affects an unknown part. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2025-23803. It is possible to initiate the attack remotely. There is no exploit available.