A vulnerability was found in McAfee ePolicy Orchestrator 4.6.6 Build 176. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file ComputerMgmt/sysDetPanelQry.do. The manipulation of the argument uid/orion.user.security.token/ajaxMode as part of GET Request leads to cross site scripting (Reflected).
This vulnerability is known as CVE-2013-4883. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in CARE2X and classified as critical. This issue affects some unknown processing of the file main/config_options_gui_template.php. The manipulation of the argument root_path leads to improper privilege management.
The identification of this vulnerability is CVE-2007-1458. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Veeam Agent up to 6.3.1.1074 on Windows. Affected is an unknown function. The manipulation leads to permission issues.
This vulnerability is traded as CVE-2025-24287. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in ZyXEL P660HN-T1A up to 7.3.15.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file ViewLog.asp of the component Remote System Log Forwarder. The manipulation of the argument remote_host as part of Parameter leads to command injection.
This vulnerability is known as CVE-2017-18368. The attack can be launched remotely. Furthermore, there is an exploit available.
Critical Sudo flaws let local users gain root access on Linux systems, the vulnerabilities affect major Linux distributions. Cybersecurity researchers disclosed two vulnerabilities in the Sudo command-line utility for Linux and Unix-like operating systems. Local attackers can exploit the vulnerabilities to escalate privileges to root on affected systems. Sudo (short for “superuser do”) is a […]
A vulnerability classified as problematic was found in HDF5 1.14.6. This vulnerability affects the function H5FS__sinfo_serialize_node_cb of the file src/H5FScache.c. The manipulation leads to heap-based buffer overflow.
This vulnerability was named CVE-2025-7067. Local access is required to approach this attack. Furthermore, there is an exploit available.
A vulnerability has been found in CARE2X and classified as critical. This vulnerability affects unknown code of the file main/chg-color.php. The manipulation of the argument root_path leads to improper privilege management.
This vulnerability was named CVE-2007-1458. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in FAQSystems FAQRing Knowledge Base Software up to 3.0. This issue affects some unknown processing of the file answer.php. The manipulation of the argument ID leads to sql injection.
The identification of this vulnerability is CVE-2005-3882. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Palo Alto Traps Server 3.1.2.1546. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument b:Arguments/b:FileName/b:URL leads to cross site scripting.
This vulnerability is handled as CVE-2015-2223. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Scott Paterson Easy Stripe Plugin up to 1.1 on WordPress. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to code injection.
The identification of this vulnerability is CVE-2025-49302. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in DynamiApps Frontend Admin Plugin up to 3.28.7 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to denial of service.
This vulnerability is known as CVE-2025-49303. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in cmoreira Testimonials Showcase Plugin up to 1.9.16 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-49245. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in Linux Kernel up to 6.16-rc1/6.16-rc2. Affected is an unknown function. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2025-38178. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.34/6.15.3/6.16-rc2 and classified as problematic. This issue affects the function smb_extract_folioq_to_rdma of the component SMB Client. The manipulation leads to out-of-bounds read.
The identification of this vulnerability is CVE-2025-38179. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.16-rc2 and classified as critical. Affected by this issue is the function calipso_req_setattr/calipso_req_delattr of the component calipso. The manipulation leads to improper update of reference count.
This vulnerability is handled as CVE-2025-38181. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.6.94/6.12.34/6.15.3/6.16-rc2. This affects an unknown part of the component ublk. The manipulation leads to privilege escalation.
This vulnerability is uniquely identified as CVE-2025-38182. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in ArGoSoft FTP Server up to 1.4.2.6 and classified as very critical. This vulnerability affects unknown code. The manipulation leads to Remote Code Execution.
This vulnerability was named CVE-2005-0519. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Mono 1.0.5. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting.
This vulnerability is handled as CVE-2005-0509. The attack may be launched remotely. There is no exploit available.