A vulnerability was found in LDS Crypt::CBC up to 3.04 on Perl. It has been declared as problematic. This vulnerability affects the function rand. The manipulation leads to cryptographically weak prng.
This vulnerability was named CVE-2025-2814. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in TOTOLINK A3700R 9.1.2u.6165_20211012. It has been declared as critical. This vulnerability affects the function setWiFiEasyCfg. The manipulation of the argument ssid leads to stack-based buffer overflow.
This vulnerability was named CVE-2024-37634. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in TOTOLINK A3700R 9.1.2u.6165_20211012. Affected is the function loginAuth. The manipulation of the argument Password leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2024-37632. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Libarchive up to 3.7.3. It has been declared as problematic. Affected by this vulnerability is the function slurp_central_directory of the file archive_read_support_format_zip.c of the component mac-ext Handler. The manipulation leads to out-of-bounds read.
This vulnerability is known as CVE-2024-37407. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Xinhu RockOA 2.6.3. This vulnerability affects unknown code of the file /chajian/inputChajian.php. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-37624. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Tessi Docubase Document Management 5.x. This issue affects some unknown processing. The manipulation of the argument page leads to cross site scripting.
The identification of this vulnerability is CVE-2024-37671. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in ProtonVPN up to 3.2.9 on Windows. It has been rated as problematic. Affected by this issue is some unknown functionality of the file Setup/setup.iss. The manipulation leads to privilege escalation.
This vulnerability is handled as CVE-2024-37391. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in MIT Kerberos 5 up to 1.21.2. This affects an unknown part of the component GSS Message Token Handler. The manipulation leads to privilege escalation.
This vulnerability is uniquely identified as CVE-2024-37371. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Couchbase Server up to 7.2.4/7.6.0. Affected by this issue is some unknown functionality of the component KV Service. The manipulation leads to inadequate encryption strength.
This vulnerability is handled as CVE-2024-37034. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in MIT Kerberos 5 up to 1.21.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the component GSS Message Token Handler. The manipulation leads to privilege escalation.
This vulnerability is handled as CVE-2024-37370. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in TARGIT Decision Suite 23.2.15007.0. Affected is an unknown function of the component Session Token Handler. The manipulation leads to missing encryption of sensitive data.
This vulnerability is traded as CVE-2024-36426. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Micro-Star International Z590, Z490, Z790, B760, B560, B660 and B460. It has been declared as critical. This vulnerability affects unknown code of the component SMI Handler. The manipulation leads to write-what-where condition.
This vulnerability was named CVE-2024-36877. Access to the local network is required for this attack. There is no exploit available.
A vulnerability was found in naga 0.14.0. It has been declared as critical. This vulnerability affects unknown code of the file /wgsl/parse/mod.rs. The manipulation leads to stack-based buffer overflow.
This vulnerability was named CVE-2024-36761. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in tecnick tcpdf up to 6.7.x. It has been declared as problematic. Affected by this vulnerability is the function unserializeTCPDFtag of the component Tag Hash Handler. The manipulation leads to incorrect comparison.
This vulnerability is known as CVE-2024-56522. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Gogs up to 0.13.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file internal/ssh/ssh.go of the component SSH Connection Handler. The manipulation leads to argument injection.
This vulnerability is known as CVE-2024-39930. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.