A vulnerability was found in D. Relton Medialist Plugin up to 1.4.0 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Shortcode Attribute Handler. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2023-5942. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apache Superset up to 2.1.1. It has been classified as critical. Affected is an unknown function of the component Gamma Role Handler. The manipulation leads to incorrect default permissions.
This vulnerability is traded as CVE-2023-42501. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Devolutions Server up to 2025.1.10.0. Affected by this vulnerability is an unknown functionality of the component Edit Permission Handler. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2025-0691. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability classified as problematic has been found in KC Group E-Commerce Software up to 20231123. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2023-4406. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Glewlwyd SSO Server up to 2.7.5. It has been classified as critical. This affects an unknown part of the file scheme/webauthn.c of the component webauthn Registration. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2023-49208. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in D-Link DIR-816 1.10CNB05 and classified as critical. Affected by this issue is the function wirelessApcli_5g of the file /goform/wirelessApcli_5g. The manipulation of the argument apcli_mode_5g/apcli_enc_5g/apcli_default_key_5g leads to stack-based buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is handled as CVE-2025-5622. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Linux Kernel up to 5.15.90/6.1.8. This vulnerability affects the function nfsd4_ssc_setup_dul. The manipulation leads to use after free.
This vulnerability was named CVE-2023-53025. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
The group has been operating since at least 2017, initially breaching systems belonging to the Kurdistan Regional Government and have expanded their reach to the Central Government of Iraq as well as a telecommunications provider in Uzbekistan.
A vulnerability has been found in RhinOS 3.0 Build 1190 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2018-18760. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in Tink up to 1.4. This affects an unknown part of the component Java. The manipulation leads to missing encryption of sensitive data.
This vulnerability is uniquely identified as CVE-2020-8929. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in SAP 3D Visual Enterprise Viewer 9. This vulnerability affects unknown code of the component RH File Handler. The manipulation leads to memory corruption.
This vulnerability was named CVE-2022-41201. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic was found in openlink virtuoso-opensource 7.2.11. Affected by this vulnerability is the function box_equal of the component SELECT Statement Handler. The manipulation leads to denial of service.
This vulnerability is known as CVE-2023-48951. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Totolink X6000R 9.4.0cu.852_B20230719. It has been declared as critical. This vulnerability affects the function sub_4119A0 of the file shttpd. The manipulation leads to os command injection.
This vulnerability was named CVE-2023-48802. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in WSO2 API Manager, Identity Server and IS as Key Manager and classified as critical. Affected by this issue is some unknown functionality of the component JIT Provisioning. The manipulation leads to improper authentication.
This vulnerability is handled as CVE-2023-6837. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Portainer CE 2.19.4 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to observable response discrepancy.
This vulnerability is known as CVE-2024-29296. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as very critical, has been found in Aruba InstantOS and ArubaOS up to 8.6.0.23/8.10.0.10/8.11.2.1/10.4.1.0/10.5.1.0. Affected by this issue is some unknown functionality of the component PAPI. The manipulation leads to buffer overflow.
This vulnerability is handled as CVE-2024-31467. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as very critical, was found in Aruba InstantOS and ArubaOS up to 8.6.0.23/8.10.0.10/8.11.2.1/10.4.1.0/10.5.1.0. This affects an unknown part of the component PAPI. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-31466. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Node.js. It has been classified as critical. Affected is the function process.mainModule.proto.require of the component Experimental Policy Handler. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2023-30581. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.