A vulnerability was found in Apache Commons VFS up to 2.9.x. It has been declared as problematic. Affected by this vulnerability is the function FtpFileObject. The manipulation leads to information exposure through error message.
This vulnerability is known as CVE-2025-30474. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apache Commons VFS up to 2.9.x. It has been classified as problematic. Affected is the function resolveFile of the component FileObject API. The manipulation of the argument Scope leads to relative path traversal.
This vulnerability is traded as CVE-2025-27553. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in nossrf up to 1.0.3 and classified as critical. This issue affects some unknown processing. The manipulation of the argument Hostname leads to server-side request forgery.
The identification of this vulnerability is CVE-2025-2691. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Canonical Ubuntu Linux and classified as critical. This vulnerability affects unknown code of the component HFS+ filesystem. The manipulation leads to out-of-bounds write.
This vulnerability was named CVE-2025-0927. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple iCloud up to 7.10 on Windows. It has been declared as critical. This vulnerability affects unknown code of the component WebKit. The manipulation leads to memory corruption.
This vulnerability was named CVE-2019-8558. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Adobe Acrobat Mobile Sign up to 24.4.2.33155 on Android and classified as problematic. This vulnerability affects unknown code. The manipulation leads to incorrect authorization.
This vulnerability was named CVE-2024-34130. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in PivotX up to 2.3.2. This vulnerability affects unknown code. The manipulation of the argument File leads to cross site scripting.
This vulnerability was named CVE-2012-2274. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, has been found in Verint WFO. This issue affects some unknown processing. The manipulation leads to basic cross site scripting.
The identification of this vulnerability is CVE-2024-36395. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Dell Secure Connect Gateway Policy Manager up to 5.22.00.18. It has been classified as problematic. This affects an unknown part. The manipulation leads to permissive cross-domain policy with untrusted domains.
This vulnerability is uniquely identified as CVE-2024-37131. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in cvat-ai cvat up to 2.14.2. This affects an unknown part of the component Export/Backup. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2024-37306. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.