A vulnerability was found in D-Link DAP-1620 1.03 and classified as critical. This issue affects the function check_dws_cookie of the file /storage. The manipulation of the argument uid leads to stack-based buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer.
The identification of this vulnerability is CVE-2025-2621. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability has been found in D-Link DAP-1620 1.03 and classified as critical. This vulnerability affects the function mod_graph_auth_uri_handler of the file /storage of the component Authentication Handler. The manipulation leads to stack-based buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability was named CVE-2025-2620. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is uniquely identified as CVE-2025-2619. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability, which was classified as critical, has been found in D-Link DAP-1620 1.03. Affected by this issue is the function set_ws_action of the file /dws/api/ of the component Path Handler. The manipulation leads to heap-based buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is handled as CVE-2025-2618. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability, which was classified as very critical, was found in Microsoft Windows 10 1903/10 1909/Server 1903/Server 1909. Affected is an unknown function of the component SMBv3. The manipulation as part of Server Message Block leads to memory corruption.
This vulnerability is traded as CVE-2020-0796. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A worm is spreading, which is automatically exploiting this vulnerability.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic was found in yangyouwang 杨有旺 crud 简约后台管理系统 1.0.0. Affected by this vulnerability is an unknown functionality of the component Department Page. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-2617. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic has been found in yangyouwang 杨有旺 crud 简约后台管理系统 1.0.0. Affected is an unknown function of the component Role Management Page. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-2616. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Microsoft Edge. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to link following.
The identification of this vulnerability is CVE-2025-29795. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Microsoft Edge. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to Remote Code Execution.
This vulnerability was named CVE-2025-29806. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.