A vulnerability classified as critical was found in Mattermost Desktop App up to 5.10.0 on macOS. Affected by this vulnerability is an unknown functionality. The manipulation leads to untrusted search path.
This vulnerability is known as CVE-2025-1398. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Extensive VC Addons for WPBakery Page Builder Plugin up to 1.8.x on WordPress. This affects an unknown part of the component Template Handler. The manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2023-0159. The attack needs to be approached within the local network. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Artifex Ghostscript up to 10.0.2.x and classified as critical. Affected by this vulnerability is the function pdf_base_font_alloc of the component BaseFont Name Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is known as CVE-2024-29508. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Artifex Ghostscript up to 10.2.x and classified as critical. Affected by this issue is the function pdfi_apply_filter of the component PDF Filter Name Handler. The manipulation leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2024-29506. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Artifex Ghostscript up to 10.2.x. It has been classified as critical. This affects an unknown part of the component PDFPassword Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is uniquely identified as CVE-2024-29509. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in 7-Zip up to 24.00. Affected is an unknown function of the file NtfsHandler.cpp of the component NTFS Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is traded as CVE-2023-52168. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Discourse up to 3.2.2/3.3.0.beta2. It has been rated as problematic. This issue affects some unknown processing of the component Meta Tag Handler. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-35234. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Discourse up to 3.2.2/3.3.0.beta3. Affected is an unknown function of the component Setting Handler. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2024-36122. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Artifex Ghostscript up to 10.03.0. Affected by this issue is the function debug_file of the file /tmp/out of the component Tesseract. The manipulation leads to path traversal.
This vulnerability is handled as CVE-2024-29511. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple iTunes up to 12.9.3 on Windows. It has been rated as critical. Affected by this issue is some unknown functionality of the component WebKit. The manipulation leads to type confusion.
This vulnerability is handled as CVE-2019-8506. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
<p>Play We’re excited to share some big news: Trimarc Security is now fully operating under TrustedSec! This marks a significant step forward in our mission to provide real-world security guidance to help our partners…</p>
A vulnerability was found in FFmpeg 4.2. It has been rated as critical. Affected by this issue is the function filter_edges of the file libavfilter/vf_yadif.c. The manipulation leads to buffer overflow.
This vulnerability is handled as CVE-2020-22021. The attack may be launched remotely. There is no exploit available.