A vulnerability, which was classified as critical, has been found in Synology Drive Server. Affected by this issue is some unknown functionality. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2024-50631. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Shearwater SecurEnvoy SecurAccess Enrol up to 9.4.514. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to race condition.
This vulnerability is known as CVE-2025-30235. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Shearwater SecurEnvoy SecurAccess Enrol up to 9.4.514. It has been rated as critical. Affected by this issue is some unknown functionality of the component HTTP POST Request Handler. The manipulation leads to external control of assumed-immutable web parameter.
This vulnerability is handled as CVE-2025-30236. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Paul Ryley Site Reviews Plugin up to 7.2.4 on WordPress. This affects an unknown part of the component Review Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-1232. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in LoftOcean CozyStay Plugin and TinySalt Plugin up to 1.7.0 on WordPress and classified as critical. Affected by this vulnerability is the function ajax_handler. The manipulation leads to deserialization.
This vulnerability is known as CVE-2024-13410. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in LoftOcean CozyStay Plugin up to 1.7.0 on WordPress and classified as problematic. Affected by this issue is the function ajax_handler. The manipulation leads to missing authorization.
This vulnerability is handled as CVE-2024-13412. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in ThemeMove MinimogWP Plugin up to 3.7.0 on WordPress. It has been classified as critical. This affects an unknown part. The manipulation of the argument template leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is uniquely identified as CVE-2024-13790. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Elfatek Elektronics ANKA JPD-00028 up to 19.03.2025. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to authentication bypass by capture-replay.
The identification of this vulnerability is CVE-2024-12137. The attack can only be done within the local network. There is no exploit available.
A vulnerability classified as critical has been found in Apache Airflow MySQL Provider up to 6.1.x. Affected is an unknown function. The manipulation leads to sql injection.
This vulnerability is traded as CVE-2025-27018. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Melapress WP 2FA Plugin up to 2.2.0 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to improper authentication.
This vulnerability is handled as CVE-2022-44595. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in Outback Power Mojave Inverter. Affected by this vulnerability is an unknown functionality. The manipulation leads to use of get request method with sensitive query strings.
This vulnerability is known as CVE-2025-26473. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Synology DiskStation Manager, Unified Controller and BeeStation Manager. This issue affects some unknown processing. The manipulation leads to improper certificate validation.
The identification of this vulnerability is CVE-2024-10445. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Synology DiskStation Manager. Affected is an unknown function of the component LDAP Utilities. The manipulation leads to improper certificate validation.
This vulnerability is traded as CVE-2024-10444. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Synology DiskStation Manager, Unified Controller and BeeStation Manager and classified as very critical. Affected by this vulnerability is an unknown functionality of the component System Plugin Daemon. The manipulation leads to escaping of output.
This vulnerability is known as CVE-2024-10441. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Synology Unified Controller and Replication Service. It has been declared as very critical. This vulnerability affects unknown code. The manipulation leads to off-by-one.
This vulnerability was named CVE-2024-10442. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Synology Camera BC500, Camera CC400W and Camera TC500. It has been rated as very critical. This issue affects some unknown processing of the component Video Interface. The manipulation leads to out-of-bounds read.
The identification of this vulnerability is CVE-2024-11131. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.