International cooperation, reporting, and capacity building are critical to enhance cybersecurity defenses. Effective governance in an increasingly risky landscape requires visibility as well as coordinated vulnerability disclosure.
A vulnerability classified as critical was found in Assimp. Affected by this vulnerability is the function OpenDDLParser::parseStructure of the component OpenGEX File Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is known as CVE-2024-48424. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Assimp 5.4.3. This affects the function CallbackToLogRedirector. The manipulation leads to Local Privilege Escalation.
This vulnerability is uniquely identified as CVE-2024-48423. Attacking locally is a requirement. There is no exploit available.
A vulnerability has been found in Assimp and classified as problematic. Affected by this vulnerability is the function Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2024-48425. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in JetBrains TeamCity and classified as problematic. This issue affects some unknown processing of the component base64 Encoding. The manipulation leads to sensitive information in log files.
The identification of this vulnerability is CVE-2025-31139. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in JetBrains TeamCity. It has been classified as problematic. Affected is an unknown function of the component Cloud Profiles Page. The manipulation leads to information exposure through error message.
This vulnerability is traded as CVE-2025-31141. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in JetBrains TeamCity and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Cloud Profiles Page. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-31140. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Krpano Panorama Viewer up to 1.20.8. It has been rated as problematic. This issue affects some unknown processing of the file viewer/krpano.html of the component JS Load Handler. The manipulation of the argument plugin[test].url leads to cross site scripting.
The identification of this vulnerability is CVE-2020-24901. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in openstack-barbican. This affects the function _do_enforce_rbac of the file barbican/api/controllers/__init__.py of the component API. The manipulation of the argument kwargs leads to authentication bypass by primary weakness.
This vulnerability is uniquely identified as CVE-2022-3100. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in michaelliao jopenid. Affected is the function getAuthentication of the file JOpenId/src/org/expressme/openid/OpenIdManager.java. The manipulation leads to observable timing discrepancy.
This vulnerability is traded as CVE-2010-10006. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Omron CX-Motion-MCH up to 2.32 and classified as critical. Affected by this issue is some unknown functionality of the component Project File Handler. The manipulation leads to uninitialized pointer.
This vulnerability is handled as CVE-2023-22366. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in D-Link DIR-645A1 1.06B01_Beta01 and classified as critical. This issue affects the function genacgi_main. The manipulation of the argument service leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2022-46475. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in BlogEngine.NET 3.3.8.0. It has been declared as problematic. This vulnerability affects unknown code of the file ~/App_Data/. The manipulation leads to missing authorization.
This vulnerability was named CVE-2022-41417. The attack needs to be done within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, has been found in RushBet 2022.23.1-b490616d. Affected by this issue is some unknown functionality. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2022-4235. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Rapid7 Velociraptor 0.6.7-5. It has been classified as critical. Affected is the function copy of the component VQL. The manipulation leads to improper privilege management.
This vulnerability is traded as CVE-2023-0242. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.