A vulnerability was found in Couchbase Server up to 7.0.4/7.1.1. It has been declared as problematic. This vulnerability affects unknown code of the component HTTP REST Request Handler. The manipulation leads to resource consumption.
This vulnerability was named CVE-2022-42950. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in SolarView Compact up to 6.00. Affected is an unknown function of the file downloader.php of the component Restrictions Handler. The manipulation leads to command injection.
This vulnerability is traded as CVE-2023-23333. Access to the local network is required for this attack. Furthermore, there is an exploit available.
A vulnerability was found in MediaTek CPU and classified as critical. This issue affects some unknown processing. The manipulation leads to command injection.
The identification of this vulnerability is CVE-2021-31573. The attack needs to be done within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in MediaTek CPU. It has been classified as critical. Affected is an unknown function of the component Config Manager. The manipulation leads to command injection.
This vulnerability is traded as CVE-2021-31574. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in MediaTek CPU. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Config Manager. The manipulation leads to command injection.
This vulnerability is known as CVE-2021-31575. Access to the local network is required for this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic has been found in HP Deskjet 2540 CEP1FN1418BR. Affected is an unknown function of the component Configuration Page. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2022-48311. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in Caddy 2.4.6. Affected by this vulnerability is an unknown functionality of the component URL Handler. The manipulation leads to open redirect.
This vulnerability is known as CVE-2022-28923. The attack can be launched remotely. There is no exploit available.
A vulnerability has been found in Talend ESB Runtime up to 8.0.1-R2022-10-RT and classified as critical. This vulnerability affects unknown code of the component Provisioning Service. The manipulation leads to sql injection.
This vulnerability was named CVE-2022-45589. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability was found in BTicino Door Entry HOMETOUCH 1.4.2 on iOS. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to improper certificate validation.
This vulnerability is handled as CVE-2022-46496. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical was found in Microsoft Internet Explorer 5.0/5.5. Affected by this vulnerability is an unknown functionality of the component Windows Scripting Host. The manipulation leads to improper privilege management.
This vulnerability is known as CVE-2001-1325. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been classified as critical. This affects the function setRebootScheCfg. The manipulation of the argument minute leads to command injection.
This vulnerability is uniquely identified as CVE-2023-24146. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been declared as critical. This vulnerability affects unknown code of the file /etc/config/product.ini of the component Telnet Service. The manipulation leads to hard-coded credentials.
This vulnerability was named CVE-2023-24147. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in ASUS AC68U. It has been classified as critical. Affected is an unknown function of the component Cloud Disk. The manipulation leads to sql injection.
This vulnerability is traded as CVE-2021-37316. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in MojoJson 1.2.3. Affected is the function SkipString. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2023-23086. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been declared as critical. This vulnerability affects the function setUnloadUserData. The manipulation of the argument plugin_version leads to command injection.
This vulnerability was named CVE-2023-24145. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability classified as critical was found in WAVLINK WL-WN533A8 M33A8.V5030.190716. This vulnerability affects unknown code of the file /cgi-bin/ExportLogs.sh of the component Configuration Handler. The manipulation leads to improper access controls.
This vulnerability was named CVE-2022-48164. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in pycdc 44a730f3a889503014fec94ae6e62d8401cb75e5. This issue affects the function BuildFromCode of the file ASTree.cpp. The manipulation leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2022-48078. The attack needs to be approached within the local network. There is no exploit available.