A vulnerability was found in ageerle ruoyi-ai 2.0.0 and classified as critical. Affected by this issue is the function speechToTextTranscriptionsV2/upload of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/service/impl/SseServiceImpl.java. The manipulation of the argument File leads to unrestricted upload.
This vulnerability is handled as CVE-2025-6466. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Bilder Galerie. It has been rated as critical. This issue affects some unknown processing of the file anzagien.php. The manipulation of the argument config[root_ordner] leads to code injection.
The identification of this vulnerability is CVE-2007-4328. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Apple macOS. This affects an unknown part of the component AppleVA. The manipulation leads to Remote Code Execution.
This vulnerability is uniquely identified as CVE-2023-42881. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Trend Micro Mobile Security for Enterprise. This affects the function DevicesManagementEditNotePopupTip. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2023-41176. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in trailofbits rfc3161-client up to 1.0.2. This vulnerability affects unknown code. The manipulation leads to improper verification of cryptographic signature.
This vulnerability was named CVE-2025-52556. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in GitLab Enterprise Edition up to 16.3.5/16.4.1/16.5.0. This issue affects some unknown processing of the component Service-Desk Custom Email Template. The manipulation leads to missing authorization.
The identification of this vulnerability is CVE-2023-5600. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Mail-0 Zero 0.8. Affected is an unknown function. The manipulation leads to improper handling of extreme physical environment conditions.
This vulnerability is traded as CVE-2025-52557. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in TOTOLINK X15 1.0.0-B20230714.1105. Affected is an unknown function of the file /boafrm/formIPv6Addr of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow.
This vulnerability is traded as CVE-2025-6399. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability has been found in FlipBook Plugin up to 1.16.15 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument style/mode leads to cross site scripting.
This vulnerability is known as CVE-2025-5289. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Mail-0 Zero 0.8. Affected is an unknown function. The manipulation leads to improper handling of extreme physical environment conditions.
This vulnerability is traded as CVE-2025-52557. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in GitLab Enterprise Edition up to 16.3.5/16.4.1/16.5.0. This issue affects some unknown processing of the component Service-Desk Custom Email Template. The manipulation leads to missing authorization.
The identification of this vulnerability is CVE-2023-5600. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in trailofbits rfc3161-client up to 1.0.2. This vulnerability affects unknown code. The manipulation leads to improper verification of cryptographic signature.
This vulnerability was named CVE-2025-52556. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in dnnsoftware Dnn.Platform up to 10.0.0. This affects an unknown part of the component SMB Server Handler. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2025-52488. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in dnnsoftware Dnn.Platform up to 10.0.0. It has been rated as critical. Affected by this issue is some unknown functionality of the component Login IP Filter. The manipulation leads to incorrect authorization.
This vulnerability is handled as CVE-2025-52487. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in dnnsoftware Dnn.Platform up to 10.0.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component SkinObjects Handler. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-52486. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in dnnsoftware Dnn.Platform up to 10.0.0. It has been classified as problematic. Affected is an unknown function of the component Activity Feed Attachments Endpoint. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-52485. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.