A vulnerability has been found in erlang otp up to 25.3.2.16/26.2.5.6/27.1.3 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improper certificate validation.
This vulnerability is known as CVE-2024-53846. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Dassault Systèmes SOLIDWORKS eDrawings up to 2025 SP1.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component OBJ File Parser. The manipulation leads to out-of-bounds write.
This vulnerability is known as CVE-2025-1883. Local access is required to approach this attack. There is no exploit available.
A vulnerability was found in BeyondTrust Privilege Management for Windows up to 25.1 on Windows. It has been classified as problematic. This affects an unknown part. The manipulation leads to privilege chaining.
This vulnerability is uniquely identified as CVE-2025-0889. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Forcepoint FIE Endpoint. It has been classified as critical. Affected is an unknown function. The manipulation leads to uncontrolled search path.
This vulnerability is traded as CVE-2025-2272. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Tridium Niagara Framework and Niagara Enterprise Security up to 4.10.10/4.14.1/4.15.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to incorrect permission assignment.
This vulnerability is known as CVE-2025-3936. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Tridium Niagara Framework and Niagara Enterprise Security up to 4.10.10/4.14.1/4.15.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Password Hash Handler. The manipulation leads to password hash with insufficient computational effort.
This vulnerability is handled as CVE-2025-3937. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Tridium Niagara Framework and Niagara Enterprise Security up to 4.10.10/4.14.1/4.15.0 on Windows and classified as problematic. Affected by this issue is some unknown functionality of the component Query String Handler. The manipulation leads to use of get request method with sensitive query strings.
This vulnerability is handled as CVE-2025-3943. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Tridium Niagara Framework and Niagara Enterprise Security up to 4.10.10/4.14.1/4.15.0. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to improper handling of windows ::data alternate data stream.
The identification of this vulnerability is CVE-2025-3941. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Zoho ManageEngine ADAudit Plus up to 8510. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection.
This vulnerability is known as CVE-2025-3836. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Zoho ManageEngine ADAudit Plus up to 8510. Affected by this issue is some unknown functionality of the component Service Account Audit Data Handler. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2025-41403. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Tridium Niagara Framework and Niagara Enterprise Security up to 4.10.10/4.14.1/4.15.0 on Windows. Affected is an unknown function. The manipulation leads to improper use of validation framework.
This vulnerability is traded as CVE-2025-3940. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Tridium Niagara Framework and Niagara Enterprise Security up to 4.10.10/4.14.1/4.15.0 on Windows. This issue affects some unknown processing. The manipulation leads to missing cryptographic step.
The identification of this vulnerability is CVE-2025-3938. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Nagvis up to 1.9.33. This issue affects some unknown processing of the file /core/classes/NagVisHoverUrl.php. The manipulation leads to path traversal.
The identification of this vulnerability is CVE-2022-46945. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in RuoYi 4.8.0. It has been classified as critical. This affects the function Edit of the file /edit/. The manipulation of the argument dictId leads to permission issues.
This vulnerability is uniquely identified as CVE-2025-28407. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in RuoYi 4.8.0. It has been declared as critical. This vulnerability affects the function selectDeptTree of the file /selectDeptTree/. The manipulation of the argument deptId leads to improper authorization.
This vulnerability was named CVE-2025-28408. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in RuoYi 4.8.0. It has been rated as critical. This issue affects the function Add of the file /add/. The manipulation of the argument parentId leads to permission issues.
The identification of this vulnerability is CVE-2025-28409. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in RuoYi 4.8.0. Affected is the function cancelAuthUserAll. The manipulation leads to improper authorization.
This vulnerability is traded as CVE-2025-28410. It is possible to launch the attack remotely. There is no exploit available.