A vulnerability was found in INSAgenda insa-auth. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to open redirect.
This vulnerability is known as CVE-2025-46826. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Rack up to 2.2.13. It has been classified as problematic. Affected is the function Rack::Session of the component Session Cookie Handler. The manipulation leads to race condition.
This vulnerability is traded as CVE-2025-32441. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Rack up to 2.2.13/3.0.15/3.1.13 and classified as problematic. This issue affects the function Rack::QueryParser. The manipulation leads to resource consumption.
The identification of this vulnerability is CVE-2025-46727. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Squid Web Proxy up to 2.7.STABLE9/5.9/6.5. It has been rated as critical. This issue affects some unknown processing of the component HTTP Request Parser. The manipulation of the argument X-Forwarded-For leads to uncontrolled recursion.
The identification of this vulnerability is CVE-2023-50269. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Squid Web Proxy up to 6.4. It has been classified as problematic. Affected is an unknown function of the component HTTP Header Parser. The manipulation leads to resource consumption.
This vulnerability is traded as CVE-2024-25617. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in systemd-resolved. Affected by this issue is some unknown functionality of the component Unsigned Name Response Handler. The manipulation leads to insufficient verification of data authenticity.
This vulnerability is handled as CVE-2023-7008. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Intel PROSet and Wireless WiFi and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to protection mechanism failure.
This vulnerability is handled as CVE-2022-46329. The attack needs to be approached locally. There is no exploit available.
A vulnerability was found in OpenPMIx PMIx up to 4.2.5/5.0.0. It has been classified as critical. This affects an unknown part. The manipulation leads to race condition.
This vulnerability is uniquely identified as CVE-2023-41915. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in AMD 1st Gen EPYC Processors, 2nd Gen EPYC Processors and 3rd Gen EPYC Processors. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component INVD Instruction Handler. The manipulation leads to an unknown weakness.
This vulnerability is known as CVE-2023-20592. Access to the local network is required for this attack. There is no exploit available.
A vulnerability classified as critical was found in tcpslice. This vulnerability affects the function AddressSanitizer. The manipulation leads to use after free.
This vulnerability was named CVE-2021-41043. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in libsndfile. Affected is the function mat4_open/mat4_read_header of the file src/au.c. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2022-33065. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in GStreamer and classified as critical. Affected by this issue is some unknown functionality of the component PGS File Parser. The manipulation leads to heap-based buffer overflow.
This vulnerability is handled as CVE-2023-37328. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in X.org libX11. It has been classified as problematic. This affects the function _XkbReadKeySyms of the file XKBGetMap.c. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2023-43785. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.