Currently trending CVE - Hype Score: 2 - TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm .
Currently trending CVE - Hype Score: 1 - Untrusted Search Path vulnerability in Apache Tomcat installer for Windows. During installation, the Tomcat installer for Windows used icacls.exe without specifying a full path.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0 through 10.1.41, from ...
Currently trending CVE - Hype Score: 1 - Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat. When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to ...
A vulnerability was found in Mozilla Thunderbird up to 102.8. It has been classified as problematic. Affected is an unknown function of the component JIT Code Handler. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2023-25751. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mozilla Firefox up to 110. It has been classified as critical. This affects an unknown part of the component JIT Code Handler. The manipulation leads to Remote Code Execution.
This vulnerability is uniquely identified as CVE-2023-25751. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Mozilla Firefox up to 110. Affected by this issue is some unknown functionality of the component Throttled Stream Handler. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2023-25752. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Mozilla Thunderbird up to 102.8. This affects an unknown part of the component Throttled Stream Handler. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2023-25752. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in libarchive up to 3.3.x. Affected by this issue is some unknown functionality of the file archive_read_support_format_rar.c. The manipulation leads to use after free.
This vulnerability is handled as CVE-2019-18408. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in libarchive 3.4.0. This affects the function archive_wstring_append_from_mbs of the file archive_string.c. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2019-19221. An attack has to be approached locally. There is no exploit available.
A vulnerability, which was classified as critical, was found in libarchive. This affects an unknown part of the component Access Control List Handler. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2021-23177. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in libarchive and classified as critical. This vulnerability affects unknown code of the component Access Control List Handler. The manipulation leads to link following.
This vulnerability was named CVE-2021-31566. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was suspected in pymongo up to 4.6.2. Further analysis revealed that this issues is a false-positive. Please take a look at the sources mentioned and consider not using this entry at all.
A vulnerability was found in Linux Kernel 6.2.16. It has been classified as problematic. Affected is the function ipv4_send_dest_unreach of the file net/ipv4/route.c of the component IPv4 Handler. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2023-42754. An attack has to be approached locally. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.