A vulnerability was found in LDS Crypt::CBC up to 3.04 on Perl. It has been declared as problematic. This vulnerability affects the function rand. The manipulation leads to cryptographically weak prng.
This vulnerability was named CVE-2025-2814. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in TOTOLINK A3700R 9.1.2u.6165_20211012. It has been declared as critical. This vulnerability affects the function setWiFiEasyCfg. The manipulation of the argument ssid leads to stack-based buffer overflow.
This vulnerability was named CVE-2024-37634. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in TOTOLINK A3700R 9.1.2u.6165_20211012. Affected is the function loginAuth. The manipulation of the argument Password leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2024-37632. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Libarchive up to 3.7.3. It has been declared as problematic. Affected by this vulnerability is the function slurp_central_directory of the file archive_read_support_format_zip.c of the component mac-ext Handler. The manipulation leads to out-of-bounds read.
This vulnerability is known as CVE-2024-37407. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Xinhu RockOA 2.6.3. This vulnerability affects unknown code of the file /chajian/inputChajian.php. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-37624. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Tessi Docubase Document Management 5.x. This issue affects some unknown processing. The manipulation of the argument page leads to cross site scripting.
The identification of this vulnerability is CVE-2024-37671. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in ProtonVPN up to 3.2.9 on Windows. It has been rated as problematic. Affected by this issue is some unknown functionality of the file Setup/setup.iss. The manipulation leads to privilege escalation.
This vulnerability is handled as CVE-2024-37391. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Couchbase Server up to 7.2.4/7.6.0. Affected by this issue is some unknown functionality of the component KV Service. The manipulation leads to inadequate encryption strength.
This vulnerability is handled as CVE-2024-37034. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in TARGIT Decision Suite 23.2.15007.0. Affected is an unknown function of the component Session Token Handler. The manipulation leads to missing encryption of sensitive data.
This vulnerability is traded as CVE-2024-36426. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Micro-Star International Z590, Z490, Z790, B760, B560, B660 and B460. It has been declared as critical. This vulnerability affects unknown code of the component SMI Handler. The manipulation leads to write-what-where condition.
This vulnerability was named CVE-2024-36877. Access to the local network is required for this attack. There is no exploit available.
A vulnerability was found in naga 0.14.0. It has been declared as critical. This vulnerability affects unknown code of the file /wgsl/parse/mod.rs. The manipulation leads to stack-based buffer overflow.
This vulnerability was named CVE-2024-36761. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in tecnick tcpdf up to 6.7.x. It has been declared as problematic. Affected by this vulnerability is the function unserializeTCPDFtag of the component Tag Hash Handler. The manipulation leads to incorrect comparison.
This vulnerability is known as CVE-2024-56522. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Gogs up to 0.13.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file internal/ssh/ssh.go of the component SSH Connection Handler. The manipulation leads to argument injection.
This vulnerability is known as CVE-2024-39930. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in kuma 2.7.0. This issue affects some unknown processing. The manipulation leads to permission issues.
The identification of this vulnerability is CVE-2024-36542. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in external-secrets 0.9.16. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to permission issues.
This vulnerability was named CVE-2024-36540. The attack can only be done within the local network. There is no exploit available.
A vulnerability classified as problematic was found in GoPhish 0.12.1. Affected by this vulnerability is an unknown functionality of the component Mail Server Configuration. The manipulation leads to insufficiently protected credentials.
This vulnerability is known as CVE-2024-55196. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in tecnick tcpdf up to 6.7.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Error Message Handler. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-56527. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Supermicro BMC up to X13. It has been declared as very critical. This vulnerability affects unknown code. The manipulation leads to stack-based buffer overflow.
This vulnerability was named CVE-2024-36435. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Supermicro X11DPH-T, X11DPH-Tq and X11DPH-i up to 4.3. Affected is an unknown function of the component BIOS Firmware. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2024-36433. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.