A vulnerability was found in F5 BIG-IP up to 13.1.5/14.1.5/15.1.10/16.1.4/17.1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the component Configuration Utility. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2023-46748. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in QNAP VioStor NVR 4.x. This affects an unknown part. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2023-47565. The attack can only be done within the local network. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Citrix NetScaler ADC and NetScaler Gateway. Affected by this vulnerability is an unknown functionality of the component NSIP/CLIP/SNIP. The manipulation leads to code injection.
This vulnerability is known as CVE-2023-6548. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in iovamihai Paid Membership Subscriptions Plugin up to 2.11.1 on WordPress and classified as problematic. This issue affects the function pms_stripe_connect_handle_authorization_return. The manipulation leads to missing authorization.
The identification of this vulnerability is CVE-2024-1389. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as very critical has been found in ConnectWise ScreenConnect up to 23.9.7. Affected is an unknown function. The manipulation leads to authentication bypass using alternate channel.
This vulnerability is traded as CVE-2024-1709. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Tenda AC18 15.13.07.09 and classified as critical. Affected by this vulnerability is the function fromSetWirelessRepeat. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow.
This vulnerability is known as CVE-2024-2546. The attack can be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Tenda AC18 15.03.05.05 and classified as critical. Affected by this issue is the function R7WebsSecurityHandler. The manipulation of the argument password leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2024-2547. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Tenda AC18 15.03.05.05. It has been rated as critical. This issue affects the function formexeCommand of the file /goform/execCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2024-2558. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in F5 BIG-IP up to 13.1.5/14.1.5/15.1.10.1/16.1.4.0/17.1.0.2. It has been rated as critical. Affected by this issue is some unknown functionality of the component Configuration Utility. The manipulation leads to improper authentication.
This vulnerability is handled as CVE-2023-46747. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Fortinet FortiClientEMS up to 7.0.10/7.2.2. This affects an unknown part of the component Packets Handler. The manipulation leads to sql injection.
This vulnerability is uniquely identified as CVE-2023-48788. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in n8n 0.218.0 on Node.js. Affected is an unknown function. The manipulation leads to Privilege Escalation.
This vulnerability is traded as CVE-2023-27563. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, was found in HHVM up to 4.172.0. Affected is the function stream_socket_server/stream_socket_client of the component Secure Connection Handler. The manipulation leads to use of unmaintained third party components.
This vulnerability is traded as CVE-2022-36937. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in posstaticfooter up to 1.0.0 on Prestashop and classified as critical. This vulnerability affects the function posstaticfooter::getPosCurrentHook. The manipulation leads to sql injection.
This vulnerability was named CVE-2023-30194. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in NetApp SnapCenter up to 4.7 P1/4.8. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to Remote Code Execution.
This vulnerability is known as CVE-2023-1096. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, was found in Tenda AC5 15.03.06.28. Affected is an unknown function of the file ip/goform/WriteFacMac. The manipulation of the argument Mac leads to Privilege Escalation.
This vulnerability is traded as CVE-2023-31587. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in GuppY CMS 6.00.10. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to unrestricted upload.
This vulnerability is handled as CVE-2023-31903. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Zyxel ATP, USG FLEX, VPN and Zywall. It has been rated as very critical. This issue affects some unknown processing of the component Notifications Handler. The manipulation leads to buffer overflow.
The identification of this vulnerability is CVE-2023-33009. The attack may be initiated remotely. Furthermore, there is an exploit available.