A vulnerability classified as problematic was found in Icinga icinga2 up to 2.11.11/2.12.10/2.13.9/2.14.2. This vulnerability affects unknown code of the component TLS Certificate Handler. The manipulation of the argument client_cn leads to improper certificate validation.
This vulnerability was named CVE-2024-49369. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Symfony up to 5.4.46/6.4.14/7.1.7. Affected is an unknown function of the component Username Handler. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2024-51996. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Icinga up to 2.11.9/2.12.4 and classified as critical. Affected by this issue is some unknown functionality of the component API. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2021-32739. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Icinga up to 2.11.9/2.12.4. It has been declared as critical. This vulnerability affects unknown code of the component API. The manipulation leads to permission issues.
This vulnerability was named CVE-2021-32743. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Icinga up to 2.11.10/2.12.5/2.13.0. It has been rated as critical. This issue affects some unknown processing of the component Certificate Authority Handler. The manipulation leads to improper certificate validation.
The identification of this vulnerability is CVE-2021-37698. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Dompdf. This affects an unknown part of the component PHAR Handler. The manipulation leads to open redirect.
This vulnerability is uniquely identified as CVE-2021-3838. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in kanaka wac 385e1. It has been classified as problematic. Affected is the function setup_call of the file /wac-asan/wa.c of the component WASM File Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is traded as CVE-2024-35418. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in kanaka wac 385e1. It has been rated as problematic. Affected by this issue is the function interpret of the file /wac-asan/wa.c of the component WASM File Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is handled as CVE-2024-35410. The attack needs to be done within the local network. There is no exploit available.
A vulnerability has been found in Sunniwell HT3300 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /usr/local/bin/update. The manipulation leads to command injection.
This vulnerability is known as CVE-2024-48073. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in kanaka wac 385e1 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to heap-based buffer overflow.
This vulnerability is handled as CVE-2024-35420. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in wasm3 139076a and classified as problematic. This issue affects the function Read_utf8. The manipulation leads to memory leak.
The identification of this vulnerability is CVE-2024-27529. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as critical, has been found in wasm3 139076a. This issue affects some unknown processing. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2024-27528. The attack needs to be done within the local network. There is no exploit available.
A vulnerability, which was classified as critical, was found in Ivanti Secure Access Client up to 22.7R3. This affects an unknown part. The manipulation leads to improper authentication.
This vulnerability is uniquely identified as CVE-2024-37398. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in 07FLY FlyCMS 1.3.9. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /oa/OaSchedule/add.html. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2024-51157. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in ALC WebCTRL. Affected is an unknown function. The manipulation leads to path traversal.
This vulnerability is traded as CVE-2017-9640. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.