A vulnerability described as critical has been identified in radar 1.0.8. This affects an unknown function of the component API. Executing manipulation can lead to improper access controls.
This vulnerability appears as CVE-2024-57155. The attack may be performed from a remote location. There is no available exploit.
A vulnerability was found in Cisco Identity Services Engine Software. It has been classified as critical. The affected element is an unknown function of the component GUI. The manipulation leads to improper access controls.
This vulnerability is listed as CVE-2025-20131. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in himmelblau up to 0.9.16 and classified as critical. The impacted element is the function acquire_token_by_hello_for_business_key of the file /etc/himmelblau/himmelblau.conf. Such manipulation leads to improper authentication.
This vulnerability is traded as CVE-2025-53013. The attack may be carried out on the physical device. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Siemens SICAM TOOLBOX II 07.10. It has been classified as critical. This impacts an unknown function of the component HTTPS Connection Handler. This manipulation causes improper certificate validation.
This vulnerability appears as CVE-2024-31853. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in Siemens SICAM TOOLBOX II 07.10/07.11. It has been declared as critical. Affected is an unknown function of the component HTTPS Connection Handler. Such manipulation leads to improper certificate validation.
This vulnerability is traded as CVE-2024-31854. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in IBM InfoSphere Data Replication VSAM for z and OS Remote Source 11.4 on z/OS. It has been declared as critical. The impacted element is an unknown function of the component Log Reading Service. Such manipulation leads to stack-based buffer overflow.
This vulnerability is listed as CVE-2024-56468. The attack may be performed from a remote location. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Juniper Junos OS up to 21.2R3-S8/22.4R3-S6/23.2R2-S2/23.4R2-S3/24.2R1. Impacted is an unknown function of the component Routing Protocol Daemon. Executing manipulation can lead to incorrect calculation of buffer size.
This vulnerability is handled as CVE-2025-52955. The attack can only be done within the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic has been found in IBM Engineering Requirements Management DOORS 9.7.2.9. This impacts an unknown function. This manipulation causes weak password recovery.
This vulnerability is handled as CVE-2024-43190. The attack can be initiated remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Shenzhen Libituo Technology LBT-T300-T310 up to 2.2.3.6 and classified as critical. Impacted is the function config_3g_para of the file /appy.cgi. Such manipulation of the argument username_3g/password_3g leads to buffer overflow.
This vulnerability is referenced as CVE-2025-7077. It is possible to launch the attack remotely. Furthermore, an exploit is available.
Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.