A vulnerability was found in mb Support openVIVA. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Vorgang Handler. The manipulation of the argument Name/Hauptverantwortlicher leads to cross site scripting.
This vulnerability is known as CVE-2022-39172. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Google Android and classified as critical. This issue affects the function onBindingDied of the file CallRedirectionProcessor.java. The manipulation leads to permission issues.
The identification of this vulnerability is CVE-2023-40130. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic has been found in radare2 up to 5.8.9. This affects the function print_insn32 in the library libr/arch/p/nds32/nds32-dis.h. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2023-46570. The attack can only be done within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in radare2 up to 5.8.9. This issue affects the function print_insn32_fpu in the library libr/arch/p/nds32/nds32-dis.h. The manipulation leads to out-of-bounds read.
The identification of this vulnerability is CVE-2023-46569. The attack needs to be done within the local network. There is no exploit available.
A vulnerability classified as problematic has been found in Google Android. Affected is the function android_view_InputDevice_create of the file android_view_InputDevice.cpp. The manipulation leads to use after free.
This vulnerability is traded as CVE-2023-40140. Local access is required to approach this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, has been found in International Color Consortium DemoIccMAX 79ecb74. Affected by this issue is the function CIccCLUT::Interp3d in the library IccProfLib/IccTagLut.cpp. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2023-46866. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in International Color Consortium DemoIccMAX 79ecb74. This affects the function CIccXformMatrixTRC::GetCurve of the file IccCmm.cpp. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2023-46867. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in Securepoint SSL VPN Client 2.0.28/2.0.32. This affects an unknown part of the component Installer. The manipulation leads to Local Privilege Escalation.
This vulnerability is uniquely identified as CVE-2023-47101. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in tinyfiledialogs up to 3.14.x. It has been classified as critical. Affected is an unknown function. The manipulation leads to os command injection.
This vulnerability is traded as CVE-2023-47104. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in tinyfiledialogs up to 3.7.x. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to os command injection.
This vulnerability is known as CVE-2020-36767. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Govee LED Strip 3.00.42. It has been classified as problematic. Affected is the function Move/MoveWithOnoff of the component Command Handler. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2023-45956. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in OpenCRX 5.2.2. It has been classified as critical. This affects an unknown part of the component Request Handler. The manipulation leads to xml external entity reference.
This vulnerability is uniquely identified as CVE-2023-46502. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.