Attackers are exploiting a critical-severity privilege escalation vulnerability (CVE-2025-8489) in the King Addons for Elementor plugin for WordPress, which lets them obtain administrative permissions during the registration process. [...]
A vulnerability categorized as critical has been discovered in pppd 0.91. The affected element is an unknown function of the file eap.c of the component EAP-TLS Handler. Executing manipulation can lead to improper input validation.
The identification of this vulnerability is CVE-2018-11574. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in Exponent strongSwan up to up to 4.x/5.6.. The impacted element is the function verify_emsa_pkcs1_signature of the file gmp_rsa_public_key.c of the component IKEv2 Authentication. This manipulation as part of RSA Signature causes improper verification of cryptographic signature.
This vulnerability appears as CVE-2018-16151. The attack may be initiated remotely. There is no available exploit.
You should upgrade the affected component.
A vulnerability labeled as critical has been found in Exponent strongSwan up to up to 4.x/5.6.. This affects the function verify_emsa_pkcs1_signature of the file gmp_rsa_public_key.c of the component IKEv2 Authentication. Such manipulation of the argument digestAlgorithmparameters as part of RSA Signature leads to improper verification of cryptographic signature.
This vulnerability is traded as CVE-2018-16152. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability labeled as critical has been found in tcpdump up to 4.9.2. This issue affects the function ldp_tlv_print of the file print-ldp.c of the component LDP Parser. Executing manipulation can lead to out-of-bounds read.
The identification of this vulnerability is CVE-2018-14461. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in tcpdump up to 4.9.2. Impacted is the function icmp_print of the file print-icmp.c of the component ICMP Parser. The manipulation leads to out-of-bounds read.
This vulnerability is referenced as CVE-2018-14462. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, was found in tcpdump up to 4.9.2. Affected is the function bgp_capabilities_print of the file print-bgp.c of the component BGP Parser. Executing manipulation can lead to out-of-bounds read.
This vulnerability is registered as CVE-2018-14467. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
A vulnerability has been found in tcpdump up to 4.9.2 and classified as critical. Affected by this vulnerability is the function mfr_print of the file print-fr.c of the component FRF.16 Parser. The manipulation leads to out-of-bounds read.
This vulnerability is documented as CVE-2018-14468. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability was found in tcpdump up to 4.9.2. It has been classified as critical. This affects the function babel_print_v2 of the file print-babel.c. This manipulation causes out-of-bounds read.
This vulnerability appears as CVE-2018-14470. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in LINE tcpdump up to 4.9.2. It has been declared as critical. This vulnerability affects the function get_next_file of the file tcpdump.c of the component CLI Parser. Such manipulation as part of Argument leads to buffer overflow.
This vulnerability is traded as CVE-2018-14879. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability categorized as critical has been discovered in tcpdump up to 4.9.2. Impacted is the function bgp_capabilities_print of the file print-bgp.c of the component BGP Parser. Executing manipulation can lead to out-of-bounds read.
This vulnerability is handled as CVE-2018-14881. The attack can be executed remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in tcpdump up to 4.9.2. The affected element is an unknown function of the file print-icmp6.c of the component ICMPv6 Parser. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2018-14882. The attack is possible to be carried out remotely. No exploit exists.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in DataHub up to 0.8.44. This issue affects some unknown processing of the component Metadata Service. Executing manipulation can lead to incorrect implementation of authentication algorithm.
This vulnerability appears as CVE-2022-39366. The attack may be performed from remote. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in DataHub. It has been classified as critical. The affected element is an unknown function of the component Metadata Service. The manipulation of the argument X-DataHub-Actor leads to improper authorization.
This vulnerability is traded as CVE-2023-25559. It is possible to initiate the attack remotely. There is no exploit available.