A vulnerability classified as critical was found in oretnom23 Online Diagnostic Lab Management System 1.0. This vulnerability affects unknown code of the file /odlms/admin/?page=appointments/view_appointment. The manipulation of the argument ID leads to sql injection.
This vulnerability was named CVE-2022-43227. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Freeimage 3.18.0. It has been rated as critical. This issue affects the function LoadRGB of the file PluginDDS.cpp of the component Image File Handler. The manipulation leads to buffer overflow.
The identification of this vulnerability is CVE-2020-21428. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Simple Blog Card Plugin up to 1.31 on WordPress. Affected is an unknown function. The manipulation leads to authorization bypass.
This vulnerability is traded as CVE-2023-4036. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Jenkins up to LTS 2.414.1/2.423 and classified as critical. This issue affects some unknown processing of the component Temporary Directory Handler. The manipulation leads to permission issues.
The identification of this vulnerability is CVE-2023-43496. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability was found in Oracle Communications Cloud Native Core Network Repository Function 23.3.1 and classified as critical. Affected by this issue is some unknown functionality of the component Install/Upgrade. The manipulation leads to incorrect default permissions.
This vulnerability is handled as CVE-2023-43496. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in IBM AIX up to 5.3.0. This issue affects some unknown processing of the component ICMP Error Message Handler. The manipulation leads to insufficient entropy.
The identification of this vulnerability is CVE-2004-0230. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability was found in Microsoft Windows Server 2003/XP. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component IPv6 Stack ICMP Handler. The manipulation leads to insufficient entropy.
This vulnerability is known as CVE-2004-0230. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Windows Server 2003/XP. It has been rated as critical. Affected by this issue is some unknown functionality of the component IPv6 Stack TCP Handler. The manipulation leads to insufficient entropy.
This vulnerability is handled as CVE-2004-0230. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, has been found in McAfee Network Data Loss Prevention 8.6/9.2.0/9.2.1/9.2.2. This issue affects some unknown processing. The manipulation leads to insufficient entropy.
The identification of this vulnerability is CVE-2004-0230. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in McAfee Network Data Loss Prevention 8.6/9.2.0/9.2.1/9.2.2. It has been classified as problematic. This affects an unknown part. The manipulation leads to insufficient entropy.
This vulnerability is uniquely identified as CVE-2004-0230. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Oracle Solaris 10/11 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to insufficient entropy.
This vulnerability is known as CVE-2004-0230. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
Software teams need to follow security best practices to eliminate the leak of secrets, as threat actors increase their scanning for configuration and repository files.
A vulnerability was found in Netgear XR300 1.0.3.78. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file bridge_wireless_main.cgi of the component POST Handler. The manipulation of the argument passphrase leads to stack-based buffer overflow.
This vulnerability is known as CVE-2024-52017. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in Netgear XR300 1.0.3.78. This affects an unknown part of the file genie_dyn.cgi of the component Request Handler. The manipulation of the argument system_name leads to command injection.
This vulnerability is uniquely identified as CVE-2024-52018. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in Netgear R8500 1.0.2.160. This vulnerability affects unknown code of the file genie_fix2.cgi of the component Request Handler. The manipulation of the argument wan_gateway leads to command injection.
This vulnerability was named CVE-2024-52019. The attack can be initiated remotely. There is no exploit available.