A vulnerability classified as critical has been found in Microsoft Edge. This affects an unknown part. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2023-36562. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical was found in Microsoft Edge. This vulnerability affects unknown code. The manipulation leads to Remote Code Execution.
This vulnerability was named CVE-2023-36727. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Grocy up to 4.0.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2023-42270. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in UCMS 1.4.7. It has been classified as problematic. Affected is an unknown function of the file ajax.php?do=strarraylist. The manipulation of the argument strdefault leads to cross site scripting.
This vulnerability is traded as CVE-2023-5015. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in SourceCodester AC Repair and Services System 1.0. Affected is an unknown function of the file admin/?page=system_info/contact_information. The manipulation of the argument telephone/mobile/address leads to cross site scripting.
This vulnerability is traded as CVE-2023-5021. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in ekorCCP and ekorRCI. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is known as CVE-2022-47559. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Microsoft Edge. This issue affects some unknown processing. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2023-36735. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Apache CouchDB 2.0.0. It has been declared as critical. This vulnerability affects unknown code of the file nssm.exe of the component Windows Installer. The manipulation as part of Binary File leads to improper access controls.
This vulnerability was named CVE-2016-8742. An attack has to be approached locally. Furthermore, there is an exploit available.
The threat actor uses sophisticated social engineering techniques to infect a victim's device, either with an infostealer or remote access Trojan (RAT).
A vulnerability was found in Apple iOS and iPadOS up to 16.1.2. It has been classified as critical. This affects an unknown part of the component iTunes Store. The manipulation leads to Remote Code Execution.
This vulnerability is uniquely identified as CVE-2022-42837. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in SeaCms 11.4 and classified as critical. This vulnerability affects unknown code of the file /Upload/admin/admin_notify.php. The manipulation of the argument notify1 leads to unrestricted upload.
This vulnerability was named CVE-2021-39426. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability was found in EyouCMS 1.5.4 and classified as problematic. This issue affects the function edit_users_head_pic of the file Users.php. The manipulation of the argument filename leads to cross site scripting.
The identification of this vulnerability is CVE-2021-39428. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Apple iOS up to 15.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Stored Web Site Data Handler. The manipulation leads to exposure of resource.
This vulnerability is known as CVE-2022-32833. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in 188Jianzhan 2.10. This issue affects some unknown processing of the file /admin/reg.php. The manipulation of the argument Username leads to cross site scripting.
The identification of this vulnerability is CVE-2021-39427. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Apple iOS up to 15.x. Affected is an unknown function of the component Kernel. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2022-32916. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Apple iOS and iPadOS and classified as critical. Affected by this vulnerability is an unknown functionality of the component App Handler. The manipulation leads to out-of-bounds write.
This vulnerability is known as CVE-2022-32860. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple macOS and classified as critical. Affected by this issue is some unknown functionality of the component App Handler. The manipulation leads to out-of-bounds write.
This vulnerability is handled as CVE-2022-32860. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple iOS and iPadOS. It has been rated as critical. This issue affects some unknown processing of the component Kernel. The manipulation leads to integer overflow.
The identification of this vulnerability is CVE-2022-42805. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Apple macOS. Affected is an unknown function of the component Kernel. The manipulation leads to integer overflow.
This vulnerability is traded as CVE-2022-42805. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.