A vulnerability described as critical has been identified in Apache Open Office up to 4.1.5. This affects an unknown part of the component Document Loader. Such manipulation as part of String leads to incorrect calculation.
This vulnerability is uniquely identified as CVE-2018-11790. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability, which was classified as problematic, was found in Apache HTTP Server up to 2.4.48. This affects an unknown part. Executing a manipulation can lead to null pointer dereference.
This vulnerability is registered as CVE-2021-34798. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Apache HTTP Server up to 2.4.48. Affected by this issue is some unknown functionality of the component mod_proxy. Performing a manipulation results in server-side request forgery.
This vulnerability is cataloged as CVE-2021-40438. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Apache HTTP Server up to 2.4.48 and classified as critical. This issue affects the function ap_escape_quotes. The manipulation results in buffer overflow.
This vulnerability is reported as CVE-2021-39275. The attack can be launched remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability has been found in Dell SupportAssist Client Consumer and SupportAssist Client Commercial and classified as critical. This impacts an unknown function. The manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2022-29094. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in Dell SupportAssist Client Consumer and SupportAssist Client Commercial. This affects an unknown function. Executing a manipulation can lead to path traversal.
This vulnerability is handled as CVE-2022-29093. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability was found in Dell SupportAssist Client Consumer and SupportAssist Client Commercial and classified as problematic. The impacted element is an unknown function. Executing a manipulation can lead to cross site scripting.
The identification of this vulnerability is CVE-2022-29095. The attack may be launched remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability categorized as very critical has been discovered in Tencent RapidJSON up to 1.1.0. This affects the function GenericReader::ParseNumber in the library include/rapidjson/reader.h. The manipulation results in integer underflow.
This vulnerability is cataloged as CVE-2024-38517. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Tencent RapidJSON up to 1.1.0. It has been declared as very critical. Affected by this issue is the function GenericReader::ParseNumber in the library include/rapidjson/reader.h of the component File Handler. Such manipulation leads to integer overflow.
This vulnerability is referenced as CVE-2024-39684. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in HP PC. This issue affects some unknown processing. Such manipulation leads to improper restriction of software interfaces to hardware features.
This vulnerability is traded as CVE-2024-5477. The attack can be executed directly on the physical device. There is no exploit available.
The affected component should be upgraded.
A vulnerability classified as critical has been found in Fortinet FortiClient up to 6.4.2/7.0.1 on Windows. This impacts an unknown function of the component Named Pipe Handler. The manipulation leads to improper authorization.
This vulnerability is referenced as CVE-2021-36183. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
While the software industry has made genuine strides over the past few decades to deliver products securely, the furious pace of AI adoption is putting that progress at risk. Businesses are moving fast to self-host LLM infrastructure, drawn by the promise of AI as a force multiplier and the pressure to deliver more value faster. But speed is coming at the expense of security.
In the wake of the
A vulnerability, which was classified as problematic, has been found in Dell SupportAssist for Home PCs up to 3.11.4. Impacted is an unknown function. Performing a manipulation results in session expiration.
This vulnerability is cataloged as CVE-2022-34392. It is possible to initiate the attack remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic has been found in Dell SupportAssist for Home PCs up to 3.11.2. This vulnerability affects unknown code. This manipulation causes permissive cross-domain policy with untrusted domains.
This vulnerability is tracked as CVE-2022-34366. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability classified as very critical was found in Dell SupportAssist for Home PCs and SupportAssist for Business PCs. The impacted element is an unknown function. Executing a manipulation can lead to insecure temporary file.
This vulnerability is tracked as CVE-2022-34387. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability labeled as problematic has been found in Dell SupportAssist for Home PCs and SupportAssist for Business PCs. This vulnerability affects unknown code. The manipulation results in information disclosure.
This vulnerability was named CVE-2022-34388. The attack may be performed from remote. There is no available exploit.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in chatchat-space Langchain-Chatchat up to 0.3.1.3. The affected element is the function _get_file_id of the file libs/chatchat-server/chatchat/server/api_server/openai_routes.py of the component Uploaded File Handler. Performing a manipulation results in insufficiently random values.
This vulnerability is known as CVE-2026-7847. Access to the local network is required for this attack. Furthermore, an exploit is available.
The project was informed of the problem early through an issue report but has not responded yet.