A vulnerability, which was classified as critical, has been found in jwcrypto up to 0.3.1. This issue affects some unknown processing of the file jwa.py of the component RSA Handler. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2016-6298. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in OpenSSL 1.1.0. Affected by this issue is the function dtls1_preprocess_fragment of the component DTLS Handler. The manipulation leads to uncontrolled memory allocation.
This vulnerability is handled as CVE-2016-6308. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Grafana Agent Flow up to 0.43.1 on Windows and classified as critical. This issue affects some unknown processing of the component Flow Mode. The manipulation leads to unquoted search path.
The identification of this vulnerability is CVE-2024-8996. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Grafana Alloy up to 1.3.2/1.4.0-rc.1 on Windows and classified as critical. This vulnerability affects unknown code. The manipulation leads to unquoted search path.
This vulnerability was named CVE-2024-8975. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in mdflib 2.1. This affects the function ReadData of the component mdf4 File Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is uniquely identified as CVE-2024-41445. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Gigastone TR1 Travel Router R101 1.0.2. Affected by this issue is some unknown functionality of the component HTTP Request Handler. The manipulation of the argument ssid leads to command injection.
This vulnerability is handled as CVE-2024-44678. It is possible to launch the attack on the physical device. There is no exploit available.
A vulnerability classified as problematic was found in OpenSSL 1.1.0. Affected by this vulnerability is the function tls_get_message_header. The manipulation leads to uncontrolled memory allocation.
This vulnerability is known as CVE-2016-6307. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in AdaCore ada_web_services 20.0. Affected by this vulnerability is the function Random_String of the file src/core/aws-utils.adb. The manipulation leads to insufficiently random values.
This vulnerability is known as CVE-2024-41708. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in phpHoo3. It has been classified as critical. This affects an unknown part of the file admin.php of the component Login. The manipulation leads to sql injection.
This vulnerability is uniquely identified as CVE-2007-2534. It is possible to initiate the attack remotely. There is no exploit available.
The real existence of this vulnerability is still doubted at the moment.
A vulnerability classified as critical was found in Novi Survey. Affected by this vulnerability is an unknown functionality. The manipulation leads to code injection.
This vulnerability is known as CVE-2023-29492. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Silabs Z-IP Gateway SDK up to 7.18.01. Affected is an unknown function. The manipulation leads to out-of-bounds write.
This vulnerability is traded as CVE-2023-0970. It is possible to launch the attack on the physical device. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Silabs Z-IP Gateway up to 7.18.01. Affected by this issue is some unknown functionality. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2023-0969. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Strapi up to 4.11.7. This issue affects some unknown processing. The manipulation leads to permission issues.
The identification of this vulnerability is CVE-2023-37263. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Dolibarr ERP CRM up to 17.0.1. It has been rated as critical. This issue affects some unknown processing of the component Command Handler. The manipulation leads to Privilege Escalation.
The identification of this vulnerability is CVE-2023-38886. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as problematic has been found in IOBit Malware Fighter 8.0.2. Affected is an unknown function in the library ImfHpRegFilter.sys. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2020-24089. Local access is required to approach this attack. There is no exploit available.
A vulnerability classified as problematic was found in MyPrestaModules Module and UpdateProducts Module on Prestashop. This vulnerability affects unknown code of the file send.php. The manipulation leads to information disclosure.
This vulnerability was named CVE-2023-39677. The attack can only be done within the local network. There is no exploit available.
A vulnerability classified as problematic has been found in kokoroe_members card 13.6.1. This affects an unknown part of the component Message Handler. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2023-39045. The attack needs to be initiated within the local network. There is no exploit available.
Google has revealed that its transition to memory-safe languages such as Rust as part of its secure-by-design approach has led to the percentage of memory-safe vulnerabilities discovered in Android dropping from 76% to 24% over a period of six years.
The tech giant said focusing on Safe Coding for new features not only reduces the overall security risk of a codebase, but also makes the switch