A vulnerability, which was classified as very critical, was found in Veeam Backup and Replication 12.0/12.1/12.2/12.3. Affected is an unknown function of the component Domain User Handler. The manipulation leads to deserialization.
This vulnerability is traded as CVE-2025-23120. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Microsoft Defender for Cloud. It has been declared as problematic. This vulnerability affects unknown code of the component Configuration Template. The manipulation leads to improper authorization.
The attack can be initiated remotely. There is no exploit available.
This product is available as a managed service. Users are not able to maintain vulnerability countermeasures themselves.
A critical security flaw has been disclosed in the Next.js React framework that could be potentially exploited to bypass authorization checks under certain conditions.
The vulnerability, tracked as CVE-2025-29927, carries a CVSS score of 9.1 out of 10.0.
"Next.js uses an internal header x-middleware-subrequest to prevent recursive requests from triggering infinite loops," Next.js said in an
A vulnerability has been found in Mozilla Firefox up to 124 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Networking Stack. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2024-5702. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in wpdevteam Essential Addons for Elementor Plugin up to 5.9.23 on WordPress. This affects an unknown part. The manipulation of the argument custom_js leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-5189. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Fortinet FortiPAM, FortiSwitchManager, FortiOS and FortiProxy. Affected is an unknown function of the component Packets Handler. The manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2024-26010. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Fortinet FortiProxy and FortiOS. Affected is an unknown function. The manipulation leads to password hash with insufficient computational effort.
This vulnerability is traded as CVE-2024-21754. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in MeterSphere up to 1.10.0-lts and classified as problematic. This issue affects some unknown processing of the component Step Editor. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-37161. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Amazon Q for Business. It has been classified as problematic. This affects an unknown part of the component Prompt Handler. The manipulation leads to injection.
It is possible to initiate the attack remotely. There is no exploit available.
This product is a managed service. This means that users are not able to maintain vulnerability countermeasures themselves.