A vulnerability has been found in DBIx::Class::EncodedColumn up to 0.00032 and classified as problematic. The affected element is the function rand in the library lib/DBIx/Class/EncodedColumn/Digest.pm. Performing manipulation results in cryptographically weak prng.
This vulnerability is known as CVE-2025-27551. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability was found in DBIx::Class::EncodedColumn up to 0.00032 and classified as problematic. The impacted element is the function rand of the file Crypt/Eksblowfish/Bcrypt.pm. Executing manipulation can lead to cryptographically weak prng.
This vulnerability is handled as CVE-2025-27552. The attack can be executed remotely. There is not any exploit available.
A vulnerability marked as problematic has been reported in LEV Web::API up to 2.8 on Perl. Impacted is the function Data::random. This manipulation causes cryptographically weak prng.
This vulnerability is tracked as CVE-2024-57868. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability described as problematic has been identified in NORBU Net::Dropbox::API up to 1.9 on Perl. The affected element is the function Data::random. Such manipulation leads to cryptographically weak prng.
This vulnerability is listed as CVE-2024-58036. The attack may be performed from remote. There is no available exploit.
A vulnerability, which was classified as problematic, has been found in LOCALSHOP WebService::Xero up to 0.11 on Perl. This impacts the function Data::random. The manipulation leads to cryptographically weak prng.
This vulnerability is documented as CVE-2024-52322. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in ELLIOTT Net::Xero up to 0.44 on Perl. It has been declared as problematic. This vulnerability affects the function Data::random. Executing manipulation can lead to cryptographically weak prng.
This vulnerability is handled as CVE-2024-56370. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in schule111 Schule up to 1.0.0. Affected is the function generateOTP of the component One-Time Password Handler. Executing manipulation can lead to weak password requirements.
This vulnerability is tracked as CVE-2025-48372. The attack can be launched remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in MongoDB BSON-XS up to 0.8.4 on Perl. It has been rated as critical. This vulnerability affects unknown code of the component libbson. The manipulation leads to dependency on vulnerable third-party component. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is listed as CVE-2025-40906. The attack must be carried out from within the local network. There is no available exploit.
A vulnerability labeled as problematic has been found in Redis up to 6.2.16/7.2.6/7.4.1. This affects an unknown function of the component Lua Script Handler. Such manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2024-46981. The attack can be launched remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, has been found in Netty up to 4.1.114. This affects an unknown part. The manipulation leads to resource consumption.
This vulnerability is listed as CVE-2024-47535. The attack must be carried out locally. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic has been found in RIOT-OS up to 2024.07. Affected is an unknown function. The manipulation leads to infinite loop.
This vulnerability is traded as CVE-2024-53980. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in kmqtt 0.2.7. It has been declared as problematic. This impacts an unknown function of the component Request Handler. Such manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2024-50947. The attack can only be initiated within the local network. No exploit exists.
A vulnerability classified as problematic was found in Inspur ClusterEngine 4.0. This affects an unknown function of the file /opt/tsce4/torque6/bin/getJobsByShell. The manipulation results in incorrect default permissions.
This vulnerability is known as CVE-2021-27285. Attacking locally is a requirement. No exploit is available.
A vulnerability was found in schule111 Schule up to 1.0.0. It has been rated as problematic. Affected is an unknown function of the file index.js of the component API Response Handler. Performing manipulation results in incorrect authorization.
This vulnerability was named CVE-2025-48373. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability classified as problematic was found in schule111 Schule up to 1.0.0. This impacts an unknown function of the file forgot_password.php. Executing manipulation can lead to allocation of resources.
This vulnerability appears as CVE-2025-48375. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability has been found in Red Hat Developer Hub and classified as problematic. The affected element is an unknown function of the component Catalog Import. This manipulation causes information disclosure.
The identification of this vulnerability is CVE-2023-6944. The attack needs to be done within the local network. There is no exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability was found in GNOME libsoup up to 3.6.0. It has been rated as problematic. This vulnerability affects unknown code of the component WebSocket Data Handler. The manipulation leads to uncontrolled memory allocation.
This vulnerability is listed as CVE-2024-52532. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability was found in CyberPanel. It has been declared as problematic. This affects the function restartMySQL. Executing manipulation can lead to denial of service.
This vulnerability is registered as CVE-2024-54679. It is possible to launch the attack remotely. No exploit is available.
It is advisable to implement a patch to correct this issue.