A vulnerability was found in GoBGP up to 3.34.x and classified as problematic. Affected by this issue is some unknown functionality of the file pkg/packet/bgp/bgp.go of the component Flowspec Parser. The manipulation leads to denial of service.
This vulnerability is handled as CVE-2025-43972. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in GoBGP up to 3.34.x and classified as critical. Affected by this vulnerability is the function softwareVersionLen of the file pkg/packet/bgp/bgp.go. The manipulation leads to off-by-one.
This vulnerability is known as CVE-2025-43971. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in GoBGP up to 3.34.x. Affected is an unknown function of the file pkg/packet/rtr/rtr.go of the component RTR Message Handler. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2025-43973. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in GoBGP up to 3.34.x. This issue affects some unknown processing of the file pkg/packet/mrt/mrt.go. The manipulation leads to improper validation of specified quantity in input.
The identification of this vulnerability is CVE-2025-43970. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in KnowBe4 Security Awareness Training. This vulnerability affects unknown code of the component javascript URL Handler. The manipulation of the argument window.location.href leads to cross site scripting.
This vulnerability was named CVE-2020-36844. The attack can be initiated remotely. There is no exploit available.
This product is available as a managed service. Users are not able to maintain vulnerability countermeasures themselves. It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in struktur libheif up to 1.19.5. This affects the function ImageItem_Grid::get_decoder of the file image-items/grid.cc. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2025-43967. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in struktur libheif up to 1.19.5. It has been rated as problematic. Affected by this issue is the function ImageItem_iden of the file image-items/iden.cc. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2025-43966. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in LibRaw up to 0.21.3. It has been declared as problematic. Affected by this vulnerability is the function phase_one_correct of the file decoders/load_mfbacks.cpp of the component 0x041f Tag Processing Handler. The manipulation of the argument split_col/split_row leads to out-of-bounds read.
This vulnerability is known as CVE-2025-43963. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in LibRaw up to 0.21.3. It has been classified as problematic. Affected is an unknown function of the file metadata/tiff.cpp of the component Fujifilm 0xf00c Tag Parser. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2025-43961. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Convertigo up to 8.3.4 and classified as problematic. This issue affects the function TwsCachedXPathAPI of the component API. The manipulation leads to exposed dangerous routine.
The identification of this vulnerability is CVE-2025-43955. Attacking locally is a requirement. There is no exploit available.
A vulnerability has been found in LibRaw up to 0.21.3 and classified as problematic. This vulnerability affects the function phase_one_correct of the file decoders/load_mfbacks.cpp. The manipulation of the argument w0/w1 leads to out-of-bounds read.
This vulnerability was named CVE-2025-43962. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in LibRaw up to 0.21.3. This affects the function phase_one_correct of the file decoders/load_mfbacks.cpp. The manipulation of the argument w0/w1 leads to improper validation of specified quantity in input.
This vulnerability is uniquely identified as CVE-2025-43964. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in KnowBe4 Security Awareness Training. Affected by this issue is some unknown functionality. The manipulation of the argument window.location.href leads to open redirect.
This vulnerability is handled as CVE-2020-36845. The attack may be launched remotely. There is no exploit available.
This product is a managed service. It is not possible for users to maintain vulnerability countermeasures themselves. It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in gAppointments Plugin up to 1.9.5.1 on WordPress. This vulnerability affects unknown code of the component Setting Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2023-2707. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as problematic was found in Seraphinite Accelerator Plugin up to 2.20.31 on WordPress. Affected by this vulnerability is an unknown functionality of the component Setting Handler. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2023-5611. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in GitKraken GitLens up to 13.x and classified as critical. Affected by this vulnerability is an unknown functionality of the component Visual Studio Codes Workspace Trust. The manipulation leads to Remote Code Execution.
This vulnerability is known as CVE-2023-46944. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Google Chrome. Affected by this issue is some unknown functionality of the component Mojo. The manipulation leads to use after free.
This vulnerability is handled as CVE-2023-6347. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Google Chrome and classified as critical. This issue affects some unknown processing of the component Skia. The manipulation leads to integer overflow.
The identification of this vulnerability is CVE-2023-6345. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in NeuVector Vulnerability Scanner Plugin up to 1.22 on Jenkins. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2023-49673. It is possible to launch the attack remotely. There is no exploit available.