A vulnerability, which was classified as problematic, has been found in AMANDA up to 3.5.3. This issue affects some unknown processing of the file runtar.c. The manipulation leads to argument injection.
The identification of this vulnerability is CVE-2023-30577. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Splunk SOAR up to 6.0.2 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Web Endpoint. The manipulation leads to improper output neutralization for logs.
This vulnerability is known as CVE-2023-3997. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Harrison Chase LangChain 0.0.171 and classified as critical. Affected by this issue is some unknown functionality of the component JSON File Handler. The manipulation of the argument load_prompt leads to code injection.
This vulnerability is handled as CVE-2023-36281. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Splunk IT Service Intelligence up to 4.13.2/4.15.2 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component ANSI Escape Handler. The manipulation leads to improper output neutralization for logs.
This vulnerability is known as CVE-2023-4571. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Autodesk AutoCAD. It has been rated as critical. Affected by this issue is some unknown functionality of the component PRT File Parser. The manipulation leads to out-of-bounds write.
This vulnerability is handled as CVE-2023-29075. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in MediaWiki up to 1.35.11/1.39.4/1.40.0. It has been declared as problematic. This vulnerability affects unknown code of the file ApiPageSet.php. The manipulation leads to denial of service.
This vulnerability was named CVE-2023-45363. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Netis N3Mv2 1.0.1.865. It has been declared as problematic. This vulnerability affects the function FUN_0040dabc. The manipulation of the argument hostName leads to denial of service.
This vulnerability was named CVE-2023-45463. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability, which was classified as very critical, was found in Oracle Communications Diameter Signaling Router 8.6.0.0. This affects an unknown part of the component Platform. The manipulation leads to unquoted search path.
This vulnerability is uniquely identified as CVE-2023-38408. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Oracle Communications Policy Management 12.6.0.0. It has been classified as very critical. Affected is an unknown function of the component CMP. The manipulation leads to unquoted search path.
This vulnerability is traded as CVE-2023-38408. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Oracle Enterprise Operations Monitor 5.0/5.1. It has been declared as very critical. Affected by this vulnerability is an unknown functionality of the component Infrastructure. The manipulation leads to unquoted search path.
This vulnerability is known as CVE-2023-38408. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in MISP up to 2.4.175. It has been rated as problematic. This issue affects some unknown processing of the file app/Controller/Component/IndexFilterComponent.php of the component Query Parameter Handler. The manipulation leads to Privilege Escalation.
The identification of this vulnerability is CVE-2023-48655. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in ureport 2.2.9 and classified as critical. This issue affects some unknown processing of the component Path Handler. The manipulation leads to path traversal.
The identification of this vulnerability is CVE-2023-48848. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in Apache Cocoon =2.2.x. Affected is an unknown function. The manipulation leads to sql injection.
This vulnerability is traded as CVE-2022-45135. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.