A vulnerability, which was classified as critical, was found in libsass 3.6.5. This affects the function CompoundSelector::has_real_parent_ref. The manipulation leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2022-26592. The attack can only be done within the local network. There is no exploit available.
A vulnerability has been found in wpa_supplicant and classified as problematic. This vulnerability affects unknown code of the component PEAP Handler. The manipulation leads to authorization bypass.
This vulnerability was named CVE-2023-52160. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in llvm-project a0138390. It has been declared as problematic. This vulnerability affects the function matchAndRewriteSortOp(mlir::sparse_tensor::SortOp. The manipulation leads to memory corruption.
This vulnerability was named CVE-2023-29941. The attack needs to be approached locally. There is no exploit available.
A vulnerability was found in Envoy. It has been declared as problematic. This vulnerability affects unknown code of the component nghttp2 Codec. The manipulation leads to memory leak.
This vulnerability was named CVE-2023-35945. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability was found in vitessio vitess up to 19.0.7/20.0.3/21.0.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /debug/querylogz. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-53257. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in llvm-project bd456297. Affected by this vulnerability is the function mlir::Block::getArgument. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2023-29933. Attacking locally is a requirement. There is no exploit available.
A vulnerability was found in qtbase 5.12.4/5.12.5. It has been classified as critical. Affected is an unknown function of the component KTX Image Handler. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2024-25580. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Azure azure-c-shared-utility and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to buffer overflow.
This vulnerability is known as CVE-2024-29195. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in SimpleMachines SMF 2.1.4 and classified as problematic. Affected by this issue is some unknown functionality of the file ManageAttachments.php. The manipulation of the argument Notice leads to cross site scripting.
This vulnerability is handled as CVE-2025-2582. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure.
A vulnerability was found in SimpleMachines SMF 2.1.4. It has been classified as problematic. This affects an unknown part of the file ManageNews.php. The manipulation of the argument subject/message leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-2583. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure.
A vulnerability was found in quickjs-ng QuickJS up to 0.8.0. It has been declared as problematic. Affected by this vulnerability is the function JS_GetRuntime of the file quickjs.c of the component qjs. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2024-13903. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.