A vulnerability classified as critical has been found in Ruben Boelinger myflash 1.00 on WordPress. Affected is an unknown function of the file myflash-button.php. The manipulation of the argument wpPATH leads to file inclusion.
This vulnerability is traded as CVE-2007-2485. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in mb Support openVIVA. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Vorgang Handler. The manipulation of the argument Name/Hauptverantwortlicher leads to cross site scripting.
This vulnerability is known as CVE-2022-39172. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in radare2 up to 5.8.9. This affects the function print_insn32 in the library libr/arch/p/nds32/nds32-dis.h. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2023-46570. The attack can only be done within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in radare2 up to 5.8.9. This issue affects the function print_insn32_fpu in the library libr/arch/p/nds32/nds32-dis.h. The manipulation leads to out-of-bounds read.
The identification of this vulnerability is CVE-2023-46569. The attack needs to be done within the local network. There is no exploit available.
A vulnerability classified as problematic has been found in Google Android. Affected is the function android_view_InputDevice_create of the file android_view_InputDevice.cpp. The manipulation leads to use after free.
This vulnerability is traded as CVE-2023-40140. Local access is required to approach this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in Securepoint SSL VPN Client 2.0.28/2.0.32. This affects an unknown part of the component Installer. The manipulation leads to Local Privilege Escalation.
This vulnerability is uniquely identified as CVE-2023-47101. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in tinyfiledialogs up to 3.14.x. It has been classified as critical. Affected is an unknown function. The manipulation leads to os command injection.
This vulnerability is traded as CVE-2023-47104. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in tinyfiledialogs up to 3.7.x. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to os command injection.
This vulnerability is known as CVE-2020-36767. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.