A vulnerability was found in OneFlow 0.9.0 and classified as problematic. Affected by this issue is the function flow.scatter/flow.scatter_add. The manipulation results in denial of service.
This vulnerability is known as CVE-2025-71009. Access to the local network is required for this attack. No exploit is available.
A vulnerability, which was classified as problematic, was found in GOautodial 4.0. Affected is an unknown function of the component Message Handler. Executing a manipulation can lead to cross site scripting.
This vulnerability appears as CVE-2020-37018. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability, which was classified as problematic, has been found in 10-Strike Bandwidth Monitor 3.9. This impacts an unknown function of the component Service. Performing a manipulation results in unquoted search path.
This vulnerability is reported as CVE-2020-37021. The attack requires a local approach. Moreover, an exploit is present.
A vulnerability classified as problematic was found in SonarQube 8.3.1. This affects an unknown function of the file wrapper.exe. Such manipulation leads to unquoted search path.
This vulnerability is documented as CVE-2020-37020. The attack needs to be performed locally. Additionally, an exploit exists.
A vulnerability classified as problematic has been found in Wibu CodeMeter 6.60. The impacted element is an unknown function of the component Runtime Server Service. This manipulation causes unquoted search path.
This vulnerability is registered as CVE-2020-37017. The attack needs to be launched locally. Furthermore, an exploit is available.
A vulnerability described as problematic has been identified in Barcode-Ocr BarcodeOCR 19.3.6. The affected element is an unknown function. The manipulation results in unquoted search path.
This vulnerability is cataloged as CVE-2020-37016. The attack must be initiated from a local position. Furthermore, there is an exploit available.
A vulnerability marked as critical has been reported in OneFlow 0.9.0. Impacted is the function oneflow._oneflow_internal.autograd.Function.FunctionCtx.mark_non_differentiable. The manipulation leads to memory corruption.
This vulnerability is listed as CVE-2025-71008. The attack must be carried out from within the local network. There is no available exploit.
A vulnerability labeled as problematic has been found in OneFlow 0.9.0. This issue affects the function flow.Tensor.new_empty/flow.Tensor.new_ones/flow.Tensor.new_zeros. Executing a manipulation can lead to denial of service.
This vulnerability is tracked as CVE-2025-71011. The attack is only possible within the local network. No exploit exists.
In the latest edition of "Reporters' Notebook," a trio of journalists urge the cybersecurity industry to prioritize patching vulnerabilities, preparing for quantum threats, and refining AI applications,
A vulnerability identified as critical has been detected in Linux Kernel up to 6.3.3. This issue affects the function iwl_keyinfo of the component wifi. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2023-54286. The attack can only be initiated within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.1.41/6.4.6. The affected element is the function iavf_reset_task. The manipulation leads to state issue.
This vulnerability is listed as CVE-2023-53850. The attack must be carried out from within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in dokploy up to 0.26.5. The impacted element is an unknown function. The manipulation results in improper restriction of rendered ui layers.
This vulnerability is reported as CVE-2026-24839. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability classified as critical has been found in dokploy up to 0.26.5. This affects an unknown function of the file /install.sh. This manipulation causes hard-coded credentials.
This vulnerability appears as CVE-2026-24840. The attacker needs to be present on the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in dokploy up to 0.26.5. This impacts an unknown function of the file /docker-container-terminal of the component WebSocket Endpoint. Such manipulation of the argument containerId/activeWay leads to os command injection.
This vulnerability is traded as CVE-2026-24841. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.2.9. This affects the function tuning_ctl_set of the component ALSA. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2023-53788. The attack can only be initiated within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.2.11. This impacts the function tcp_write_timer_handler in the library /include/net/net_namespace.h. The manipulation leads to use after free.
This vulnerability is listed as CVE-2023-53781. The attack must be carried out from within the local network. There is no available exploit.
It is suggested to upgrade the affected component.