A vulnerability was found in RocketChat Rocket.Chat up to 6.11.x. It has been classified as critical. Affected by this vulnerability is an unknown functionality of the file /api/v1/oauth-apps.get of the component API Endpoint. This manipulation of the argument client_id/client_secret causes improper privilege management.
This vulnerability appears as CVE-2026-23477. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability, which was classified as problematic, was found in Cinspiration RDP Manager 4.9.9.3. The affected element is an unknown function. Such manipulation leads to allocation of resources.
This vulnerability is documented as CVE-2021-47771. The attack needs to be performed locally. Additionally, an exploit exists.
A vulnerability labeled as critical has been found in IBM ApplinX 11.1. This vulnerability affects unknown code of the component JSON Web Token Handler. Such manipulation leads to improper verification of cryptographic signature.
This vulnerability is referenced as CVE-2025-36418. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in IBM ApplinX 11.1. It has been classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2025-36411. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in NVIDIA CUDA Toolkit. Affected by this vulnerability is an unknown functionality of the component Installer. Performing a manipulation results in os command injection.
This vulnerability is cataloged as CVE-2025-33230. The attack must be initiated from a local position. There is no exploit available.
A vulnerability was found in IBM ApplinX 11.1 and classified as problematic. This vulnerability affects unknown code. The manipulation results in information disclosure.
This vulnerability is reported as CVE-2025-36419. The attack can be launched remotely. No exploit exists.
A vulnerability was found in IBM ApplinX 11.1. It has been classified as critical. This issue affects some unknown processing. This manipulation causes improper authorization.
This vulnerability appears as CVE-2025-36410. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in NVIDIA Nsight Systems. It has been declared as critical. Impacted is the function gfx_hotspot of the file process_nsys_rep_cli.py. Such manipulation leads to os command injection.
This vulnerability is traded as CVE-2025-33228. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in NVIDIA Nsight Visual Studio on Windows. It has been rated as problematic. The affected element is an unknown function. Performing a manipulation results in uncontrolled search path.
This vulnerability is known as CVE-2025-33229. Access to the local network is required for this attack. No exploit is available.
A vulnerability, which was classified as problematic, was found in IBM Concert up to 2.1.0. Affected by this issue is some unknown functionality. Executing a manipulation can lead to information disclosure.
This vulnerability is registered as CVE-2025-1719. It is possible to launch the attack remotely. No exploit is available.
A vulnerability has been found in IBM Concert up to 2.1.0 and classified as problematic. This affects an unknown part. The manipulation leads to information disclosure.
This vulnerability is documented as CVE-2025-1722. The attack can be initiated remotely. There is not any exploit available.
A vulnerability categorized as critical has been discovered in Microhard Systems IPn4G up to 1.1.0. Affected by this vulnerability is an unknown functionality. Such manipulation leads to incorrect authorization.
This vulnerability is referenced as CVE-2018-25146. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability was found in Microhard Systems IPn4G up to 1.1.0. It has been rated as critical. Affected is an unknown function of the file system-editor.sh. This manipulation of the argument path/savefile/edit/delfile causes path traversal.
The identification of this vulnerability is CVE-2018-25144. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Linux Kernel up to 6.1.54/6.5.4. It has been declared as critical. This vulnerability affects the function hci_unregister_dev. Executing a manipulation can lead to improper update of reference count.
This vulnerability is handled as CVE-2023-53520. The attack can only be done within the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.2.2. It has been rated as critical. This issue affects the function ses_intf_remove of the component scsi. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2023-53521. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.4.6. It has been rated as critical. This affects the function gs_usb_disconnect. The manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2023-53523. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is advised.