A vulnerability was found in ICU 76.0.1. It has been declared as critical. Affected by this vulnerability is the function SRBRoot::addTag. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2025-5222. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been declared as problematic. Affected by this vulnerability is the function HL1MDLLoader::validate_header of the file assimp/code/AssetLib/MDL/HalfLife/HL1MDLLoader.cpp. The manipulation leads to out-of-bounds read.
This vulnerability is known as CVE-2025-5202. An attack has to be approached locally. Furthermore, there is an exploit available.
The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.
A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been rated as problematic. Affected by this issue is the function SkipSpaces in the library assimp/include/assimp/ParsingUtils.h. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2025-5203. Local access is required to approach this attack. Furthermore, there is an exploit available.
The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.
A vulnerability was found in PHPGurukul Hostel Management System 2.1. It has been rated as problematic. This issue affects some unknown processing of the file /hostel/change-password.php. The manipulation leads to weak password recovery.
The identification of this vulnerability is CVE-2025-45953. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Ladybird. It has been rated as problematic. This issue affects some unknown processing of the component LibJS. The manipulation of the argument arguments_list leads to missing synchronization.
The identification of this vulnerability is CVE-2025-47154. The attack may be initiated remotely. There is no exploit available.
The real existence of this vulnerability is still doubted at the moment.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in TOTOLINK A3002R 4.0.0-B20230531.1404 and classified as critical. This issue affects the function formDhcpv6s. The manipulation of the argument dnsaddr leads to buffer overflow.
The identification of this vulnerability is CVE-2025-45865. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in TOTOLINK A3002R 4.0.0-B20230531.1404. It has been classified as critical. Affected is the function formDnsv6. The manipulation of the argument routername leads to buffer overflow.
This vulnerability is traded as CVE-2025-45861. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in TOTOLINK A3002R 4.0.0-B20230531.1404. It has been declared as critical. Affected by this vulnerability is the function formMapDelDevice. The manipulation of the argument macstr leads to buffer overflow.
This vulnerability is known as CVE-2025-45863. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Apple Safari up to 10.1.1. This affects an unknown part of the component WebKit. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2017-7049. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in TOTOLINK A3002R 4.0.0-B20230531.1404 and classified as critical. Affected by this vulnerability is the function formDhcpv6s. The manipulation of the argument addrPoolStart leads to buffer overflow.
This vulnerability is known as CVE-2025-45864. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in TOTOLINK A3002R 4.0.0-B20230531.1404 and classified as critical. Affected by this issue is the function formDhcpv6s. The manipulation of the argument addrPoolEnd leads to buffer overflow.
This vulnerability is handled as CVE-2025-45866. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in TOTOLINK A3002R 4.0.0-B20230531.1404. It has been classified as critical. This affects the function formIpv6Setup. The manipulation of the argument static_dns1 leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2025-45867. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in NetAlertX up to 24.10.11. Affected by this issue is the function savesettings of the file settings.php of the component Setting Handler. The manipulation leads to missing authentication.
This vulnerability is handled as CVE-2024-46506. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.