A vulnerability was found in Freedesktop Poppler 22.07.0. It has been classified as problematic. Affected is an unknown function of the file pdfunite.cc of the component Embedded File Handler. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2022-37051. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Freedesktop Poppler 22.08.0. It has been declared as problematic. Affected by this vulnerability is the function PDFDoc::replacePageDict in the library Object.h of the file PDFDoc.cc of the component Embedded File Handler. The manipulation leads to denial of service.
This vulnerability is known as CVE-2022-38349. Access to the local network is required for this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in Freedesktop Poppler 22.07.0. Affected is the function Object::getString of the component markObject. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2022-37052. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Freedesktop Poppler 20.12.1 and classified as problematic. Affected by this vulnerability is the function FoFiType1C::cvtGlyph of the component PDF File Handler. The manipulation leads to denial of service.
This vulnerability is known as CVE-2020-36023. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Zoho ManageEngine ADAudit Plus up to 8510. It has been declared as critical. This vulnerability affects unknown code of the component OU History Report. The manipulation leads to sql injection.
This vulnerability was named CVE-2025-3834. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Microsoft Visual Studio. Affected is an unknown function. The manipulation leads to command injection.
This vulnerability is traded as CVE-2025-32702. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Microsoft Visual Studio and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2025-32703. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Cisco IOS XE and classified as very critical. This vulnerability affects unknown code of the component Access Point Image Download Feature. The manipulation leads to hard-coded credentials.
This vulnerability was named CVE-2025-20188. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
Modern apps move fast—faster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late to cloud threats, and monitor SOC alerts only after damage is done.
Attackers don’t wait. They exploit vulnerabilities within hours. Yet most organizations take days to respond to critical cloud alerts. That delay isn’t
A vulnerability was found in Tracker Software PDF-XChange Editor. It has been declared as critical. This vulnerability affects unknown code of the component EMF File Parser. The manipulation leads to use after free.
This vulnerability was named CVE-2023-42080. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Tracker Software PDF-XChange Editor. Affected is an unknown function of the component JPG File Parser. The manipulation leads to use after free.
This vulnerability is traded as CVE-2023-42082. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Tracker Software PDF-XChange Editor. Affected by this vulnerability is an unknown functionality of the component PDF File Parser. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2023-42069. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Tracker Software PDF-XChange Editor. Affected by this issue is some unknown functionality of the component PDF File Parser. The manipulation leads to heap-based buffer overflow.
This vulnerability is handled as CVE-2023-42076. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Tracker Software PDF-XChange Editor and classified as critical. This vulnerability affects unknown code of the component JP2 File Parser. The manipulation leads to memory corruption.
This vulnerability was named CVE-2023-42078. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Tracker Software PDF-XChange Editor. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component EMF File Parser. The manipulation leads to heap-based buffer overflow.
This vulnerability is known as CVE-2023-42077. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Tracker Software PDF-XChange Editor. This affects an unknown part of the component JPG File Parser. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2023-42075. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.