A vulnerability was suspected in ROS2 Iron Irwini 2. This issue appears to be a false-positive. Please verify the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in ROS2 Iron Irwini 2. This issue was flagged as a false-positive. Please consult the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in ROS2 Iron Irwini 2. This issue appears to be a false-positive. Please verify the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in ROS2 Iron Irwini 2. Further analysis revealed that this issues is a false-positive. Please take a look at the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in ROS2 Iron Irwini 2. Further analysis revealed that this issues is a false-positive. Please take a look at the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in ROS2 Iron Irwini 2. This issue was flagged as a false-positive. Please consult the sources mentioned and consider not using this entry at all.
A vulnerability was found in LibTIFF up to 4.5.0. It has been rated as critical. This issue affects the function loadImage of the file tools/tiffcrop.c of the component TIFF Handler. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2023-26965. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in postfinance up to 17.1.13 on PrestaShop. It has been declared as critical. Affected by this vulnerability is the function PostfinanceValidationModuleFrontController::postProcess. The manipulation leads to sql injection.
This vulnerability is known as CVE-2023-31671. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability has been found in WP-Optimize Plugin and SrbTransLatin Plugin on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality of the component HTML Character Handler. The manipulation leads to HTML injection.
This vulnerability is known as CVE-2023-1119. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was suspected in Linux Kernel up to 6.9-rc1. This issue appears to be a false-positive. Please verify the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Linux Kernel up to 6.9-rc2. Further analysis revealed that this issues is a false-positive. Please take a look at the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Employee Management System 1.0. This issue was flagged as a false-positive. Please consult the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Employee Management System 1.0. Further investigation has shown that this issues is a false-positive. Please review the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Employee Management System 1.0. Further analysis revealed that this issues is a false-positive. Please take a look at the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in QEMU up to 8.1.x. Further analysis revealed that this issues is a false-positive. Please take a look at the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Zoho ManageEngine Desktop Central 9 Build 90055. Further investigation has shown that this issues is a false-positive. Please review the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Apple macOS. Further investigation has shown that this issues is a false-positive. Please review the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Apple Safari. This issue was flagged as a false-positive. Please consult the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Apple iOS and iPadOS. This issue appears to be a false-positive. Please verify the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Atlassian Confluence Data Center. This issue appears to be a false-positive. Please verify the sources mentioned and consider not using this entry at all.