A vulnerability was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 and classified as critical. Affected by this issue is some unknown functionality of the file /boafrm/formSysLog of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow.
This vulnerability is handled as CVE-2025-6145. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formSysCmd of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow.
This vulnerability is known as CVE-2025-6144. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formNtp of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow.
This vulnerability is traded as CVE-2025-6143. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, has been found in Arcadia Crafty Controller up to 4.2.3/4.3.2/4.4.9. This issue affects some unknown processing of the component Server Name Form/API Key Form. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2025-5990. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Ping Identity PingFederate up to 11.2.10/11.3.9/12.0.6/12.1.4. This vulnerability affects unknown code of the component Administrative Console. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-25573. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Ping Identity PingFederate up to 1.5.1. This affects an unknown part of the component Non-200 HTTP Response Handler. The manipulation leads to unexpected status code or return value.
This vulnerability is uniquely identified as CVE-2025-22854. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ping Identity PingFederate up to 11.3.12/12.0.8/12.1.8/12.2.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the component OAuth2. The manipulation leads to duplicate key in associative list.
This vulnerability is handled as CVE-2025-21085. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Intera InHire up to 20250530. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument 29chcotoo9 leads to server-side request forgery.
This vulnerability is known as CVE-2025-6142. The attack can be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as problematic, was found in Microsoft Internet Explorer 5.5/6.0 on Win 2000. Affected is an unknown function of the component ftp.htt. The manipulation of the argument Hostname leads to basic cross site scripting.
This vulnerability is traded as CVE-2002-2062. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Draytek Vigor 3910 4.3.2.6. It has been rated as critical. This issue affects some unknown processing of the file v2x00.cgi. The manipulation of the argument iProfileIdx leads to buffer overflow.
The identification of this vulnerability is CVE-2024-46567. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability classified as critical has been found in Draytek Vigor 3910 4.3.2.6. Affected is an unknown function of the file vpn.cgi. The manipulation of the argument sPeerId leads to buffer overflow.
This vulnerability is traded as CVE-2024-46568. The attack needs to be done within the local network. There is no exploit available.