Though Adidas said that no payment or financial information was affected in the breach, individuals who contacted the compamy's customer service help desk were impacted.
A vulnerability was found in Apache Airflow 2.3.0/2.3.1/2.3.2/2.3.3/2.3.4. It has been classified as problematic. Affected is an unknown function of the component URL Handler. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2022-40604. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Apache Airflow 2.3.0/2.3.1/2.3.2/2.3.3/2.3.4. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /confirm. The manipulation leads to open redirect.
This vulnerability is known as CVE-2022-40754. Access to the local network is required for this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in XPDF 4.04. This affects an unknown part of the file FoFiType1C.cc. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2022-38928. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Erlang OTP up to 23.3.4.14/24.3.4.1/25.0.1. It has been classified as critical. Affected is an unknown function of the component Client Authentication Handler. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2022-37026. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Craft CMS 4.2.0.1. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file src/web/assets/cp/src/js/BaseElementSelectInput.js. The manipulation of the argument elementInfo.label leads to cross site scripting.
This vulnerability is known as CVE-2022-37246. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Keylime up to 6.2.x. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to authentication bypass by spoofing.
This vulnerability is handled as CVE-2021-43310. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Keylime up to 6.2.x. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component UUID Handler. The manipulation leads to authentication bypass by spoofing.
This vulnerability is known as CVE-2022-23949. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Worksoft Execution Manager Plugin up to 10.0.3.503 on Jenkins. This affects an unknown part. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2022-41246. The attack needs to be done within the local network. There is no exploit available.
A vulnerability has been found in BigPanda Notifier Plugin up to 1.4.0 on Jenkins and classified as problematic. This vulnerability affects unknown code of the component API Key Handler. The manipulation leads to unprotected storage of credentials.
This vulnerability was named CVE-2022-41247. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability was found in BigPanda Notifier Plugin up to 1.4.0 on Jenkins and classified as problematic. This issue affects some unknown processing of the component API Key Handler. The manipulation leads to missing password field masking.
The identification of this vulnerability is CVE-2022-41248. It is possible to launch the attack on the physical device. There is no exploit available.
A vulnerability was found in SCM HttpClient Plugin up to 1.5 on Jenkins. It has been classified as critical. Affected is an unknown function. The manipulation leads to missing authorization.
This vulnerability is traded as CVE-2022-41250. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in SCM HttpClient Plugin up to 1.5 on Jenkins. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2022-41249. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Google Chrome and classified as critical. Affected by this issue is some unknown functionality of the component libvpx. The manipulation leads to use after free.
This vulnerability is handled as CVE-2025-5283. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in WP Attachments Plugin up to 5.0.12 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument attachment_id leads to cross site scripting.
This vulnerability is known as CVE-2025-5082. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Likes and Dislikes Plugin Plugin up to 1.0.0 on WordPress. Affected is an unknown function. The manipulation of the argument post leads to sql injection.
This vulnerability is traded as CVE-2025-5287. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in code-projects Online Exam Mastering System 1.0. This issue affects some unknown processing of the component Feedback Form. The manipulation of the argument Name leads to cross site scripting.
The identification of this vulnerability is CVE-2025-46173. The attack may be initiated remotely. There is no exploit available.