A vulnerability classified as critical has been found in M2Soft CROWNIX Report & ERS. This affects an unknown part. The manipulation leads to unrestricted upload.
This vulnerability is uniquely identified as CVE-2024-57337. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as critical has been found in Netwrix Directory Manager up to 11.1.25134.03. Affected is an unknown function. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2025-48746. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability, which was classified as critical, was found in M2Soft CROWNIX Report & ERS up to 7.4.3.599/8.0.3.79. This affects an unknown part. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2024-57336. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in Netwrix Directory Manager up to 11.1.25134.03. It has been classified as problematic. Affected is an unknown function. The manipulation leads to use of hard-coded password.
This vulnerability is traded as CVE-2025-47748. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability was found in Blackmagic Design DaVinci Resolve up to 19.1.3 on macOS. It has been classified as critical. Affected is an unknown function of the component com.apple.security.cs.disable-library-validation. The manipulation leads to incorrect default permissions.
This vulnerability is traded as CVE-2025-4081. An attack has to be approached locally. There is no exploit available.
A vulnerability was found in Devolutions Remote Desktop Manager up to 2025.1.34.0. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to exposure of private personal information to an unauthorized actor.
The identification of this vulnerability is CVE-2025-5334. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in tcpreplay 4.4.4. This affects the function tcprewrite of the file get.c. The manipulation leads to infinite loop.
This vulnerability is uniquely identified as CVE-2024-22654. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Netwrix Directory Manager up to 10.0.7784.0 and classified as problematic. This issue affects some unknown processing. The manipulation leads to use of hard-coded password.
The identification of this vulnerability is CVE-2025-48748. The attack needs to be done within the local network. There is no exploit available.
A vulnerability classified as critical was found in All In One Control Panel up to 1.3.010. Affected by this vulnerability is an unknown functionality of the file cp_downloads.php. The manipulation of the argument did leads to sql injection.
This vulnerability is known as CVE-2007-0316. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in User Profile Builder Plugin up to 3.11.7 on WordPress and classified as critical. Affected by this issue is some unknown functionality of the component Async Upload. The manipulation leads to missing authorization.
This vulnerability is handled as CVE-2024-6366. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Donation Block for PayPal Plugin up to 2.1.0 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Form Submission Handler. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-6021. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as critical was found in pearProjectApi 2.8.10. This vulnerability affects unknown code of the file project.php. The manipulation of the argument projectCode leads to sql injection.
This vulnerability was named CVE-2023-27112. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as problematic was found in Siemens SCALANCE LPE9403. Affected by this vulnerability is an unknown functionality of the component dcpd. The manipulation leads to use of uninitialized variable.
This vulnerability is known as CVE-2025-40575. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in Siemens SCALANCE LPE9403. It has been rated as critical. Affected by this issue is some unknown functionality of the component Configuration Handler. The manipulation leads to os command injection.
This vulnerability is handled as CVE-2025-40582. Attacking locally is a requirement. There is no exploit available.
A vulnerability was found in Siemens SCALANCE LPE9403. It has been rated as problematic. This issue affects some unknown processing of the component Restore Backup Handler. The manipulation leads to path traversal: '.../...//'.
The identification of this vulnerability is CVE-2025-40573. Local access is required to approach this attack. There is no exploit available.
A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. Affected is an unknown function of the component HTTP Request Handler. The manipulation leads to command injection.
This vulnerability is traded as CVE-2025-44084. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in QuickJS and QuickJS-ng. It has been rated as problematic. Affected by this issue is the function JS_ReadBigInt. The manipulation leads to incorrect calculation of buffer size.
This vulnerability is handled as CVE-2025-46688. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Synology Active Backup for Microsoft 365. This affects an unknown part. The manipulation leads to insufficiently protected credentials.
This vulnerability is uniquely identified as CVE-2025-4679. It is possible to initiate the attack remotely. There is no exploit available.
This product is a managed service. This means that users are not able to maintain vulnerability countermeasures themselves.