A vulnerability was found in Microsoft Dynamics 365 Business Central 2022 and classified as problematic. Affected is an unknown function. The manipulation results in information disclosure.
This vulnerability was named CVE-2022-41066. The attack may be performed from a remote location. There is no available exploit.
Applying a patch is advised to resolve this issue.
A vulnerability labeled as problematic has been found in Cisco Firepower Management Center. This issue affects some unknown processing. Such manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2024-20377. The attack may be performed from a remote location. There is no available exploit.
The affected component should be upgraded.
A vulnerability described as critical has been identified in zhijiantianya ruoyi-vue-pro 2.4.1. Impacted is an unknown function of the file /admin-api/mp/material/upload-temporary of the component Material Upload Interface. Executing manipulation of the argument File can lead to path traversal.
The identification of this vulnerability is CVE-2025-2743. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic was found in Checkmk up to 2.1.0p50/2.2.0p40/2.4.0b1. This vulnerability affects unknown code. The manipulation results in session expiration.
This vulnerability is reported as CVE-2025-2596. The attack can be launched remotely. No exploit exists.
Applying a patch is advised to resolve this issue.
A vulnerability categorized as problematic has been discovered in Significant-Gravitas AutoGPT up to 0.6.0. This impacts an unknown function. Such manipulation leads to information disclosure.
This vulnerability is documented as CVE-2025-31494. The attack can be executed remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability described as problematic has been identified in Checkmk up to 2.1.0p49/2.2.0p40/2.3.0p28. The impacted element is an unknown function. Executing manipulation can lead to sensitive information in log files.
The identification of this vulnerability is CVE-2025-2092. The attack can only be executed locally. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Tenda RX3 16.03.13.11_multi. It has been declared as critical. This affects an unknown part of the file /goform/telnet. Executing manipulation can lead to command injection.
The identification of this vulnerability is CVE-2025-4357. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in Bandisoft Bandizip up to 7.37. Impacted is an unknown function of the component Archived Files Handler. The manipulation results in inclusion of web functionality from an untrusted source.
This vulnerability is reported as CVE-2025-33027. The attack can be launched remotely. No exploit exists.
A vulnerability was found in Fortinet FortiVoice, FortiRecorder, FortiMail, FortiNDR and FortiCamera. It has been rated as critical. Affected is an unknown function of the component Hash Cookie Handler. Performing manipulation results in stack-based buffer overflow.
This vulnerability is reported as CVE-2025-32756. The attack is possible to be carried out remotely. Moreover, an exploit is present.
Upgrading the affected component is advised.