A vulnerability has been found in Oracle Outside In Technology 12.2.1.3.0/12.2.1.4.0 and classified as critical. This vulnerability affects unknown code of the component Installation. The manipulation leads to xml external entity reference.
This vulnerability was named CVE-2018-20843. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Oracle Hospitality RES 3700 up to 5.7.6 and classified as critical. This vulnerability affects unknown code of the component LibExpat. The manipulation leads to denial of service.
This vulnerability was named CVE-2018-20843. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Oracle WebLogic Server Proxy Plug-In 12.2.1.3.0/12.2.1.4.0. It has been classified as critical. Affected is an unknown function of the component LibExpat. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2018-20843. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Imagination Technologies Graphics DDK up to 24.2 RTM2. This affects an unknown part of the component GPU Firmware. The manipulation leads to use of out-of-range pointer offset.
This vulnerability is uniquely identified as CVE-2024-52938. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Apache CloudStack 4.16.x. This vulnerability affects unknown code of the component Comment Handler. The manipulation leads to improper access controls.
This vulnerability was named CVE-2025-22828. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in grandslambert Featured Page Widget Plugin up to 2.2 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2025-22569. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as problematic has been found in SmartAgenda Smart Agenda Plugin up to 4.7 on WordPress. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-22506. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in expat up to 2.2.6. Affected by this issue is some unknown functionality of the component libexpat. The manipulation as part of XML Name leads to xml external entity reference.
This vulnerability is handled as CVE-2018-20843. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in libexpat up to 2.2.7. This affects an unknown part of the component XML Parser. The manipulation leads to xml external entity reference.
This vulnerability is uniquely identified as CVE-2019-15903. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Oracle Outside In Technology 8.5.4/8.5.5. Affected by this issue is some unknown functionality of the component DC-Specific Component. The manipulation leads to xml external entity reference.
This vulnerability is handled as CVE-2019-15903. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Apple iCloud up to 7.6 on Windows. Affected by this issue is some unknown functionality. The manipulation leads to use after free.
This vulnerability is handled as CVE-2018-4197. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the decryption key. [...]
A vulnerability has been found in idocv 14.1.3_20231228 and classified as critical. This vulnerability affects unknown code. The manipulation leads to information disclosure.
This vulnerability was named CVE-2024-24377. The attack can be initiated remotely. There is no exploit available.
A vulnerability has been found in Johnson Controls Software House CCURE 9000 and classified as critical. This vulnerability affects unknown code. The manipulation leads to incorrect default permissions.
This vulnerability was named CVE-2024-32861. The attack can be initiated remotely. There is no exploit available.
A vulnerability has been found in KIA Seltos 1.0 and classified as problematic. This vulnerability affects unknown code of the component CAN Bus. The manipulation leads to denial of service.
This vulnerability was named CVE-2024-51073. The attack needs to be done within the local network. There is no exploit available.