Premium WordPress plugin Fancy Product Designer from Radykal is vulnerable to two critical severity flaws that remain unfixed in the current latest version. [...]
A vulnerability was found in eMedia simpleRedak up to 2.47.23.05. It has been rated as critical. This issue affects some unknown processing. The manipulation of the argument Activity leads to sql injection.
The identification of this vulnerability is CVE-2023-33762. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability was found in Emlog 6.0.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/plugin.php of the component File Upload Handler. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2020-19028. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in mp4v2 2.1.3. Affected by this vulnerability is the function MP4File::ReadBytes. The manipulation leads to memory leak.
This vulnerability is known as CVE-2023-33717. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Tenda AC8 16.03.34.06. This issue affects the function sub_44db3c. The manipulation of the argument timeZone leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2023-33669. Access to the local network is required for this attack. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Microsoft Internet Explorer up to 11. This issue affects some unknown processing. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2014-0278. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Microsoft Internet Explorer 5/6/7/8 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2014-0280. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Internet Explorer up to 11. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2014-0275. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical has been found in Microsoft Internet Explorer 5/6/7/8/9. This affects an unknown part. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2014-0276. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical was found in Microsoft Internet Explorer up to 11. This vulnerability affects unknown code. The manipulation leads to memory corruption.
This vulnerability was named CVE-2014-0277. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Internet Explorer 9/10/11. It has been classified as critical. Affected is an unknown function. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2014-0273. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic has been found in Netwave IP Camera. This affects an unknown part of the file //proc/kcore of the component Network Configuration Handler. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2018-17240. The attack can only be initiated within the local network. Furthermore, there is an exploit available.
A vulnerability was found in Chris Carvache eTemplates Plugin up to 0.2.1 on WordPress. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection.
This vulnerability is known as CVE-2024-55972. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Selenium Server up to 3.x. It has been declared as problematic. This vulnerability affects unknown code of the component Non-JSON Content Type Handler. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2022-28108. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in GitLab Community Edition and Enterprise Edition up to 17.5.4/17.6.2/17.7.0 and classified as problematic. This vulnerability affects unknown code of the component Public Project Handler. The manipulation leads to missing authorization.
This vulnerability was named CVE-2024-12431. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in HPE AOS-CX. This affects an unknown part of the component Firewall. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2024-54010. The attack can only be done within the local network. There is no exploit available.
A vulnerability, which was classified as critical, has been found in CarbonPHP carbon up to 2.72.5/3.8.3. Affected by this issue is the function Carbon::setLocale. The manipulation leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is handled as CVE-2025-22145. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Teradata account-handling code up to 2024-11-04. Affected by this vulnerability is an unknown functionality. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2024-52869. Access to the local network is required for this attack to succeed. There is no exploit available.