A vulnerability was found in ProSSHD 1.2 on Windows. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to denial of service.
This vulnerability was named CVE-2024-0725. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability was found in Software AG webMethods up to 10.15.0 Core_Fix6. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /WmAdmin/ of the component Administration Panel. The manipulation leads to empty password in configuration file.
This vulnerability is handled as CVE-2024-23733. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Office and 365 Apps for Enterprise and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2024-38200. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in freeSSHd 1.0.9 on Windows. It has been classified as problematic. This affects an unknown part. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2024-0723. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
Currently trending CVE - Hype Score: 29 - Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the ...
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.12.22/6.13.10/6.14.1. This affects the function alloc_preauth_hash. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2025-22037. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in TRENDnet TV-IP110WN 1.2.2 and classified as problematic. Affected by this issue is some unknown functionality of the file /server/boa.conf of the component Embedded Boa Web Server. The manipulation leads to least privilege violation.
This vulnerability is handled as CVE-2025-8757. Local access is required to approach this attack. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in TRENDnet TEW-822DRE FW103B02. It has been classified as problematic. This affects an unknown part of the component vsftpd. The manipulation leads to least privilege violation.
This vulnerability is uniquely identified as CVE-2025-8758. Attacking locally is a requirement. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic was found in BYD DiLink OS 13.1.32.2307211.1. This vulnerability affects unknown code of the component Log Dump. The manipulation leads to reliance on security through obscurity.
This vulnerability was named CVE-2025-7020. It is possible to launch the attack on the physical device. There is no exploit available.
A vulnerability classified as problematic has been found in Dream-Theme The7 Plugin up to 12.6.0 on WordPress. This affects the function jQuery.attr. The manipulation of the argument title/data-dt-img-description leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-7726. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Linux Kernel up to 6.6.48. It has been rated as problematic. Affected by this issue is the function btnxpuart_queue_skb of the component Bluetooth. The manipulation leads to excessive iteration.
This vulnerability is handled as CVE-2024-58238. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Bluetooth. The manipulation leads to incorrect calculation of buffer size.
This vulnerability is known as CVE-2022-50233. Access to the local network is required for this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Artifex Ghostscript up to 10.04.x. It has been declared as problematic. This vulnerability affects the function decode_utf8 of the file base/gp_utf8.c. The manipulation leads to path traversal: '../filedir'.
This vulnerability was named CVE-2025-46646. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mozilla Firefox up to 100 on Windows. It has been declared as critical. This vulnerability affects unknown code of the component Download Handler. The manipulation leads to escaping of output.
This vulnerability was named CVE-2022-31739. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 5.14-rc2. Affected by this issue is some unknown functionality of the component Tracing Module. The manipulation leads to resource consumption.
This vulnerability is handled as CVE-2021-3679. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in NVIDIA GPU Display Driver on Linux. This affects an unknown part of the component Kernel Mode Layer. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2022-31615. Attacking locally is a requirement. There is no exploit available.