A vulnerability was found in Nokogiri up to 1.13.3 on Ruby. It has been declared as problematic. Affected by this issue is some unknown functionality of the component Regular Expression Handler. Executing a manipulation can lead to resource consumption.
This vulnerability is handled as CVE-2022-24836. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Action View Tag Helpers 5.2.0. It has been classified as problematic. Impacted is an unknown function. This manipulation causes cross site scripting.
This vulnerability is handled as CVE-2022-27777. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Oracle Middleware Common Libraries and Tools 12.2.1.4.0. It has been classified as critical. This vulnerability affects unknown code of the component Third Party Patch. Performing a manipulation results in path traversal.
This vulnerability is reported as CVE-2022-23457. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability classified as very critical has been found in Oracle Health Sciences Empirica Signal 9.1.0.52/9.2.0.52. This vulnerability affects unknown code of the component Core. This manipulation causes path traversal.
The identification of this vulnerability is CVE-2022-23457. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as very critical, was found in Oracle GoldenGate Studio 12.2.1.4.0. Affected by this issue is some unknown functionality of the component GoldenGate Studio. The manipulation results in path traversal.
This vulnerability is identified as CVE-2022-23457. The attack can be executed remotely. There is not any exploit available.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.18.16/6.19.6/7.0-rc1. Affected is the function bq_enqueue of the component bpf. Executing a manipulation of the argument q[] can lead to null pointer dereference.
This vulnerability is registered as CVE-2026-23342. The attack needs to be launched locally. No exploit is available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.18.16/6.19.6/7.0-rc1. It has been declared as critical. Affected by this vulnerability is the function ionic_create_cq of the component RDMA. The manipulation results in memory leak.
This vulnerability is known as CVE-2026-23384. Access to the local network is required for this attack. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Open-Xchange OX Dovecot Pro up to 2.3.0. This affects an unknown part. The manipulation results in path traversal.
This vulnerability is known as CVE-2026-0394. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is advised.
A vulnerability has been found in Apple Safari, iOS, iPadOS, macOS, visionOS and watchOS up to 26.3 and classified as problematic. This affects an unknown part of the component Webpage Handler. This manipulation causes information disclosure.
This vulnerability is registered as CVE-2026-20691. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability was found in Grafana up to 11.6.13/12.1.9/12.2.7/12.3.5/12.4.1 and classified as problematic. The impacted element is an unknown function of the component Public Dashboard Handler. The manipulation results in information disclosure.
This vulnerability is known as CVE-2026-27877. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability was found in Apple Safari, iOS, iPadOS, macOS, tvOS, visionOS and watchOS up to 26.3. It has been classified as problematic. Affected by this issue is some unknown functionality of the component Web Handler. This manipulation causes improper restriction of rendered ui layers.
This vulnerability appears as CVE-2026-20665. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in Foxit na1.foxitesign.foxit.com. It has been rated as problematic. Impacted is an unknown function of the component HTML Attribute Handler. This manipulation causes HTML injection.
The identification of this vulnerability is CVE-2025-66523. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Pillow up to 8.1.x and classified as problematic. Impacted is the function EPSImageFile of the component EPS File Handler. Executing a manipulation can lead to resource consumption.
This vulnerability is handled as CVE-2021-28677. The attack can only be done within the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Pillow up to 8.1.x. It has been classified as problematic. The affected element is the function BlpImagePlugin of the component BLP Data Handler. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2021-28678. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, has been found in Pillow and Python Imaging Library. This impacts an unknown function of the file Convert.c. This manipulation causes buffer overflow.
This vulnerability is tracked as CVE-2021-34552. The attack is only possible within the local network. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability has been found in Pillow up to 8.1.x and classified as problematic. This issue affects the function FliDecode of the component FLI Data Handler. Performing a manipulation results in infinite loop.
This vulnerability is known as CVE-2021-28676. Access to the local network is required for this attack. No exploit is available.
The affected component should be upgraded.