A vulnerability classified as problematic has been found in i-doit Open Source CMDB 1.14.1. Affected is an unknown function of the component Import Module. The manipulation of the argument delete_import leads to file inclusion.
This vulnerability is traded as CVE-2020-37078. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability described as critical has been identified in LizardSystems LanSend 3.2. This impacts an unknown function of the component Add Computers Wizard. Executing a manipulation can lead to buffer overflow.
This vulnerability appears as CVE-2020-37075. The attack requires local access. In addition, an exploit is available.
A vulnerability marked as critical has been reported in LizardSystems Remote Desktop Audit 2.3.0.157. This affects an unknown function. Performing a manipulation results in buffer overflow.
This vulnerability is reported as CVE-2020-37074. The attack requires a local approach. Moreover, an exploit is present.
A vulnerability labeled as problematic has been found in Kubernetes ingress-nginx up to 1.13.6/1.14.1. The impacted element is an unknown function. Such manipulation leads to allocation of resources.
This vulnerability is documented as CVE-2026-24514. The attack can be executed remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in Kubernetes ingress-nginx up to 1.13.6/1.14.1. The affected element is an unknown function of the component Ingress Annotation Handler. This manipulation causes improper check for unusual conditions.
This vulnerability is registered as CVE-2026-24513. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in RISS SRL MOMA Seismic Station up to 2.4.2520. Impacted is an unknown function of the component Web Management Interface. The manipulation results in missing authentication.
This vulnerability is cataloged as CVE-2026-1632. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Fastify up to 5.7.2. It has been rated as problematic. This issue affects the function reply.send. The manipulation leads to allocation of resources.
This vulnerability is listed as CVE-2026-25224. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability was found in QwikDev qwik up to 1.11.x. It has been declared as problematic. This vulnerability affects the function isContentType of the component Regular Expression Handler. Executing a manipulation can lead to cross-site request forgery.
This vulnerability is tracked as CVE-2026-25155. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in CloudMe 1.11.2. It has been classified as critical. This affects an unknown part of the component Service Port 8888. Performing a manipulation results in buffer overflow.
This vulnerability is identified as CVE-2020-37070. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability was found in Kubernetes ingress-nginx up to 1.13.6/1.14.1 and classified as very critical. Affected by this issue is some unknown functionality. Such manipulation of the argument rules.http.paths.path leads to improper input validation.
This vulnerability is referenced as CVE-2026-24512. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Kubernetes ingress-nginx up to 1.13.6/1.14.1 and classified as very critical. Affected by this vulnerability is an unknown functionality of the component Ingress Annotation Handler. This manipulation causes improper input validation.
The identification of this vulnerability is CVE-2026-1580. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in QwikDev qwik up to 1.18.x. Affected is an unknown function. The manipulation results in open redirect.
This vulnerability was named CVE-2026-25149. The attack may be performed from remote. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Craft CMS 1.0.0. This impacts an unknown function. The manipulation leads to deserialization.
This vulnerability is uniquely identified as CVE-2020-37071. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability classified as problematic was found in Maian Media Maian Support Helpdesk 4.3. This affects an unknown function. Executing a manipulation can lead to cross-site request forgery.
This vulnerability is handled as CVE-2020-37091. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability classified as critical has been found in VictorAlagwu CMSsite 1.0. The impacted element is an unknown function of the file /img/. Performing a manipulation of the argument user_image results in unrestricted upload.
This vulnerability is known as CVE-2020-37073. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability described as problematic has been identified in IBM Engineering Lifecycle Management up to 7.0.3 IF017/7.1.0 IF004. The affected element is an unknown function of the component Configuration Handler. Such manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-36033. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.