A vulnerability, which was classified as problematic, has been found in Arcadia Crafty Controller up to 4.2.3/4.3.2/4.4.9. This issue affects some unknown processing of the component Server Name Form/API Key Form. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2025-5990. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Ping Identity PingFederate up to 11.2.10/11.3.9/12.0.6/12.1.4. This vulnerability affects unknown code of the component Administrative Console. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-25573. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Ping Identity PingFederate up to 1.5.1. This affects an unknown part of the component Non-200 HTTP Response Handler. The manipulation leads to unexpected status code or return value.
This vulnerability is uniquely identified as CVE-2025-22854. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ping Identity PingFederate up to 11.3.12/12.0.8/12.1.8/12.2.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the component OAuth2. The manipulation leads to duplicate key in associative list.
This vulnerability is handled as CVE-2025-21085. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Intera InHire up to 20250530. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument 29chcotoo9 leads to server-side request forgery.
This vulnerability is known as CVE-2025-6142. The attack can be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as problematic, was found in Microsoft Internet Explorer 5.5/6.0 on Win 2000. Affected is an unknown function of the component ftp.htt. The manipulation of the argument Hostname leads to basic cross site scripting.
This vulnerability is traded as CVE-2002-2062. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Draytek Vigor 3910 4.3.2.6. It has been rated as critical. This issue affects some unknown processing of the file v2x00.cgi. The manipulation of the argument iProfileIdx leads to buffer overflow.
The identification of this vulnerability is CVE-2024-46567. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability classified as critical has been found in Draytek Vigor 3910 4.3.2.6. Affected is an unknown function of the file vpn.cgi. The manipulation of the argument sPeerId leads to buffer overflow.
This vulnerability is traded as CVE-2024-46568. The attack needs to be done within the local network. There is no exploit available.
A vulnerability classified as critical was found in Draytek Vigor 3910 4.3.2.6. Affected by this vulnerability is an unknown functionality of the file fwuser.cgi. The manipulation of the argument sPPPSrvNm leads to buffer overflow.
This vulnerability is known as CVE-2024-46571. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Draytek Vigor 3910 4.3.2.6. Affected by this issue is some unknown functionality of the file v2x00.cgi. The manipulation of the argument fid leads to buffer overflow.
This vulnerability is handled as CVE-2024-46580. Access to the local network is required for this attack. There is no exploit available.
A vulnerability, which was classified as critical, was found in Draytek Vigor 3910 4.3.2.6. This affects an unknown part of the file v2x00.cgi. The manipulation of the argument sProfName leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-46581. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability was found in Draytek Vigor 3910 4.3.2.6 and classified as critical. Affected by this issue is some unknown functionality of the file fextobj.cgi. The manipulation of the argument sProfileName leads to buffer overflow.
This vulnerability is handled as CVE-2024-46564. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability was found in H3C GR-3000AX V100R007L50. It has been classified as critical. Affected is the function UpdateWanParamsMulti/UpdateIpv6Params of the file /routing/goform/aspForm. The manipulation of the argument param leads to buffer overflow.
This vulnerability is traded as CVE-2025-6091. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The vendor confirms the existence of this issue. Because they assess the risk as low, they do not have immediate plans for remediation.
A vulnerability was found in Microsoft Internet Explorer up to 6. It has been declared as problematic. This vulnerability affects unknown code of the component DHTML Handler. The manipulation leads to information disclosure.
This vulnerability was named CVE-2006-5577. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Internet Explorer up to 6. It has been rated as problematic. This issue affects some unknown processing of the component Drag / Drop Temporary Internet Files Handler. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2006-5577. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.