A vulnerability has been found in TeamViewer Remote Full Client and Remote Host on Windows and classified as critical. Affected by this vulnerability is an unknown functionality of the file TeamViewer_service.exe of the component Printer Driver Installation. The manipulation leads to improper verification of cryptographic signature.
This vulnerability is known as CVE-2024-7481. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in TeamViewer Remote Full Client and Remote Host on Windows. Affected is an unknown function of the file TeamViewer_service.exe of the component VPN Driver Installation. The manipulation leads to improper verification of cryptographic signature.
This vulnerability is traded as CVE-2024-7479. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Hitachi Energy RTU500 up to 13.3.1. This vulnerability affects unknown code of the component HCI Modbus TCP. The manipulation leads to stack-based buffer overflow.
This vulnerability was named CVE-2022-2081. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in SeaCMS 12.9 and classified as problematic. This vulnerability affects unknown code of the file admin_notify.php. The manipulation leads to Privilege Escalation.
This vulnerability was named CVE-2023-44169. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in SeaCMS 12.9 and classified as problematic. This issue affects some unknown processing of the file admin_ping.php. The manipulation leads to Privilege Escalation.
The identification of this vulnerability is CVE-2023-44170. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in SeaCMS 12.9. It has been classified as problematic. Affected is an unknown function of the file admin_smtp.php. The manipulation leads to Privilege Escalation.
This vulnerability is traded as CVE-2023-44171. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in SeaCMS 12.9. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file admin_weixin.php. The manipulation leads to Privilege Escalation.
This vulnerability is known as CVE-2023-44172. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01 and classified as critical. This issue affects the function setSchedWifi. The manipulation of the argument schedEndTime leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2023-44015. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been classified as critical. Affected is the function addWifiMacFilter. The manipulation of the argument deviceId leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2023-44016. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been declared as critical. Affected by this vulnerability is the function fromSetSysTime. The manipulation of the argument timeZone leads to stack-based buffer overflow.
This vulnerability is known as CVE-2023-44017. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been rated as critical. Affected by this issue is the function add_white_node. The manipulation of the argument domain leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2023-44018. The attack needs to be done within the local network. There is no exploit available.
A vulnerability classified as critical has been found in Tenda AC10U 15.03.06.49_multi_TDE01. This affects the function GetParentControlInfo. The manipulation of the argument mac leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2023-44019. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability has been found in Huawei EMUI and Magic and classified as problematic. This vulnerability affects unknown code of the component Broadcast Handler. The manipulation leads to permission issues.
This vulnerability was named CVE-2023-4565. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in PGYER codefever 2023.8.14-2ce4006. It has been rated as critical. Affected by this issue is some unknown functionality of the component branchList. The manipulation leads to Privilege Escalation.
This vulnerability is handled as CVE-2023-44080. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in mooSocial 3.1.8. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component DNS Request Handler. The manipulation of the argument messageText/data[wall_photo]/data[userShareVideo]/data[userShareLink] leads to Privilege Escalation.
This vulnerability is known as CVE-2023-43323. The attack can only be done within the local network. There is no exploit available.
A vulnerability classified as critical has been found in Panasonic Control FPWIN Pro up to 7.7.0.0. This affects an unknown part of the component Project File Handler. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2023-6315. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Hitachi Energy RTU500 up to 13.5.1. Affected is an unknown function of the component Messages Handler. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2023-6711. It is possible to launch the attack remotely. There is no exploit available.