A vulnerability, which was classified as problematic, was found in PHP up to 8.0.27/8.1.15/8.2.2. This issue affects the function password_verify of the component Blowfish Hash Handler. Executing a manipulation can lead to incorrect implementation of authentication algorithm.
This vulnerability appears as CVE-2023-0567. The attack may be performed from remote. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Apache Superset up to 2.0.1. Affected by this issue is some unknown functionality. This manipulation of the argument SECRET_KEY causes insecure default initialization of resource.
This vulnerability is registered as CVE-2023-27524. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability has been found in FreeRDP up to 3.21.x and classified as critical. This issue affects the function rdpsnd_treat_wave. This manipulation causes use after free.
The identification of this vulnerability is CVE-2026-24684. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability described as critical has been identified in FreeRDP up to 3.21.x. This affects the function ainput_send_input_event. Executing a manipulation can lead to use after free.
This vulnerability appears as CVE-2026-24683. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability classified as critical has been found in cmd-cgo up to 1.24.12/1.25.6 on Go. This issue affects some unknown processing. Performing a manipulation results in code injection.
This vulnerability is cataloged as CVE-2025-61732. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability marked as critical has been reported in crypto-tls up to 1.24.12/1.25.6 on Go. This impacts an unknown function. This manipulation causes improper certificate validation.
This vulnerability is handled as CVE-2025-68121. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, was found in FreeRDP up to 3.21.x. This vulnerability affects the function audin_server_recv_formats. The manipulation results in heap-based buffer overflow.
This vulnerability was named CVE-2026-24682. The attack may be performed from remote. There is no available exploit.
You should upgrade the affected component.
A vulnerability classified as critical has been found in FreeRDP up to 3.21.x. Affected by this vulnerability is the function urb_write_completion of the component urbdrc Channel Handler. Performing a manipulation results in use after free.
This vulnerability is known as CVE-2026-24681. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in FreeRDP up to 3.21.x. It has been classified as critical. This vulnerability affects the function ecam_encoder_compress_h264 of the component sws_scale. This manipulation causes use after free.
This vulnerability is tracked as CVE-2026-24677. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability labeled as critical has been found in FreeRDP up to 3.21.x. This affects the function ecam_channel_write. The manipulation results in use after free.
This vulnerability is reported as CVE-2026-24678. The attack can be launched remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in FreeRDP up to 3.21.x. This impacts the function libusb_udev_select_interface. This manipulation causes heap-based buffer overflow.
This vulnerability appears as CVE-2026-24679. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability described as critical has been identified in FreeRDP up to 3.21.x. Affected is the function sdl_Pointer_New. Such manipulation leads to use after free.
This vulnerability is traded as CVE-2026-24680. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability identified as critical has been detected in FreeRDP up to 3.21.x. The impacted element is the function audio_format_compatible. The manipulation leads to use after free.
This vulnerability is documented as CVE-2026-24676. The attack can be initiated remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability was found in FreeRDP up to 3.21.x. It has been declared as problematic. This issue affects the function rdp_write_logon_info_v2. Such manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2026-23948. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in FreeRDP up to 3.21.x. It has been rated as critical. Impacted is the function video_timer. Performing a manipulation results in use after free.
This vulnerability is cataloged as CVE-2026-24491. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in FreeRDP up to 3.21.x. The affected element is the function urb_select_interface. Executing a manipulation can lead to use after free.
This vulnerability is registered as CVE-2026-24675. It is possible to launch the attack remotely. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects some unknown processing of the component futex. This manipulation causes use after free.
This vulnerability is registered as CVE-2020-14381. The attack needs to be launched locally. No exploit is available.
Applying a patch is the recommended action to fix this issue.
A vulnerability marked as critical has been reported in Linux Kernel up to 5.10.11. Impacted is an unknown function of the component PI Futex Handler. Performing a manipulation results in use after free.
This vulnerability is identified as CVE-2021-3347. The attack can be initiated remotely. There is not any exploit available.
It is suggested to install a patch to address this issue.
A vulnerability identified as problematic has been detected in Google Android 8.1/9.0/10.0/11.0. This affects the function verifyBufferObject of the file Parcel.cpp. Performing a manipulation results in out-of-bounds read.
This vulnerability is cataloged as CVE-2021-0584. The attack must be initiated from a local position. There is no exploit available.
Applying a patch is the recommended action to fix this issue.