A vulnerability was found in nth-check (affected version not known). It has been rated as critical. Affected by this issue is an unknown code block. Applying the patch 9894c1d2010870c351f66c6f6efcf656e26bb726 is able to eliminate this problem. The bugfix is ready for download at github.com.
nth-check incorrect regex [CVE-2021-3803]
Description Frauscher Sensortechnik GmbH FDS101 for FAdC/FAdCi v1.4.24 and all previous versions are vulnerable to a remote code execution (RCE)
Description Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe,
CVE-2023-42454 : SQLpage Up To 0.11.0 Database Connection String sqlpage/sqlpage.json Information Disclosure
Description SQLpage is a SQL-only webapp builder. Someone using SQLpage versions prior to 0.11.1, whose SQLpage instance is exposed publicly,