A vulnerability has been found in Apache James Server up to 3.7.4/3.8.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component SMTP Handler. The manipulation leads to improper input validation.
This vulnerability is known as CVE-2023-51747. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in AVTECH Room Alert 4E 4.4.0 and classified as problematic. Affected by this issue is some unknown functionality of the component AJAX Request Handler. The manipulation leads to missing encryption of sensitive data.
This vulnerability is handled as CVE-2024-33471. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in oslabs-beta SkyScraper = 1.0.0. Affected by this issue is some unknown functionality of the component HTTP Request Handler. The manipulation leads to cleartext transmission of sensitive information.
This vulnerability is handled as CVE-2024-37163. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in jgniecki MinecraftMotdParser up to 1.0.5 and classified as problematic. Affected by this issue is the function HtmlGenerator. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-47765. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in OpenC3 cosmos Open Source Edition up to 5.18.x. It has been classified as problematic. This affects an unknown part of the component User Password Handler. The manipulation leads to cleartext storage of sensitive information.
This vulnerability is uniquely identified as CVE-2024-47529. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Veritas Data Insight up to 7.0. Affected by this issue is some unknown functionality of the component HTTP Request Handler. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-47854. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in zephyrproject-rtos Zephyr up to 3.6. This affects the function ascs_cp_rsp_add of the file /subsys/bluetooth/audio/ascs.c of the component Global Buffer Handler. The manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2024-6442. Access to the local network is required for this attack. There is no exploit available.
A vulnerability has been found in zephyrproject-rtos Zephyr up to 3.6 and classified as critical. Affected by this vulnerability is the function olcp_ind_handler of the file zephyr/subsys/bluetooth/services/ots/ots_client.c. The manipulation leads to heap-based buffer overflow.
This vulnerability is known as CVE-2024-6444. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in Jenkins. It has been rated as problematic. This issue affects some unknown processing of the component Form Submission Handler. The manipulation of the argument secretTextarea leads to information exposure through error message.
The identification of this vulnerability is CVE-2024-47803. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Jenkins and classified as critical. Affected by this vulnerability is an unknown functionality of the component CLI/REST API. The manipulation leads to permission issues.
This vulnerability is known as CVE-2024-47804. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Jenkins Credentials Plugin up to 1380.va_435002fa_924 and classified as problematic. Affected by this issue is some unknown functionality of the file config.xml of the component CLI/REST API. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2024-47805. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
The tech giant fixed privilege-escalation and model-exfiltration vulnerabilities in Vertex AI that could have allowed attackers to steal or poison custom-built AI models.
A vulnerability, which was classified as problematic, has been found in Google Android 12/13/14/15. This issue affects the function shouldHideDocument of the file ExternalStorageProvider.java. The manipulation leads to Local Privilege Escalation.
The identification of this vulnerability is CVE-2024-43093. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical was found in Google Android 12/12L/13/14/15. This vulnerability affects unknown code of the file AppInfoBase.java. The manipulation leads to permission issues.
This vulnerability was named CVE-2024-43088. The attack needs to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.