A vulnerability, which was classified as problematic, was found in Limit Login Attempts Plugin up to 5.3 on WordPress. This affects an unknown part. The manipulation leads to protection mechanism failure.
This vulnerability is uniquely identified as CVE-2022-4534. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Image Optimizer, Resizer and CDN Plugin up to 7.2.9 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component SVG File Upload Handler. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-8964. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Follet School Solutions Destiny up to 22.0.1 AU0. Affected is the function handleloginform of the file handleloginform.do. The manipulation of the argument expiredSupportMessage leads to cross site scripting.
This vulnerability is traded as CVE-2024-47095. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in eWeLink Zigbee Bridge Pro up to 2.0.0. It has been rated as critical. Affected by this issue is some unknown functionality of the component TLS. The manipulation leads to improper certificate validation.
This vulnerability is handled as CVE-2024-7206. It is possible to launch the attack on the local host. There is no exploit available.
A vulnerability was found in Siemens SENTRON 7KM PAC3200 and classified as problematic. Affected by this issue is some unknown functionality of the component Modbus TCP Interface. The manipulation leads to improper authentication.
This vulnerability is handled as CVE-2024-41798. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Siemens Simcenter Nastran 2306, Simcenter Nastran 2312 and Simcenter Nastran 2406. It has been rated as critical. This issue affects some unknown processing of the component BDF File Handler. The manipulation leads to heap-based buffer overflow.
The identification of this vulnerability is CVE-2024-41981. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
GitLab has released security updates for Community Edition (CE) and Enterprise Edition (EE) to address eight security flaws, including a critical bug that could allow running Continuous Integration and Continuous Delivery (CI/CD) pipelines on arbitrary branches.
Tracked as CVE-2024-9164, the vulnerability carries a CVSS score of 9.6 out of 10.
"An issue was discovered in GitLab EE
A vulnerability was found in ShopLentor Plugin up to 2.9.8 on WordPress. It has been classified as problematic. Affected is an unknown function of the component FAQ Widget Elementor Template. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2024-9538. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Comments Import & Export Plugin up to 2.3.7 on WordPress and classified as critical. This issue affects some unknown processing. The manipulation leads to path traversal.
The identification of this vulnerability is CVE-2024-7514. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in Open Cluster Management and classified as problematic. This vulnerability affects unknown code of the component cluster-manager. The manipulation leads to permission issues.
This vulnerability was named CVE-2024-9779. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability, which was classified as problematic, was found in GitHub Enterprise Server up to 3.11.15/3.12.9/3.13.4/3.14.1. This affects an unknown part of the component SAML SSO. The manipulation leads to improper verification of cryptographic signature.
This vulnerability is uniquely identified as CVE-2024-9487. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Snipe-IT up to 7.0.9. Affected by this issue is some unknown functionality. The manipulation of the argument APP_KEY leads to Privilege Escalation.
This vulnerability is handled as CVE-2024-48987. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Gradio up to 4.x. Affected by this vulnerability is the function async_save_url_to_cache of the file /queue/join of the component Video Component. The manipulation leads to server-side request forgery.
This vulnerability is known as CVE-2024-47167. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Gradio up to 4.x. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-47872. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in HashiCorp Vault and Vault Enterprise. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to incorrect privilege assignment.
The identification of this vulnerability is CVE-2024-9180. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.