A vulnerability, which was classified as problematic, has been found in PTC Kepware ThingWorx Kepware Server. This issue affects some unknown processing of the component Online Tag Generation. The manipulation leads to allocation of resources.
The identification of this vulnerability is CVE-2024-6098. Access to the local network is required for this attack. There is no exploit available.
It is recommended to change the configuration settings.
A vulnerability classified as problematic was found in Event Tickets with Ticket Scanner Plugin up to 2.3.7 on WordPress. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-6711. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in Magnet Forensics Axiom. This affects an unknown part. The manipulation leads to command injection.
This vulnerability is uniquely identified as CVE-2024-7448. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in JetBlocks Plugin up to 1.3.12 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-7147. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in JetSearch Plugin up to 3.5.2 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-7136. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in JetTabs Plugin up to 2.2.3 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to file inclusion.
This vulnerability is traded as CVE-2024-7146. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in JetElements Plugin up to 2.6.20 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to file inclusion.
The identification of this vulnerability is CVE-2024-7145. Access to the local network is required for this attack to succeed. There is no exploit available.
Microsoft addressed a critical zero-click Windows remote code execution (RCE) in the TCP/IP stack that impacts all systems with IPv6 enabled. Microsoft urges customers to fix a critical TCP/IP remote code execution (RCE) flaw, tracked as CVE-2024-38063 (CVSS score 9.8), in the TCP/IP stack. The vulnerability impacts all systems with IPv6 enabled (IPv6 is enabled by […]
A vulnerability has been found in JetElements Plugin up to 2.6.20 on WordPress and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-7144. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Foxit PDF Reader. This affects an unknown part of the component Doc Object Handler. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2024-7722. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Foxit PDF Reader. Affected by this issue is some unknown functionality of the component AcroForm. The manipulation leads to use after free.
This vulnerability is handled as CVE-2024-7723. The attack may be launched remotely. There is no exploit available.
A large percentage of Google's own Pixel devices shipped globally since September 2017 included dormant software that could be used to stage nefarious attacks and deliver various kinds of malware.
The issue manifests in the form of a pre-installed Android app called "Showcase.apk" that comes with excessive system privileges, including the ability to remotely execute code and install arbitrary
A vulnerability classified as critical was found in Foxit PDF Reader. Affected by this vulnerability is an unknown functionality of the component AcroForm. The manipulation leads to use after free.
This vulnerability is known as CVE-2024-7724. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in Foxit PDF Reader. Affected is an unknown function of the component AcroForm. The manipulation leads to use after free.
This vulnerability is traded as CVE-2024-7725. It is possible to launch the attack remotely. There is no exploit available.