A vulnerability has been found in eLabFTW up to 5.1.4 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file experiments.php. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-47826. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in vercel next.js up to 14.2.6. It has been classified as problematic. This affects an unknown part. The manipulation leads to uncontrolled recursion.
This vulnerability is uniquely identified as CVE-2024-47831. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in NVIDIA NeMo up to All versions r2.0.0rc0. This issue affects the function SaveRestoreConnector of the component Tar File Extraction Handler. The manipulation leads to path traversal.
The identification of this vulnerability is CVE-2024-0129. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in IBM WebSphere Application Server 8.5. It has been declared as critical. This vulnerability affects unknown code of the component Request Handler. The manipulation leads to improper check for unusual conditions.
This vulnerability was named CVE-2024-45085. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ruijie NBR3000D-E. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /tool/shell/postgresql.conf. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2024-48783. The attack can be launched remotely. There is no exploit available.
A vulnerability has been found in Microsoft Dataverse and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improper authentication.
This vulnerability is known as CVE-2024-38139. The attack can be launched remotely. There is no exploit available.
This product is available as a managed service. Users are not able to maintain vulnerability countermeasures themselves.
A vulnerability was found in Microsoft Power Platform and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to missing authorization.
This vulnerability is handled as CVE-2024-38190. The attack may be launched remotely. There is no exploit available.
This product is a managed service. It is not possible for users to maintain vulnerability countermeasures themselves.
A vulnerability was found in Microsoft Azure Functions. It has been classified as critical. This affects an unknown part. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2024-38204. It is possible to initiate the attack remotely. There is no exploit available.
This product is a managed service. This means that users are not able to maintain vulnerability countermeasures themselves.
A vulnerability classified as problematic was found in IBM Watson Studio Local 1.2.3. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2024-49340. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Discount Rules for WooCommerce Plugin up to 2.6.5 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-8541. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Atlassian JIRA Software and JIRA Core 7.0.3. This issue affects some unknown processing of the component Inline Wiki Markup Handler. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2015-8481. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Impero Education Pro. It has been classified as critical. Affected is an unknown function. The manipulation with the input 1|AUTHENTICATE\x02PASSWORD leads to improper authentication.
This vulnerability is traded as CVE-2015-5998. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.