A vulnerability classified as problematic was found in itsourcecode Online Blood Bank Management System 1.0. This vulnerability affects unknown code of the file signup.php of the component User Registration Handler. The manipulation of the argument user leads to cross site scripting.
This vulnerability was named CVE-2024-7321. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in Homebrew brew up to 4.2.19. This issue affects some unknown processing of the file os/linux/elf.rb of the component ELF File Handler. The manipulation leads to Remote Code Execution.
The identification of this vulnerability is CVE-2024-42381. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in WANotifier Plugin up to 2.6.0 on WordPress. Affected is an unknown function of the component Setting Handler. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-6165. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in SpiderContacts Plugin up to 1.1.7 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-6272. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in 10Web Slider Plugin up to 1.2.56 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-6408. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in HTML Forms Plugin up to 1.3.33 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2024-6412. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
Currently trending CVE - Hype Score: 1 - An Improper Isolation or Compartmentalization vulnerability in the kernel of Juniper Networks Junos OS allows a local attacker with high privileges to compromise the integrity of the device.
A local attacker with access to the shell is able to inject arbitrary code which can ...
Currently trending CVE - Hype Score: 1 - Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.
A vulnerability was found in Baidu UEditor 1.4.3.3. It has been classified as problematic. This affects an unknown part of the file /ueditor/php/controller.php?action=uploadfile&encode=utf-8. The manipulation of the argument upfile leads to unrestricted upload.
This vulnerability is uniquely identified as CVE-2024-7342. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Baidu UEditor 1.4.2. It has been declared as problematic. This vulnerability affects unknown code of the file /ueditor142/php/controller.php?action=catchimage. The manipulation of the argument source[] leads to cross site scripting.
This vulnerability was named CVE-2024-7343. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Plug&Track Sensor Net Connect V2 2.24 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2024-3083. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Plug&Track Sensor Net Connect V2 2.24. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-31199. The attack can be launched remotely. There is no exploit available.
A vulnerability has been found in xwiki-platform up to 14.10.20/15.5.4/15.10.5/16.0.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improper neutralization of directives in statically saved code ('static code injection').
This vulnerability was named CVE-2024-37900. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in DuendeSoftware IdentityServer up to 6.0.4/6.1.7/6.2.4/6.3.9/7.0.5 and classified as problematic. This issue affects some unknown processing. The manipulation leads to open redirect.
The identification of this vulnerability is CVE-2024-39694. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in ibexa admin-ui up to 4.6.8. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-39318. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Zitadel up to 2.58.0. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-41953. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Google Cloud Shell. Affected is an unknown function of the component ssh.cloud.google.com. The manipulation leads to open redirect.
It is possible to launch the attack remotely. There is no exploit available.
This product is a managed service. This means that users are not able to maintain vulnerability countermeasures themselves.