A vulnerability was found in PHPGurukul Client Management System 1.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Admin Search Invoice Page/Client Search Invoice Page. The manipulation of the argument search leads to cross site scripting.
This vulnerability is handled as CVE-2024-51209. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Brainvireinfo Dynamic URL SEO Plugin up to 1.0 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-52470. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Sandeep Verma HTML5 Lyrics Karaoke Player Plugin up to 2.4 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-52473. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Weather Atlas Widget Plugin up to 3.0.1 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-52472. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in petesheppard84 Extensions for Elementor Plugin up to 2.0.37 on WordPress and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-52471. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Bubka 2FAuth up to 5.4.0. This affects an unknown part of the file /api/v1/twofaccounts/preview of the component Endpoint. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-52598. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in PHPGurukul Boat Booking System 1.0. Affected by this issue is some unknown functionality of the file change-image.php of the component Image Upload Handler. The manipulation leads to unrestricted upload.
This vulnerability is handled as CVE-2024-51208. The attack may be launched remotely. There is no exploit available.
NETSCOUT is excited to announce that its Arbor Edge Defense (AED) solution has won “Threat Detection Solution of the Year” at the 8th annual CyberSecurity Breakthrough Awards! The mission of the CyberSecurity Breakthrough Awards is to honor excellence and recognize innovation, hard work, and success in a range of...
A vulnerability classified as very critical was found in upKeeper Solutions upKeeper Instant Privilege Access up to 1.1. Affected by this vulnerability is an unknown functionality. The manipulation leads to improper privilege management.
This vulnerability is known as CVE-2024-9479. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in OllyDbg 1.10. Affected is an unknown function. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2024-11495. It is possible to launch the attack on the local host. There is no exploit available.
A vulnerability was found in Bubka 2FAuth up to 5.4.0. It has been rated as problematic. This issue affects some unknown processing of the component SVG File Handler. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-52597. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in upKeeper Solutions upKeeper Instant Privilege Access up to 1.1. It has been declared as very critical. This vulnerability affects unknown code. The manipulation leads to improper privilege management.
This vulnerability was named CVE-2024-9478. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.