A vulnerability was found in Foxit WAC Server 2.0 and classified as very critical. This issue affects some unknown processing. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2008-7031. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Apple tvOS up to 11.4.1. This vulnerability affects unknown code. The manipulation leads to use after free.
This vulnerability was named CVE-2018-4306. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in wpdevteam Essential Addons for Elementor Plugin up to 5.9.9 on WordPress. This issue affects some unknown processing of the component Event Calendar Widget. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-1536. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in wpdevteam Essential Addons for Elementor Plugin up to 5.9.9 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Data Table Widget. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-1537. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in Zitadel up to 2.47.3. Affected by this vulnerability is an unknown functionality of the component Template Handler. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-28855. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in OctoPrint up to 1.9.3/1.10.0rc2 and classified as problematic. This issue affects some unknown processing of the component URL Handler. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-28237. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Microsoft Xbox Gaming Services and classified as critical. This issue affects some unknown processing. The manipulation leads to link following.
The identification of this vulnerability is CVE-2024-28916. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Zitadel up to 2.48.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Login UI. The manipulation leads to incorrect authorization.
This vulnerability is known as CVE-2024-29892. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Symantec Mail Security for Microsoft Exchange up to 6.5.8/7.0.4/7.5.4. This issue affects some unknown processing of the component RAR Decompression. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2016-5310. Attacking locally is a requirement. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.