A vulnerability was found in Kadence Gutenberg Blocks Plugin up to 3.2.25 on WordPress. It has been declared as problematic. This vulnerability affects unknown code of the component Testimonial Widget. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-1999. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in DedeCMS 5.7. Affected by this issue is some unknown functionality of the file /src/dede/friendlink_edit.php. The manipulation of the argument ID leads to cross-site request forgery.
This vulnerability is handled as CVE-2024-2821. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as problematic, was found in DedeCMS 5.7. This affects an unknown part of the file /src/dede/vote_edit.php. The manipulation of the argument aid leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2024-2822. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic was found in DedeCMS 5.7. Affected by this vulnerability is an unknown functionality of the file /src/dede/baidunews.php. The manipulation of the argument filename leads to cross-site request forgery.
This vulnerability is known as CVE-2024-2820. The attack can be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in DedeCMS 5.7 and classified as problematic. This vulnerability affects unknown code of the file /src/dede/mda_main.php. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2024-2823. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Matthias-Wandel jhead 3.08 and classified as critical. This issue affects the function PrintFormatNumber of the file exif.c. The manipulation leads to heap-based buffer overflow.
The identification of this vulnerability is CVE-2024-2824. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Dassault Systèmes SOLIDWORKS Desktop 2024/2024 SP1 and classified as critical. Affected by this vulnerability is an unknown functionality of the component File Handler. The manipulation leads to use after free.
This vulnerability is known as CVE-2024-1848. It is possible to launch the attack on the local host. There is no exploit available.
A vulnerability has been found in langflow-ai langflow up to 1.2.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /api/v1/validate/code of the component HTTP Request Handler. The manipulation leads to missing authentication.
This vulnerability is known as CVE-2025-3248. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Netwin Surgemail up to 2.0a2. Affected is an unknown function of the component Error Message Handler. The manipulation leads to basic cross site scripting.
This vulnerability is traded as CVE-2004-2548. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mozilla Firefox up to 124.0.0. It has been declared as problematic. This vulnerability affects unknown code of the component Event Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-29944. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.