A vulnerability classified as problematic was found in Online Nurse Hiring System 1.0. Affected by this issue is some unknown functionality of the component Profile Page. Executing a manipulation can lead to cross site scripting.
This vulnerability is handled as CVE-2023-37683. The attack can be executed remotely. There is not any exploit available.
A vulnerability, which was classified as problematic, has been found in Online Nurse Hiring System 1.0. This affects an unknown part of the component Admin Portal. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2023-37684. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability, which was classified as problematic, was found in Online Nurse Hiring System 1.0. This vulnerability affects unknown code of the component Search Report Page. The manipulation results in cross site scripting.
This vulnerability was named CVE-2023-37685. The attack may be performed from remote. There is no available exploit.
A vulnerability has been found in Online Nurse Hiring System 1.0 and classified as problematic. This issue affects some unknown processing of the component Admin Portal. This manipulation causes cross site scripting.
The identification of this vulnerability is CVE-2023-37686. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Online Nurse Hiring System 1.0 and classified as problematic. Impacted is an unknown function of the component Admin Portal. Such manipulation leads to cross site scripting.
This vulnerability is referenced as CVE-2023-37687. It is possible to launch the attack remotely. No exploit is available.
A vulnerability categorized as critical has been discovered in Judging Management System 1.0. The affected element is an unknown function of the file /php-jms/deductScores.php. Executing a manipulation of the argument ID can lead to sql injection.
This vulnerability is registered as CVE-2023-37682. The attack requires access to the local network. No exploit is available.
Google is testing "Skills" for Gemini in Chrome, which will allow AI in Chrome to perform tasks automatically, and it could challenge Perplexity Comet or Edge's Copilot mode. [...]
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2. Affected by this issue is the function handle_policy_update of the component safesetid. Executing a manipulation can lead to buffer overflow.
The identification of this vulnerability is CVE-2024-58016. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.13.2. It has been declared as problematic. Affected by this vulnerability is the function print_array_to_buf_index. The manipulation of the argument length results in out-of-bounds read.
This vulnerability is known as CVE-2024-58015. Access to the local network is required for this attack. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2. Impacted is the function wlc_phy_iqcal_gainparams_nphy of the component brcmsmac. This manipulation causes out-of-bounds read.
The identification of this vulnerability is CVE-2024-58014. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2. This vulnerability affects the function mgmt_remove_adv_monitor_sync of the component Bluetooth. Executing a manipulation can lead to use after free.
This vulnerability is tracked as CVE-2024-58013. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.12.13/6.13.2 and classified as critical. This issue affects some unknown processing of the component ASoC. Such manipulation leads to null pointer dereference.
This vulnerability is documented as CVE-2024-58012. The attack requires being on the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2 and classified as critical. This vulnerability affects the function skl_int3472_get_acpi_buffer of the component x86. This manipulation causes null pointer dereference.
This vulnerability is registered as CVE-2024-58011. The attack requires access to the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.12.13/6.13.2. It has been declared as critical. This vulnerability affects the function sg_init_one. Such manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2024-58008. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2. It has been rated as critical. This issue affects the function l2cap_sock_alloc. Performing a manipulation results in improper initialization.
This vulnerability is known as CVE-2024-58009. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is advised.
A vulnerability categorized as problematic has been discovered in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2. Impacted is an unknown function of the component binfmt_flat. Executing a manipulation of the argument full_data can lead to integer overflow.
This vulnerability is handled as CVE-2024-58010. The attack can only be done within the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.12.13/6.13.2. This affects the function pci_epc_set_bar of the component Address Translation Handler. Executing a manipulation can lead to information disclosure.
This vulnerability is tracked as CVE-2024-58006. The physical device can be targeted for the attack. No exploit exists.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2. It has been classified as problematic. This affects the function offsetof of the component MSM8916 Handler. This manipulation causes out-of-bounds read.
This vulnerability appears as CVE-2024-58007. The attacker needs to be present on the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.6.77/6.12.13/6.13.2. It has been rated as critical. This impacts the function kvalloc of the file eventlog/acpi.c of the component tpm. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-58005. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is advised.