A vulnerability was found in Apple macOS up to 14.5. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to buffer overflow.
This vulnerability is known as CVE-2024-44307. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple macOS up to 14.5. It has been classified as critical. Affected is an unknown function. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2024-44306. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in EPARK Kura Sushi Official App up to 3.8.4 on Android and classified as problematic. This issue affects some unknown processing. The manipulation leads to use of hard-coded cryptographic key
.
The identification of this vulnerability is CVE-2024-52614. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in W3speedster Plugin up to 7.25 on WordPress and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2024-52392. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Vivwebs Dynamic Widgets Plugin up to 1.6.4 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2024-51669. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in WPZOOM Beaver Builder Addons Plugin up to 1.3.4 on WordPress. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-30424. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in fedora-python lxml_html_clean up to 0.3.x. Affected by this vulnerability is the function lxml_html_clean. The manipulation leads to incomplete blacklist.
This vulnerability is known as CVE-2024-52595. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Google Android. Affected is the function f_hidg_read of the file f_hid.c. The manipulation leads to use after free.
This vulnerability is traded as CVE-2018-9417. The attack needs to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android 8/8.1. It has been rated as critical. This issue affects the function CryptoPlugin::decrypt of the file CryptoPlugin.cpp. The manipulation leads to out-of-bounds write.
The identification of this vulnerability is CVE-2018-9424. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android 8/8.1.0. It has been declared as problematic. This vulnerability affects the function analyzeAxes of the file FontUtils.cpp. The manipulation leads to out-of-bounds read.
This vulnerability was named CVE-2018-9410. Attacking locally is a requirement. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android 7/8/8.1. It has been classified as critical. This affects the function xmlSnprintfElementContent of the file valid.c. The manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2018-9466. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android 6/6.0.1/7/8/8.1 and classified as problematic. Affected by this issue is the function BnCameraService::onTransact of the file CameraService.cpp. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2018-9420. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Google Android 6/6.0.1/7/8/8.1 and classified as critical. Affected by this vulnerability is the function createPhonebookDialogView/createMapDialogView of the file BluetoothPermissionActivity.java. The manipulation leads to permission issues.
This vulnerability is known as CVE-2018-9432. The attack needs to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, was found in Google Android 8.1. Affected is the function startDevice of the file AAudioServiceStreamBase.cpp. The manipulation leads to out-of-bounds write.
This vulnerability is traded as CVE-2018-9428. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, has been found in Squirrly SEO Plugin up to 12.3.20 on WordPress. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-10515. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Google Android 7/8/8.1/9. This vulnerability affects the function getHost of the file UriTest.java. The manipulation leads to Privilege Escalation.
This vulnerability was named CVE-2018-9467. Access to the local network is required for this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic has been found in Google Android 7/8/8.1. This affects the function sdpu_extract_attr_seq of the file sdp_utils.cc. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2018-9456. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android 7/8/8.1/9. It has been rated as problematic. Affected by this issue is the function parse of the file M3UParser.cpp. The manipulation leads to resource consumption.
This vulnerability is handled as CVE-2018-9440. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android 6/6.0.1/7/8/8.1. It has been declared as problematic. Affected by this vulnerability is the function removeUnsynchronization of the file ID3.cpp. The manipulation leads to resource consumption.
This vulnerability is known as CVE-2018-9412. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.