A vulnerability was found in Blocksera Image Hover Effects Plugin up to 1.4 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-29936. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Exclusive Addons Elementor Plugin up to 2.6.8 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-30177. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in IBM WebSphere Application Server Liberty up to 24.0.0.3. This affects an unknown part of the component URI Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-27270. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in IBM QRadar SIEM 7.5. This vulnerability affects unknown code of the component Web UI. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-28784. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in SinaExtra Sina Extension for Elementor Plugin up to 3.5.0 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-29935. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in IBM QRadar SIEM 7.5. This issue affects some unknown processing of the component Web UI. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2023-50961. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
Phishing-as-a-service (PhaaS) platform Tycoon2FA, known for bypassing multi-factor authentication on Microsoft 365 and Gmail accounts, has received updates that improve its stealth and evasion capabilities. [...]
A vulnerability was found in Cacti and classified as critical. This issue affects some unknown processing of the file graph_view.php of the component Login. The manipulation of the argument login_username leads to sql injection.
The identification of this vulnerability is CVE-2008-0785. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Apple Mac OS X 10.9/10.9.1. Affected by this issue is some unknown functionality of the component cURL. The manipulation leads to cryptographic issues (IP address).
This vulnerability is handled as CVE-2014-1263. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Apple Mac OS X 10.9/10.9.1. This affects an unknown part of the component Finder. The manipulation leads to improper access controls (ACL).
This vulnerability is uniquely identified as CVE-2014-1264. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Apple Mac OS X 10.7.5/10.8.5/10.9/10.9.1 and classified as problematic. This vulnerability affects unknown code of the component System Clock. The manipulation leads to improper access controls.
This vulnerability was named CVE-2014-1265. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple Safari up to 7.0.1 and classified as critical. Affected by this issue is some unknown functionality of the component WebKit. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2014-1268. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.