A vulnerability classified as problematic has been found in Nautobot up to 1.6.15/2.1.8. This issue affects some unknown processing of the component URL Endpoint. The manipulation leads to information disclosure.
This vulnerability is documented as CVE-2024-29199. The attack can be initiated remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Navidrome up to 0.51.x. It has been declared as critical. This affects an unknown part of the component HTTP Traffic Handler. Executing manipulation can lead to information disclosure.
This vulnerability is registered as CVE-2024-32963. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability labeled as problematic has been found in Nautobot up to 1.6.19/2.2.2. The affected element is an unknown function. Such manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-32979. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability marked as problematic has been reported in Check Point Harmony Endpoint Security Client up to E88.10 on Windows. Impacted is an unknown function. Performing manipulation results in incorrect permission assignment.
This vulnerability is reported as CVE-2024-24912. The attack requires a local approach. No exploit exists.
A vulnerability was found in Asterisk 18.23.0/20.8.0/21.3.0. It has been rated as problematic. The impacted element is an unknown function of the component SIP Request Handler. Performing manipulation results in incorrect implementation of authentication algorithm.
This vulnerability is identified as CVE-2024-35190. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as problematic, has been found in Nautobot. Impacted is an unknown function of the file /extras/dynamic-groups/. This manipulation causes improper handling of insufficient permissions or privileges.
This vulnerability is handled as CVE-2024-36112. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Canonical Apport up to 2.20.x. It has been rated as critical. This affects an unknown function. The manipulation leads to race condition.
This vulnerability is referenced as CVE-2021-3899. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in element-hq synapse up to 1.105.0. It has been declared as critical. This impacts an unknown function of the component V2 State Resolution Algorithm. Executing manipulation can lead to allocation of resources.
This vulnerability is registered as CVE-2024-31208. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in Nautobot up to 1.6.21/2.2.3. This affects an unknown part of the file /admin/constance/config/. The manipulation of the argument BANNER_TOP/BANNER_BOTTOM/BANNER_LOGIN results in cross site scripting.
This vulnerability is cataloged as CVE-2024-34707. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability has been found in Miniaudio 0.10.35 and classified as critical. The impacted element is the function ma_default_vfs_close__stdio in the library miniaudio.h. The manipulation leads to double free.
This vulnerability is referenced as CVE-2021-34184. The attack needs to be initiated within the local network. No exploit is available.
A vulnerability was found in Miniaudio 0.10.35 and classified as problematic. This affects the function drwav_bytes_to_u32 in the library miniaudio.h. The manipulation results in out-of-bounds read.
This vulnerability is identified as CVE-2021-34185. The attack can only be performed from the local network. There is not any exploit available.
A vulnerability labeled as problematic has been found in nocodb up to 0.95.x. Impacted is an unknown function. Executing manipulation can lead to improper input validation.
The identification of this vulnerability is CVE-2023-5104. The attack needs to be done within the local network. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, has been found in nocodb 0.91.7/0.92.0/0.96.0. The impacted element is an unknown function of the file SqliteClient.ts. This manipulation causes sql injection.
This vulnerability is registered as CVE-2023-43794. Remote exploitation of the attack is possible. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in Discourse up to 3.2.0/3.3.0.beta1. It has been declared as problematic. Impacted is an unknown function of the component CSV Export. Such manipulation leads to resource consumption.
This vulnerability is documented as CVE-2024-27100. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in Discourse up to 3.2.0. It has been rated as problematic. The affected element is an unknown function of the file /uploads. Performing manipulation results in resource consumption.
This vulnerability is reported as CVE-2024-24827. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability categorized as problematic has been discovered in Discourse up to 3.2.0/3.3.0.beta1. The impacted element is an unknown function of the component Invite Route. Executing manipulation can lead to resource consumption.
This vulnerability appears as CVE-2024-27085. The attack may be performed from a remote location. There is no available exploit.
A vulnerability labeled as problematic has been found in Discourse up to 3.2.0/3.3.0.beta1. This impacts an unknown function of the component Category Handler. The manipulation results in information disclosure.
This vulnerability is known as CVE-2024-28242. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in python-ecdsa up to 0.18.0. It has been rated as critical. The affected element is an unknown function. The manipulation leads to covert timing channel.
This vulnerability is documented as CVE-2024-23342. The attack can be initiated remotely. There is not any exploit available.