A vulnerability was found in Post Grid Combo Plugin up to 2.2.68 on WordPress. It has been classified as problematic. Affected is the function get_posts of the component API Endpoint. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2023-7072. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Blossom Spa Plugin up to 1.3.4 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2024-2107. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Gacjie Server up to 1.0. This affects the function index of the file /app/admin/controller/Upload.php. The manipulation of the argument file leads to unrestricted upload.
This vulnerability is uniquely identified as CVE-2024-2406. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Apache Pulsar up to 2.10.5/2.11.2/3.0.1/3.1.0. Affected is an unknown function of the file /proxy-stats. The manipulation leads to missing authentication.
This vulnerability is traded as CVE-2022-34321. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apache Pulsar up to 2.10.5/2.11.3/3.0.2/3.1.2/3.2.0 and classified as critical. Affected by this issue is some unknown functionality of the component Function Worker. The manipulation leads to dynamically-managed code resources.
This vulnerability is handled as CVE-2024-27135. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in code-projects Scholars Tracking System 1.0. This affects an unknown part of the component Eligibility Information Update. The manipulation leads to sql injection.
This vulnerability is uniquely identified as CVE-2024-24101. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability was found in IBM Sterling Partner Engagement Manager 6.1.2/6.2.0/6.2.2. It has been classified as problematic. This affects an unknown part of the component Web UI. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2023-28517. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Brother iPrint&Scan up to 6.11.2 on Android. Affected is an unknown function. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2023-28369. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Oracle MySQL Server up to 5.7.43/8.0.34/8.1.0. Affected is an unknown function of the component InnoDB. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2023-22084. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Paid Membership Subscriptions Plugin up to 2.11.1 on WordPress. This affects the function creating_pricing_table_page. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2024-1390. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in IBM Trusteer iOS SDK and Trusteer Android SDK up to 5.6. Affected by this issue is some unknown functionality. The manipulation leads to unrestricted upload.
This vulnerability is handled as CVE-2022-42443. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in zephyrproject-rtos Zephyr up to 3.5. Affected is an unknown function of the component Settings Shell. The manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2023-6749. Local access is required to approach this attack. There is no exploit available.
A vulnerability classified as critical was found in zephyrproject-rtos Zephyr up to 3.5. Affected by this vulnerability is the function remove_rx_filter. The manipulation leads to out-of-bounds write.
This vulnerability is known as CVE-2023-5779. It is possible to launch the attack on the local host. There is no exploit available.
A vulnerability, which was classified as very critical, has been found in Biosig libbiosig 2.5.0. Affected by this issue is the function sopen_FAMOS_read. The manipulation leads to integer underflow.
This vulnerability is handled as CVE-2024-23313. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Biosig libbiosig 2.5.0. It has been declared as very critical. Affected by this vulnerability is the function sopen_FAMOS_read of the component Famos File Handler. The manipulation leads to use after free.
This vulnerability is known as CVE-2024-23310. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Linux Kernel up to 6.7. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to integer overflow.
This vulnerability is known as CVE-2024-23307. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Oracle GoldenGate and classified as critical. Affected by this vulnerability is an unknown functionality of the component Build Request. The manipulation leads to use after free.
This vulnerability is known as CVE-2018-1311. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.