A vulnerability was found in ClickWhale Plugin up to 2.4.1 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-11327. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Post Duplicator Plugin up to 2.36 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2024-12472. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability has been found in Trackserver Plugin up to 5.0.2 on WordPress and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-12505. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Coupon X Plugin up to 1.3.5 on WordPress and classified as critical. This issue affects some unknown processing. The manipulation leads to missing authorization.
The identification of this vulnerability is CVE-2024-12204. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Kadence Gutenberg Blocks with AI Plugin up to 3.4.2 on WordPress. This affects an unknown part of the component Button Link Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-12304. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in CF Internal Link Shortcode up to 1.1.0 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2024-12404. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in PHPGurukul Land Record System 1.0. Affected by this vulnerability is an unknown functionality of the file /landrecordsys/admin/contactus.php. The manipulation of the argument pagetitle leads to cross site scripting.
This vulnerability is known as CVE-2024-57686. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in IBM Engineering Requirements Management DOORS Next 7.0.2/7.0.3. Affected is an unknown function of the component Request Handler. The manipulation leads to time-of-check time-of-use.
This vulnerability is traded as CVE-2024-41787. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in PHPGurukul Land Record System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /landrecordsys/admin/dashboard.php of the component GET Request Parameter Handler. The manipulation of the argument Cookie leads to os command injection.
The identification of this vulnerability is CVE-2024-57687. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in lunary-ai lunary up to 1.2.6 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Organization Handler. The manipulation leads to incorrect authorization.
This vulnerability is known as CVE-2024-1740. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Dahua IPC-HFW1200S, IPC-HFW2300R-Z, IPC-HFW5220E-Z and IPC-HDW1200S up to 20241222. It has been rated as problematic. Affected by this issue is some unknown functionality of the file ../mtd/Config/Sha1Account1 of the component Web Interface. The manipulation leads to path traversal: '../filedir'.
This vulnerability is handled as CVE-2024-13130. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability was found in Microsoft Windows up to Vista. It has been rated as very critical. This issue affects some unknown processing of the component Schannel. The manipulation leads to code injection.
The identification of this vulnerability is CVE-2014-6321. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Internet Explorer up to 11. It has been rated as very critical. Affected by this issue is the function CMarkup::IsConnectedToPrimaryMarkup of the component SWF File Handler. The manipulation leads to code injection.
This vulnerability is handled as CVE-2014-1776. The attack may be launched remotely. Furthermore, there is an exploit available. This vulnerability has a historic impact due to its background and reception.
It is recommended to apply the suggested workaround.
A vulnerability was found in Microsoft Windows up to XP. It has been rated as very critical. This issue affects the function SafeArrayDimen in the library OleAut32.dll of the component OLE Automation Array Handler. The manipulation leads to code injection.
The identification of this vulnerability is CVE-2014-6332. The attack may be initiated remotely. Furthermore, there is an exploit available. Due to its background and reception, this vulnerability has an historic impact.
It is recommended to apply a patch to fix this issue.