A vulnerability, which was classified as problematic, was found in Shared Files Plugin up to 1.7.28 on WordPress. This affects an unknown part. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2024-43230. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Dylan James Zephyr Project Manager Plugin up to .3.102 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-43915. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical was found in Hitachi Ops Center Common Services 10.9.3-00/11.0.2-00. Affected by this vulnerability is an unknown functionality. The manipulation leads to authentication bypass using alternate channel.
This vulnerability is known as CVE-2024-7125. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Dylan James Zephyr Project Manager Plugin up to 3.3.102 on WordPress. Affected is an unknown function. The manipulation leads to authorization bypass.
This vulnerability is traded as CVE-2024-43916. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in WPBackItUp Backup and Restore Plugin up to 1.50 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2024-43269. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in App::cpanminus package up to 1.7047 on Perl. It has been classified as problematic. This affects an unknown part. The manipulation leads to cleartext transmission of sensitive information.
This vulnerability is uniquely identified as CVE-2024-45321. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Sender Plugin up to 2.6.18 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2024-39657. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Shopify tophat up to 1.9.x and classified as critical. Affected by this vulnerability is an unknown functionality of the file ~/.tophatrc. The manipulation of the argument TOPHAT_APP_TOKEN leads to improper access controls.
This vulnerability is known as CVE-2024-45036. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in jpillora chisel up to 1.9.x. Affected is an unknown function of the component Environment Variable Handler. The manipulation of the argument AUTH leads to inconsistency between implementation and documented design.
This vulnerability is traded as CVE-2024-43798. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Mat Powell of Trend Micro Zero Day Initiative' was reported to the affected vendor on: 2024-08-27, 21 days ago. The vendor is given until 2024-12-25 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Mat Powell of Trend Micro Zero Day Initiative' was reported to the affected vendor on: 2024-08-27, 30 days ago. The vendor is given until 2024-12-25 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 4.3 AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N severity vulnerability discovered by 'Abdessamad Lahlali and Smile Thanapattheerakul of Trend Micro ' was reported to the affected vendor on: 2024-08-27, 30 days ago. The vendor is given until 2024-12-25 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Bobby Gould of Trend Micro Zero Day Initiative' was reported to the affected vendor on: 2024-08-27, 49 days ago. The vendor is given until 2024-12-25 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Guillaume Orlando' was reported to the affected vendor on: 2024-08-27, 66 days ago. The vendor is given until 2024-12-25 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.