Palo Alto Networks has disclosed a high-severity vulnerability impacting PAN-OS software that could cause a denial-of-service (DoS) condition on susceptible devices.
The flaw, tracked as CVE-2024-3393 (CVSS score: 8.7), impacts PAN-OS versions 10.X and 11.X, as well as Prisma Access running PAN-OS versions 10.2.8 and later or prior to 11.2.3. It has been addressed in PAN-OS 10.1.14-h8, PAN-OS
A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as critical. This vulnerability affects the function add_req of the file /_parse/_all_edits.php. The manipulation of the argument jid/limit leads to sql injection.
This vulnerability was named CVE-2024-12978. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, has been found in iTrack. Affected by this issue is some unknown functionality of the component Web API. The manipulation leads to improper input validation.
This vulnerability is handled as CVE-2016-6542. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Asus RP-AC52 up to 1.0.1.1s and classified as critical. Affected by this issue is some unknown functionality of the component Web Interface. The manipulation as part of Request leads to cross-site request forgery.
This vulnerability is handled as CVE-2016-6557. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Asus RP-AC52 1.0.1.1s. It has been classified as critical. This affects the function system of the file apply.cgi of the component Web Interface. The manipulation as part of Parameter leads to command injection.
This vulnerability is uniquely identified as CVE-2016-6558. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in ShoreTel Mobility Client App 9.1.3.109 on iOS/Android. It has been declared as critical. This vulnerability affects unknown code of the component SSL Certificate Validator. The manipulation leads to improper certificate validation.
This vulnerability was named CVE-2016-6562. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in PHP FormMail Generator and classified as critical. This issue affects some unknown processing of the file /admin.php?mod=admin&func=panel. The manipulation leads to improper authentication.
The identification of this vulnerability is CVE-2016-9482. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in PHP FormMail Generator. It has been classified as critical. Affected is the function phpfmg_filman_download. The manipulation leads to deserialization.
This vulnerability is traded as CVE-2016-9483. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in PHP FormMail Generator. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to path traversal.
This vulnerability is known as CVE-2016-9484. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as critical was found in EpubCheck 4.0.1. This vulnerability affects unknown code of the component XML Data Handler. The manipulation as part of EPUB File leads to xml external entity reference.
This vulnerability was named CVE-2016-9487. An attack has to be approached locally. There is no exploit available.
A vulnerability has been found in CodeLathe FileCloud up to 13.0.0.32841 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2016-6578. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Remote Clinic 2.0 and classified as problematic. Affected by this issue is some unknown functionality of the file register-patient.php. The manipulation of the argument Full Name leads to cross site scripting.
This vulnerability is handled as CVE-2021-30030. The attack may be launched remotely. Furthermore, there is an exploit available.