A vulnerability was found in GitLab Community Edition and Enterprise Edition up to 17.2.8/17.3.4/17.4.1 and classified as problematic. Affected by this issue is some unknown functionality of the component Pipeline Handler. The manipulation leads to incorrect authorization.
This vulnerability is handled as CVE-2024-8970. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in GitLab Enterprise Edition up to 17.2.8/17.3.4/17.4.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Pipeline Handler. The manipulation leads to missing authentication.
This vulnerability is known as CVE-2024-9164. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in GitLab Enterprise Edition up to 17.2.8/17.3.4/17.4.1. Affected is an unknown function of the component API. The manipulation leads to incorrect provision of specified functionality.
This vulnerability is traded as CVE-2024-5005. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in parisneo lollms-webui. This issue affects the function add_rag_database/toggle_mount_rag_database/vectorize_folder of the file lollms_file_system.py of the component SQLite File Handler. The manipulation leads to path traversal.
The identification of this vulnerability is CVE-2024-6971. The attack needs to be approached locally. There is no exploit available.
A vulnerability was found in NextMove Lite Plugin up to 2.17.0 on WordPress and classified as problematic. Affected by this issue is some unknown functionality of the component Activation Handler. The manipulation leads to missing authorization.
This vulnerability is handled as CVE-2024-25092. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Awesome Support Plugin up to 6.1.6 on WordPress and classified as critical. This vulnerability affects the function wpas_can_delete_attachments. The manipulation leads to improper authorization.
This vulnerability was named CVE-2024-24716. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Netgear ProSAFE Network Management System and classified as critical. Affected by this issue is some unknown functionality of the component UpLoadServlet. The manipulation leads to path traversal.
This vulnerability is handled as CVE-2024-5505. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in significant-gravitas AutoGPT up to 5.1.0. Affected is the function MacOSTTS. The manipulation leads to os command injection.
This vulnerability is traded as CVE-2024-1880. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as very critical, has been found in MLflow up to 2.8.x. This issue affects some unknown processing of the file mlflow.data.http_dataset_source.py. The manipulation leads to relative path traversal.
The identification of this vulnerability is CVE-2024-0520. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Unlimited Elements for Elementor Plugin up to 1.5.65 on WordPress. This affects an unknown part. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2023-31080. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in Woo WooCommerce Box Office Plugin up to 1.1.51 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to missing authorization.
This vulnerability is known as CVE-2023-34003. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Mecha CMS up to 3.0.0. It has been classified as critical. This affects an unknown part. The manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2024-46446. Access to the local network is required for this attack. There is no exploit available.
A vulnerability was found in SonicWALL SMA1000 Connect Tunnel Client up to 12.4.271 on Windows. It has been declared as critical. This vulnerability affects unknown code of the file CVSS. The manipulation leads to link following.
This vulnerability was named CVE-2024-45315. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in SonicWALL SMA1000 Connect Tunnel Client up to 12.4.271 on Windows. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to link following.
The identification of this vulnerability is CVE-2024-45316. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Pedalo Connector Plugin up to 2.0.5 on WordPress. This vulnerability affects unknown code. The manipulation leads to improper authentication.
This vulnerability was named CVE-2024-9822. The attack can be initiated remotely. There is no exploit available.