A vulnerability has been found in ThingsBoard up to 3.7.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component HTTP RPC API. The manipulation leads to resource consumption.
This vulnerability is known as CVE-2024-9358. The attack can be launched remotely. Furthermore, there is an exploit available.
The vendor was informed on 2024-07-24 about this vulnerability and announced the release of 3.7.1 for the second half of September 2024.
It is recommended to upgrade the affected component.
A vulnerability was found in Seiko Epson Web Config. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to insecure default initialization of resource.
This vulnerability was named CVE-2024-47295. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in SourceCodester Online Railway Reservation System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/inquiries/view_details.php. The manipulation of the argument id leads to improper access controls.
The identification of this vulnerability is CVE-2024-9321. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in phpMyAdmin up to 4.0.10.15 and classified as critical. This issue affects some unknown processing. The manipulation leads to 7pk security features.
The identification of this vulnerability is CVE-2016-4412. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
In verband met de slechter wordende veiligheidssituatie worden Nederlanders geholpen om Libanon te verlaten. Defensie zorgt in de komende dagen voor militair luchttransport, in nauw contact met andere landen die ook vluchten organiseren.
The Browser Company has introduced an Arc Bug Bounty Program to encourage security researchers to report vulnerabilities to the project and receive rewards. [...]
A vulnerability was found in WatchGuard Authentication Gateway up to 12.10.2 on Windows. It has been classified as very critical. This affects an unknown part of the component Management Command Handler. The manipulation leads to incorrect authorization.
This vulnerability is uniquely identified as CVE-2024-6593. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in WatchGuard Single Sign-On Client up to 12.7 on Windows. It has been declared as critical. This vulnerability affects unknown code of the component Command Handler. The manipulation leads to handling of exceptional conditions.
This vulnerability was named CVE-2024-6594. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Meshtastic Firmware up to 2.5.0 and classified as critical. Affected by this issue is some unknown functionality of the component MQTT Handler. The manipulation leads to improper authentication.
This vulnerability is handled as CVE-2024-47078. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Devolutions Remote Desktop Manager up to 2024.2.20.0 on Windows. It has been classified as problematic. This affects an unknown part of the component Command-Line Argument Handler. The manipulation leads to sensitive information in log files.
This vulnerability is uniquely identified as CVE-2024-7421. The attack needs to be approached locally. There is no exploit available.
A vulnerability, which was classified as critical, was found in mdflib 2.1. This affects the function ReadData of the component mdf4 File Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is uniquely identified as CVE-2024-41445. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as critical, has been found in SourceCodester Advocate Office Management System 1.0. Affected by this issue is some unknown functionality of the file /control/activate.php. The manipulation of the argument id leads to sql injection.
This vulnerability is handled as CVE-2024-9318. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in SourceCodester Online Timesheet App 1.0. This affects an unknown part of the file /endpoint/delete-timesheet.php. The manipulation of the argument timesheet leads to sql injection.
This vulnerability is uniquely identified as CVE-2024-9319. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability has been found in SourceCodester Online Timesheet App 1.0 and classified as problematic. This vulnerability affects unknown code of the file /endpoint/add-timesheet.php of the component Add Timesheet Form. The manipulation of the argument day/task leads to cross site scripting.
This vulnerability was named CVE-2024-9320. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/maintenance/manage_department.php. The manipulation of the argument id leads to sql injection.
The identification of this vulnerability is CVE-2024-9315. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability is the function delete_category of the file /classes/Master.php?f=delete_category. The manipulation of the argument id leads to sql injection.
This vulnerability is known as CVE-2024-9317. The attack can be launched remotely. Furthermore, there is an exploit available.