A vulnerability classified as critical was found in Oracle Healthcare Translational Research 3.2.1/3.3.1/3.3.2/3.4.0. Affected by this vulnerability is an unknown functionality of the component Cohort Explorer. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2020-11022. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Apache Tomcat 4.0.3. Affected is an unknown function of the file /servlet/ of the component Mapping Handler. The manipulation leads to basic cross site scripting.
This vulnerability is traded as CVE-2002-0682. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Javier Loureiro El mejor Cluster Plugin up to 1.1.14 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-49232. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in SunBK201 umicat up to 0.3.2. This issue affects the function power of the file src/uct_upstream.c. The manipulation leads to buffer overflow.
The identification of this vulnerability is CVE-2024-48406. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in nodemcu. Affected is the function getnum of the file /modules/struct.c. The manipulation leads to integer overflow.
This vulnerability is traded as CVE-2024-36671. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in moby up to 26.0.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file daemon/images/image_history.go. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2024-36620. Access to the local network is required for this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in SailPoint IdentityIQ up to 8.2p7/8.3p4/8.4p1. It has been rated as very critical. Affected by this issue is some unknown functionality. The manipulation leads to improper handling of file names that identify virtual resources.
This vulnerability is handled as CVE-2024-10905. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in mochiMQTT 2.6.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Request Handler. The manipulation leads to denial of service.
This vulnerability is known as CVE-2024-50948. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability has been found in Seecms 4.8 and classified as critical. This vulnerability affects unknown code of the file SEMCMS_SeoAndTag.php. The manipulation leads to sql injection.
This vulnerability was named CVE-2024-53502. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in InfoDom Performa 365 4.0.1. It has been rated as critical. This issue affects some unknown processing of the file /api/users. The manipulation leads to incorrect default permissions.
The identification of this vulnerability is CVE-2024-46624. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Handcent NextSMS 10.9.9.7. Affected is an unknown function. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2024-53605. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in code-projects Farmacia 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /visualizer-forneccedor.chp. The manipulation of the argument id leads to sql injection.
This vulnerability was named CVE-2024-11998. The attack can be initiated remotely. Furthermore, there is an exploit available.
Microsoft made it abundantly clear this week that Windows 10 users won't be able to upgrade to Windows 11 unless their systems come with TPM 2.0 support, stating it's a "non-negotiable" requirement. [...]
A vulnerability, which was classified as critical, has been found in Apache Roller up to 5.0.2. This issue affects some unknown processing of the component XML-RPC Protocol Support. The manipulation leads to xml external entity reference.
The identification of this vulnerability is CVE-2014-0030. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.