A vulnerability has been found in Codezips Hospital Appointment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /removeBranchResult.php. The manipulation of the argument ID/Name leads to sql injection.
This vulnerability is known as CVE-2024-11057. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Tenda AC10 16.03.10.13. Affected is the function FUN_0046AC38 of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2024-11056. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in 1000 Projects Beauty Parlour Management System 1.0. This issue affects some unknown processing of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to sql injection.
The identification of this vulnerability is CVE-2024-11055. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in SourceCodester Simple Music Cloud Community System 1.0. This vulnerability affects unknown code of the file /music/ajax.php?action=signup. The manipulation of the argument pp leads to unrestricted upload.
This vulnerability was named CVE-2024-11054. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic has been found in Mattermost up to 9.5.10/9.11.2. This affects an unknown part of the component MFA. The manipulation leads to incorrect implementation of authentication algorithm.
This vulnerability is uniquely identified as CVE-2024-36250. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mattermost up to 9.11.2/10.0.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Channel Name Handler. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2024-52032. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mattermost up to 9.5.9/9.10.2/9.11.1/10.0.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /api/v4/channels. The manipulation leads to incorrect authorization.
This vulnerability is known as CVE-2024-42000. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Isystems Munch Pro 1.0. Affected is an unknown function of the file switch.asp. The manipulation of the argument catid leads to sql injection.
This vulnerability is traded as CVE-2006-5880. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The Federal Bureau of Investigation (FBI) is urging police departments and governments worldwide to beef up security around their email systems, citing a recent increase in cybercriminal services that use hacked police email accounts to send unauthorized subpoenas and customer data requests to U.S.-based technology companies.
A vulnerability was found in Adobe Flash Player up to 11.2.202.548/18.0.0.261/19.0.0.245 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to use after free.
This vulnerability is handled as CVE-2015-8412. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Oracle WebCenter Content 12.2.1.4.0. It has been classified as critical. This affects an unknown part of the component ADF UCM Application. The manipulation leads to deserialization.
This vulnerability is uniquely identified as CVE-2019-10086. It is possible to initiate the attack remotely. There is no exploit available.