A vulnerability classified as problematic was found in Ivory Search Plugin up to 5.5.6 on WordPress. This vulnerability affects unknown code of the component AJAX Search Form. The manipulation leads to information disclosure.
This vulnerability was named CVE-2024-6835. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability, which was classified as problematic, was found in FreeBSD. This affects an unknown part of the component nvlist Array String Handler. The manipulation leads to improper null termination.
This vulnerability is uniquely identified as CVE-2024-45288. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in FreeBSD and classified as critical. This vulnerability affects the function ctl_report_supported_opcodes of the component Kernel. The manipulation leads to improper filtering of special elements.
This vulnerability was named CVE-2024-42416. The attack needs to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in FreeBSD and classified as critical. This issue affects the function ctl_request_sense. The manipulation leads to out-of-bounds read.
The identification of this vulnerability is CVE-2024-43110. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in FreeBSD. It has been classified as critical. Affected is the function ctl_write_buffer. The manipulation leads to use after free.
This vulnerability is traded as CVE-2024-45063. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in FreeBSD. It has been declared as critical. Affected by this vulnerability is the function ctl_write_buffer/ctl_read_buffer. The manipulation leads to uninitialized resource.
This vulnerability is known as CVE-2024-8178. The attack can only be done within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Booking for Appointments and Events Calendar Plugin up to 1.2.3/7.7 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to missing authorization.
This vulnerability is known as CVE-2024-6332. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Form Vibes Plugin up to 1.4.12 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to missing authorization.
This vulnerability is handled as CVE-2024-5309. The attack can only be done within the local network. There is no exploit available.
A vulnerability classified as problematic has been found in Share This Image Plugin up to 2.02 on WordPress. Affected is an unknown function of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-8363. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability has been found in FreeBSD and classified as critical. This vulnerability affects unknown code of the component UMTX_SHM_DESTROY Sub-Request Handler. The manipulation leads to use after free.
This vulnerability was named CVE-2024-43102. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in FreeBSD and classified as critical. This issue affects some unknown processing of the component USB. The manipulation leads to off-by-one.
The identification of this vulnerability is CVE-2024-32668. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Chatbot with ChatGPT Plugin up to 2.4.4 on WordPress. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component REST Route Handler. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2024-6846. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams
A vulnerability classified as critical was found in jellytap Free App Icons and Icon Packs 1.4. This vulnerability affects unknown code of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability was named CVE-2014-5911. Access to the local network is required for this attack. There is no exploit available.
The joint government advisory highlighted the cyber activities of Unit 29155, which has launched destructive cyber-attacks against critical infrastructure globally