A vulnerability, which was classified as problematic, was found in WPZOOM Beaver Builder Addons Plugin up to 1.3.4 on WordPress. This affects an unknown part of the component Testimonials Widget. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-2187. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in WPZOOM Beaver Builder Addons Plugin up to 1.3.4 on WordPress and classified as problematic. This vulnerability affects unknown code of the component Heading Widget. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-2183. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in WPZOOM Beaver Builder Addons Plugin up to 1.3.4 on WordPress and classified as problematic. This issue affects some unknown processing of the component Button Widget. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-2181. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Dell PowerScale OneFS up to 9.3.0.0/9.4.0.16/9.5.0.7/9.7.0.0. It has been classified as problematic. This affects an unknown part. The manipulation leads to risky cryptographic algorithm.
This vulnerability is uniquely identified as CVE-2024-25963. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as problematic has been found in JumpServer up to 3.10.5. This affects an unknown part. The manipulation leads to authorization bypass.
This vulnerability is uniquely identified as CVE-2024-29024. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in JumpServer up to 3.10.6. This vulnerability affects unknown code of the component Jinja2 Template Handler. The manipulation leads to code injection.
This vulnerability was named CVE-2024-29202. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in JumpServer up to 3.10.5. This issue affects some unknown processing. The manipulation of the argument playbook_id leads to authorization bypass.
The identification of this vulnerability is CVE-2024-29020. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in JumpServer up to 3.10.6. It has been classified as critical. This affects an unknown part. The manipulation leads to code injection.
This vulnerability is uniquely identified as CVE-2024-29201. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in LearnPress Plugin up to 4.2.6.3 on WordPress. This vulnerability affects unknown code. The manipulation leads to improper control of resource identifiers.
This vulnerability was named CVE-2024-1289. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in LearnPress Plugin up to 4.2.6.3 on WordPress. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-1463. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Contao up to 4.13.39. This issue affects some unknown processing of the component Password Lost Module. The manipulation leads to session expiration.
The identification of this vulnerability is CVE-2024-30262. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in thorsten phpmyfaq 3.2.5. It has been rated as critical. This issue affects the function insertentry/saveentry. The manipulation leads to sql injection.
The identification of this vulnerability is CVE-2024-28107. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in thorsten phpmyfaq 3.2.5. Affected is an unknown function. The manipulation of the argument Content-Type/lang leads to unrestricted upload.
This vulnerability is traded as CVE-2024-28105. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in thorsten phpmyfaq 3.2.5. Affected by this issue is some unknown functionality. The manipulation of the argument contentLink leads to basic cross site scripting.
This vulnerability is handled as CVE-2024-28108. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in thorsten phpmyfaq 3.2.5. This affects an unknown part. The manipulation of the argument email leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-27300. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in thorsten phpmyfaq 3.2.5 and classified as problematic. This vulnerability affects unknown code. The manipulation of the argument news leads to cross site scripting.
This vulnerability was named CVE-2024-28106. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in thorsten phpmyfaq 3.2.5. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-29179. It is possible to launch the attack remotely. There is no exploit available.