Currently trending CVE - Hype Score: 1 - Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command ...
A vulnerability, which was classified as problematic, was found in CMSimple 5.15. Affected is an unknown function of the component Settings Menu. The manipulation of the argument Logout leads to cross site scripting.
This vulnerability is traded as CVE-2024-33423. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability has been found in SourceCodester Laboratory Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Create User. The manipulation of the argument First Name leads to cross site scripting.
This vulnerability is known as CVE-2024-33306. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Typora up to 1.7. It has been classified as problematic. This affects an unknown part of the component Markdown Editor. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-33300. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in SourceCodester Laboratory Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Create User. The manipulation of the argument Last Name leads to cross site scripting.
This vulnerability is handled as CVE-2024-33307. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Follow Us Badges Plugin up to 3.1.10 on WordPress. It has been rated as problematic. This issue affects the function wpsite_follow_us_badges of the component Shortcode Handler. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-3280. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Xiaomi Pro 13. This affects the function GetApps. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-4406. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in WP Recipe Maker Plugin up to 9.3.1 on WordPress. It has been declared as problematic. This vulnerability affects the function wprm-recipe-roundup-item of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-3490. The attack can be initiated remotely. There is no exploit available.