A vulnerability was found in WP-FeedStats wp-eMember Plugin up to 10.3.8 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation of the argument fieldId leads to cross site scripting.
This vulnerability was named CVE-2024-4749. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in SEH Computertechnik utnserver Pro, utnserver ProMAX and INU-100 up to 20.1.22. This issue affects some unknown processing of the component Web Interface. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-5420. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in WP Darko Responsive Tabs Plugin up to 4.0.5 on WordPress. Affected is an unknown function. The manipulation leads to basic cross site scripting.
This vulnerability is traded as CVE-2023-45635. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Menno Luitjes Foyer Plugin up to 1.7.5 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic cross site scripting.
This vulnerability is known as CVE-2023-47663. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in MLflow 1.11.0. It has been declared as critical. This vulnerability affects unknown code of the component MLproject Handler. The manipulation leads to code injection.
This vulnerability was named CVE-2024-37061. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as very critical, has been found in YdataAI ydata-profiling up to 3.7.0. Affected by this issue is some unknown functionality of the component Report Handler. The manipulation leads to deserialization.
This vulnerability is handled as CVE-2024-37062. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as very critical, was found in MLflow 1.24.0. This affects an unknown part. The manipulation leads to deserialization.
This vulnerability is uniquely identified as CVE-2024-37055. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in MLflow 2.0.0rc0 and classified as very critical. This vulnerability affects unknown code of the component Tensorflow Model Handler. The manipulation leads to deserialization.
This vulnerability was named CVE-2024-37057. The attack can be initiated remotely. There is no exploit available.