A vulnerability was found in miraheze ImportDump. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to improper ownership management.
This vulnerability is handled as CVE-2024-47816. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in miraheze ImportDump. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Special:RequestImportQueue Page. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-47812. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in miraheze IncidentReporting. It has been classified as problematic. Affected is an unknown function of the file LocalSettings.php of the component Special:IncidentReports Page. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-47815. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Copilot Studio and classified as problematic. This issue affects some unknown processing. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2024-43610. The attack may be initiated remotely. There is no exploit available.
This product is a managed service. It is not possible for users to maintain vulnerability countermeasures themselves.
A vulnerability has been found in Sparkshop 1.16 and classified as problematic. This vulnerability affects unknown code of the component Payment Logic. The manipulation leads to enforcement of behavioral workflow.
This vulnerability was named CVE-2024-46307. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as critical, was found in Palo Alto GlobalProtect App up to 5.1/6.1/6.2.4/6.3 on Windows. This affects the function repair. The manipulation leads to execution with unnecessary privileges.
This vulnerability is uniquely identified as CVE-2024-9473. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Palo Alto Cortex XSOAR up to 6.12.0. Affected by this issue is some unknown functionality. The manipulation leads to exposure of sensitive system information to an unauthorized control sphere.
This vulnerability is handled as CVE-2024-9470. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Palo Alto Expedition up to 1.2.95. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-9467. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in CTFd up to 3.7.2. Affected is an unknown function of the file /api/v1/challenges//solves. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2024-42988. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in bytecodealliance wasmtime up to 21.0.1/22.0.0/23.0.2/24.0.0/25.0.1. It has been rated as problematic. This issue affects the function wasmtime::Engine. The manipulation leads to time-of-check time-of-use.
The identification of this vulnerability is CVE-2024-47813. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Palo Alto Cortex XDR Agent up to 7.9.101-CE/8.2-CE/8.3.0/8.4/8.4.0 on Windows. It has been declared as problematic. This vulnerability affects unknown code of the component Detection Mechanism. The manipulation leads to improper check for unusual conditions.
This vulnerability was named CVE-2024-9469. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Palo Alto Expedition up to 1.2.95. It has been classified as problematic. This affects an unknown part. The manipulation leads to sensitive information in log files.
This vulnerability is uniquely identified as CVE-2024-9466. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Palo Alto Expedition up to 1.2.95 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2024-9465. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Draytek Vigor3900 1.5.1.6 and classified as critical. Affected by this vulnerability is the function sub_2C920 of the file /cgi-bin/mainfunction.cgi of the component HTTP Message Handler. The manipulation leads to command injection.
This vulnerability is known as CVE-2024-46316. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability, which was classified as critical, was found in Trusted Firmware-M up to 2.1.0. Affected is the function mailbox_direct_reply. The manipulation of the argument in_vec/out_vec leads to buffer overflow.
This vulnerability is traded as CVE-2024-45746. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Palo Alto PAN-OS, Cloud NGFW and Prisma Access. This issue affects some unknown processing of the component Packet Handler. The manipulation leads to out-of-bounds write.
The identification of this vulnerability is CVE-2024-9468. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Palo Alto PAN-OS, Cloud NGFW and Prisma Access. This vulnerability affects unknown code. The manipulation leads to improper privilege management.
This vulnerability was named CVE-2024-9471. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Palo Alto Expedition up to 1.2.95. This affects an unknown part of the component Device Configuration Handler. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2024-9464. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.