A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Jmini, Rotiple, D4m0n' was reported to the affected vendor on: 2024-10-15, 85 days ago. The vendor is given until 2025-02-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L severity vulnerability discovered by 'izo' was reported to the affected vendor on: 2024-10-15, 85 days ago. The vendor is given until 2025-02-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 4.3 AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L severity vulnerability discovered by 'leg00m' was reported to the affected vendor on: 2024-10-15, 85 days ago. The vendor is given until 2025-02-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 4.3 AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L severity vulnerability discovered by 'leg00m' was reported to the affected vendor on: 2024-10-15, 85 days ago. The vendor is given until 2025-02-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 4.3 AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L severity vulnerability discovered by 'leg00m' was reported to the affected vendor on: 2024-10-15, 85 days ago. The vendor is given until 2025-02-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'kimiya' was reported to the affected vendor on: 2024-10-15, 99 days ago. The vendor is given until 2025-02-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 8.8 AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'MICHAEL RANDRIANANTENAINA [https://elkamika.blogspot.com/]' was reported to the affected vendor on: 2024-10-15, 56 days ago. The vendor is given until 2025-02-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'kimiya' was reported to the affected vendor on: 2024-10-15, 105 days ago. The vendor is given until 2025-02-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 4.3 AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L severity vulnerability discovered by 'leg00m' was reported to the affected vendor on: 2024-10-15, 105 days ago. The vendor is given until 2025-02-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.3 AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Kolja Grassmann (Neodyme)' was reported to the affected vendor on: 2024-10-15, 105 days ago. The vendor is given until 2025-02-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A vulnerability was found in GStreamer ORC up to 0.4.38. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file orcparse.c of the component File Handler. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2024-40897. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in PHP up to 7.3.25/7.4.13. This issue affects the function filter_var of the component URL Validation Handler. The manipulation leads to improper input validation.
The identification of this vulnerability is CVE-2020-7071. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in PHP up to 8.1.29/8.2.23/8.3.11. It has been classified as problematic. Affected is an unknown function of the component PHP-FPM SAPI. The manipulation leads to improper neutralization of null byte or nul character.
This vulnerability is traded as CVE-2024-9026. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
The maintainers of the Jetpack WordPress plugin have released a security update to remediate a critical vulnerability that could allow logged-in users to access forms submitted by others on a site.
Jetpack, owned by WordPress maker Automattic, is an all-in-one plugin that offers a comprehensive suite of tools to improve site safety, performance, and traffic growth. It's used on 27 million
A vulnerability was found in SGI IRIX 6.2. It has been classified as critical. Affected is an unknown function of the file gmemusage/gr_osview. The manipulation of the argument HOME as part of Environment Variable leads to memory corruption.
This vulnerability is traded as CVE-2000-0794. An attack has to be approached locally. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.