A vulnerability, which was classified as problematic, has been found in SourceCodester Best Employee Management System 1.0. This issue affects some unknown processing of the file /admin/salary_slip.php. The manipulation of the argument id leads to authorization bypass.
The identification of this vulnerability is CVE-2025-1607. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic was found in SourceCodester Best Employee Management System 1.0. This vulnerability affects unknown code of the file /admin/backup/backups.php. The manipulation leads to information disclosure.
This vulnerability was named CVE-2025-1606. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic has been found in scottpaterson Accept Donations with PayPal & Stripe Plugin up to 1.4.4 on WordPress. This affects an unknown part. The manipulation of the argument rf leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-13728. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Advantech EKI-6333AC-2G, EKI-6333AC-2GD and EKI-6333AC-1GPO. It has been classified as critical. Affected is an unknown function of the component Backup Configuration Handler. The manipulation leads to os command injection.
This vulnerability is traded as CVE-2024-50377. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Advantech EKI-6333AC-2G, EKI-6333AC-2GD and EKI-6333AC-1GPO. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component SSID Handler. The manipulation leads to os command injection.
This vulnerability is known as CVE-2024-50376. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in VMware Aria Operations up to 8.18.1. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-38832. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in VMware Aria Operations up to 8.18.1. This affects an unknown part of the component Email Template Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-38833. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in SourceCodester Best House Rental Management System 1.0. This issue affects some unknown processing of the file /rental/ajax.php?action=save_tenant. The manipulation of the argument lastname/firstname/middlename leads to cross site scripting.
The identification of this vulnerability is CVE-2024-11742. The attack may be initiated remotely. Furthermore, there is an exploit available.
Other parameters might be affected as well.
A vulnerability, which was classified as problematic, was found in SourceCodester Best House Rental Management System 1.0. Affected is an unknown function of the file /rental/ajax.php?action=delete_user of the component POST Request Handler. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2024-11743. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Appointment Booking Calendar Plugin up to 1.3.34 on WordPress. It has been classified as critical. Affected is an unknown function of the file /wp-admin/admin.php?page=cpabc_appointments.php. The manipulation leads to injection.
This vulnerability is traded as CVE-2020-9372. Local access is required to approach this attack. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Microsoft Internet Explorer 5.0. It has been classified as critical. This affects an unknown part in the library scriptlet.typelib of the component ActiveX Object. The manipulation leads to improper privilege management.
This vulnerability is uniquely identified as CVE-1999-0668. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic has been found in Harpia DiagSystem 12. Affected is an unknown function of the file /diagsystem/PACS/atualatendimento_jpeg.php. The manipulation of the argument cod/codexame leads to improper control of resource identifiers.
This vulnerability is traded as CVE-2025-1575. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Mozilla Firefox on macOS. It has been classified as critical. This affects an unknown part of the component Apple GPU Driver. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2024-11691. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mozilla Thunderbird on macOS. It has been declared as critical. This vulnerability affects unknown code of the component Apple GPU Driver. The manipulation leads to memory corruption.
This vulnerability was named CVE-2024-11691. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Mozilla Firefox up to 132. Affected by this vulnerability is an unknown functionality of the component library-ms File Handler. The manipulation leads to improper restriction of rendered ui layers.
This vulnerability is known as CVE-2024-11693. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Mozilla Thunderbird up to 132. Affected by this issue is some unknown functionality of the component library-ms File Handler. The manipulation leads to improper restriction of rendered ui layers.
This vulnerability is handled as CVE-2024-11693. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Mozilla Firefox up to 132. This affects an unknown part. The manipulation leads to an unknown weakness.
This vulnerability is uniquely identified as CVE-2024-11697. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.