A vulnerability has been found in TopQuadrant TopBraid EDG up to 8.0.0 and classified as problematic. This vulnerability affects unknown code of the component XML DTD File Handler. The manipulation leads to xml external entity reference.
This vulnerability was named CVE-2024-45745. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in TopQuadrant TopBraid EDG 7.1.3. This affects an unknown part. The manipulation leads to storing passwords in a recoverable format.
This vulnerability is uniquely identified as CVE-2024-45744. Local access is required to approach this attack. There is no exploit available.
A vulnerability, which was classified as critical, has been found in dingfanzu CMS up to 29d67d9044f6f93378e6eb6ff92272217ff7225c. Affected by this issue is some unknown functionality of the file saveNewPwd.php. The manipulation of the argument username leads to sql injection.
This vulnerability is handled as CVE-2024-9294. The attack may be launched remotely. Furthermore, there is an exploit available.
Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
A vulnerability classified as critical was found in skyselang yylAdmin up to 3.0. Affected by this vulnerability is the function list of the file /app/admin/controller/file/File.php of the component Backend. The manipulation of the argument is_disable leads to sql injection.
This vulnerability is known as CVE-2024-9293. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic has been found in kalvinGit kvf-admin up to f12a94dc1ebb7d1c51ee978a85e4c7ed75c620ff. Affected is an unknown function of the file /ueditor/upload?configPath=ueditor/config.json&action=uploadfile of the component XML File Handler. The manipulation of the argument upfile leads to cross site scripting.
This vulnerability is traded as CVE-2024-9291. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The GitHub repository of the project did not receive an update for more than two years.
This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
A vulnerability was found in Simple Popup Plugin up to 4.5 on WordPress. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-8547. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Simple LDAP Login Plugin up to 1.6.0 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-8715. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in WP-WebAuthn Plugin up to 1.3.1 on WordPress. It has been classified as problematic. This affects the function wwa_login_form of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-9023. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in EU UK VAT Manager for WooCommerce Plugin up to 2.12.12 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-8788. The attack may be launched remotely. There is no exploit available.