A vulnerability, which was classified as problematic, has been found in Geopainting GPSMapEdit 1.1.73.2. Affected by this issue is some unknown functionality. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2012-6042. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as very critical, was found in Gomlab GOM Media Player up to 2.1.36.5082. This affects an unknown part. The manipulation leads to Remote Code Execution.
This vulnerability is uniquely identified as CVE-2012-1774. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in McAfee ePolicy Orchestrator 4.6.6 Build 176. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file ComputerMgmt/sysDetPanelQry.do. The manipulation of the argument uid/orion.user.security.token/ajaxMode as part of GET Request leads to cross site scripting (Reflected).
This vulnerability is known as CVE-2013-4883. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in CARE2X and classified as critical. This issue affects some unknown processing of the file main/config_options_gui_template.php. The manipulation of the argument root_path leads to improper privilege management.
The identification of this vulnerability is CVE-2007-1458. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Veeam Agent up to 6.3.1.1074 on Windows. Affected is an unknown function. The manipulation leads to permission issues.
This vulnerability is traded as CVE-2025-24287. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in ZyXEL P660HN-T1A up to 7.3.15.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file ViewLog.asp of the component Remote System Log Forwarder. The manipulation of the argument remote_host as part of Parameter leads to command injection.
This vulnerability is known as CVE-2017-18368. The attack can be launched remotely. Furthermore, there is an exploit available.
Critical Sudo flaws let local users gain root access on Linux systems, the vulnerabilities affect major Linux distributions. Cybersecurity researchers disclosed two vulnerabilities in the Sudo command-line utility for Linux and Unix-like operating systems. Local attackers can exploit the vulnerabilities to escalate privileges to root on affected systems. Sudo (short for “superuser do”) is a […]
A vulnerability classified as problematic was found in HDF5 1.14.6. This vulnerability affects the function H5FS__sinfo_serialize_node_cb of the file src/H5FScache.c. The manipulation leads to heap-based buffer overflow.
This vulnerability was named CVE-2025-7067. Local access is required to approach this attack. Furthermore, there is an exploit available.
A vulnerability has been found in CARE2X and classified as critical. This vulnerability affects unknown code of the file main/chg-color.php. The manipulation of the argument root_path leads to improper privilege management.
This vulnerability was named CVE-2007-1458. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in FAQSystems FAQRing Knowledge Base Software up to 3.0. This issue affects some unknown processing of the file answer.php. The manipulation of the argument ID leads to sql injection.
The identification of this vulnerability is CVE-2005-3882. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Palo Alto Traps Server 3.1.2.1546. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument b:Arguments/b:FileName/b:URL leads to cross site scripting.
This vulnerability is handled as CVE-2015-2223. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Scott Paterson Easy Stripe Plugin up to 1.1 on WordPress. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to code injection.
The identification of this vulnerability is CVE-2025-49302. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in DynamiApps Frontend Admin Plugin up to 3.28.7 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to denial of service.
This vulnerability is known as CVE-2025-49303. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in cmoreira Testimonials Showcase Plugin up to 1.9.16 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-49245. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in Linux Kernel up to 6.16-rc1/6.16-rc2. Affected is an unknown function. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2025-38178. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.