A vulnerability has been found in Dev.pucit.edu.pk Com Arcadegames 1.0 and classified as problematic. This vulnerability affects unknown code of the file index.php. The manipulation of the argument controller leads to path traversal.
This vulnerability was named CVE-2010-1714. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in IBM Informix Extended Parallel Server up to 9.40.xc3 and classified as problematic. This vulnerability affects unknown code. The manipulation of the argument ONCONFIG as part of Environment Variable leads to memory corruption.
This vulnerability was named CVE-2004-2131. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
A vulnerability has been found in ar-blog 5.2 and classified as problematic. This vulnerability affects unknown code of the file print.php. The manipulation of the argument ID leads to basic cross site scripting.
This vulnerability was named CVE-2006-1893. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Zh BaiduMap 3.0.0.1 on Joomla. It has been declared as critical. This vulnerability affects unknown code. The manipulation of the argument ID as part of Parameter leads to sql injection.
This vulnerability was named CVE-2018-6605. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in CedStat 1.31. It has been classified as problematic. This affects an unknown part of the file index.php. The manipulation of the argument hier leads to basic cross site scripting.
This vulnerability is uniquely identified as CVE-2007-1020. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in mootools. It has been classified as critical. Affected is an unknown function. The manipulation leads to incorrect regular expression.
This vulnerability is traded as CVE-2021-32821. Access to the local network is required for this attack. Furthermore, there is an exploit available.
It is recommended to replace the affected component with an alternative.
A vulnerability has been found in pyload up to 0.5.0b3.dev35 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to session expiration.
This vulnerability is known as CVE-2023-0227. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in publify up to 9.2.9. This vulnerability affects unknown code. The manipulation leads to integer overflow.
This vulnerability was named CVE-2022-1812. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in rancher wrangler and classified as critical. This issue affects some unknown processing. The manipulation leads to command injection.
The identification of this vulnerability is CVE-2022-31249. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in JIRA Pipeline Steps Plugin up to 2.0.165.v8846cf59f3db on Jenkins. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2023-24437. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Rack Gem on Ruby. It has been classified as problematic. This affects an unknown part of the component Multipart Parser. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2022-44572. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in RabbitMQ Consumer Plugin up to 2.8 on Jenkins. This affects an unknown part. The manipulation leads to permission issues.
This vulnerability is uniquely identified as CVE-2023-24448. The attack needs to be approached within the local network. There is no exploit available.