A vulnerability has been found in Agilefleet FleetCommander Kiosk and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cryptographic issues.
This vulnerability is known as CVE-2012-4947. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Agilefleet FleetCommander Kiosk. Affected is an unknown function of the component Password Encryption. The manipulation leads to cryptographic issues.
This vulnerability is traded as CVE-2012-4946. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Patterninsight Pattern Insight 2.3 and classified as critical. This vulnerability affects unknown code. The manipulation leads to Remote Code Execution.
This vulnerability was named CVE-2012-4936. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Patterninsight Pattern Insight 2.3 and classified as critical. This issue affects some unknown processing. The manipulation leads to session fixiation.
The identification of this vulnerability is CVE-2012-4937. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Patterninsight Pattern Insight 2.3. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2012-4938. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as critical has been found in Agilefleet FleetCommander Kiosk. This affects an unknown part. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2012-4943. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Patterninsight Pattern Insight 2.3. This affects an unknown part. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2012-4935. It is possible to initiate the attack remotely. There is no exploit available.
How does the social media followers algoritm work? Tons of sites making advertising to grow social media with fake followers. Can i find this algoritm for free / of pirate it?
A vulnerability, which was classified as critical, has been found in NitroSecurity Nitroview Esm Software 8.4.0a. Affected by this issue is some unknown functionality. The manipulation leads to improper input validation.
This vulnerability is handled as CVE-2010-4099. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in TomatoCart 1.1.7 and classified as critical. This issue affects some unknown processing of the component Sandbox. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2012-4934. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as problematic was found in Ipswitch WhatsUp Gold 15.02. This vulnerability affects unknown code. The manipulation with the input <script>alert(124)</script>pt>> leads to cross site scripting.
This vulnerability was named CVE-2012-4344. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Adobe Shockwave Player 11.6.7.637. It has been classified as critical. Affected is an unknown function. The manipulation leads to improper input validation.
This vulnerability is traded as CVE-2012-4176. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in AWCM AR Web Content Manager 2.2. Affected is an unknown function of the file search.php of the component Web Content Manager. The manipulation of the argument search leads to cross site scripting.
This vulnerability is traded as CVE-2011-1668. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in OpenStack Neutron up to 25.0.0. It has been rated as critical. This issue affects some unknown processing of the file neutron/extensions/tagging.py of the component Policy Enforcement Handler. The manipulation leads to Privilege Escalation.
The identification of this vulnerability is CVE-2024-53916. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as very critical, has been found in ProjectSend up to r1719. Affected by this issue is some unknown functionality of the file options.php of the component HTTP Request Handler. The manipulation leads to improper authentication.
This vulnerability is handled as CVE-2024-11680. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ehud Gavron Tracesroute 6.0/6.1.1. It has been declared as critical. Affected by this vulnerability is the function get_origin of the component Whois Response Handler. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2002-1364. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.