A vulnerability classified as critical was found in Yoggie Pico. This vulnerability affects unknown code of the file cgi-bin/runDiagnostics.cgi. The manipulation of the argument param leads to improper privilege management.
This vulnerability was named CVE-2007-3572. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Dotnetindex Professional Download Assistant 0.1. It has been declared as problematic. This vulnerability affects unknown code of the file database/downloads.mdb. The manipulation leads to improper access controls.
This vulnerability was named CVE-2008-5572. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic has been found in Red Hat libvirt 1.0.6. This affects an unknown part of the component Interfaces. The manipulation leads to improper resource management.
This vulnerability is uniquely identified as CVE-2013-2218. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in 8pixel.net Simple Blog 2.1. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument month leads to sql injection.
This vulnerability is known as CVE-2006-0240. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, has been found in Secure Elements C5 Enterprise Vulnerability Management up to 2.8.0. This issue affects some unknown processing. The manipulation leads to cleartext storage of sensitive information.
The identification of this vulnerability is CVE-2006-2704. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Secure Elements C5 Enterprise Vulnerability Management up to 2.8.0. Affected is an unknown function. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2006-2705. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Secure Elements C5 Enterprise Vulnerability Management up to 2.8.0 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to denial of service.
This vulnerability is known as CVE-2006-2706. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Secure Elements C5 Enterprise Vulnerability Management up to 2.8.0 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to improper privilege management.
This vulnerability is handled as CVE-2006-2707. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Fujitsu Netshelter Fw-m. It has been rated as problematic. This issue affects some unknown processing of the component Web Cache. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2006-2240. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in Sun Java System Server up to 7. Affected is an unknown function of the component Error Message Handler. The manipulation leads to basic cross site scripting.
This vulnerability is traded as CVE-2006-2501. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic was found in Sun Solaris 1.1. This vulnerability affects unknown code. The manipulation leads to Local Privilege Escalation.
This vulnerability was named CVE-2006-2614. Attacking locally is a requirement. There is no exploit available.
A vulnerability was found in XZERES 442SR OS. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation as part of GET Request leads to cross-site request forgery.
This vulnerability is known as CVE-2015-3950. The attack can be launched remotely. There is no exploit available. Due to its background and reception, this vulnerability has an historic impact.
A vulnerability classified as critical was found in Red Hat Ansible up to 1.9.1. This vulnerability affects unknown code of the component Server Hostname Handler. The manipulation leads to insufficient verification of data authenticity.
This vulnerability was named CVE-2015-3908. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in McAfee ePO Deep Command 2.1/2.2 and classified as problematic. This vulnerability affects unknown code of the component Windows Search Path Handler. The manipulation leads to untrusted search path.
This vulnerability was named CVE-2015-3987. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in Piriform CCleaner up to 5.02.5101. This affects an unknown part. The manipulation leads to information disclosure (File).
This vulnerability is uniquely identified as CVE-2015-3999. The attack needs to be approached locally. There is no exploit available.
A vulnerability was found in Django up to 1.8.1. It has been classified as critical. This affects the function sessionflush of the component cached_db Backend. The manipulation leads to session fixiation.
This vulnerability is uniquely identified as CVE-2015-3982. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Microsoft Internet Explorer. Affected is an unknown function of the component ActiveX Control. The manipulation leads to race condition.
This vulnerability is traded as CVE-2006-2094. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Don Moore MyDNS 1.1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to denial of service.
This vulnerability is known as CVE-2006-2075. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.