A vulnerability classified as critical has been found in Open Web Analytics up to 1.5.6. Affected is an unknown function of the file queue.php. The manipulation of the argument owa_event leads to injection.
This vulnerability is traded as CVE-2014-2294. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Zemanta Search Everything up to 7.0.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation leads to sql injection.
This vulnerability is known as CVE-2014-2316. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in MODX Revolution up to 2.2.7 and classified as critical. This vulnerability affects unknown code of the file modx.class.php. The manipulation leads to sql injection.
This vulnerability was named CVE-2014-2311. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in PowerArchiver 14.00/14.01/14.02/14.02.03. This vulnerability affects unknown code of the component Encryption. The manipulation leads to cryptographic issues.
This vulnerability was named CVE-2014-2319. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Marcel Brinkkemper Lazyest-gallery. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2014-2333. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Google Android 7/8/8.1/9. Affected by this issue is the function l2cu_send_peer_config_rej of the file l2c_utils.cc. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2018-9484. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in Google Android 7/8/8.1/9. This affects the function bta_dm_remove_sec_dev_entry of the file bta_dm_act.cc. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2018-9483. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Google Android 7/8/8.1/9 and classified as problematic. This vulnerability affects the function l2cble_process_sig_cmd of the file l2c_ble.cc. The manipulation leads to out-of-bounds read.
This vulnerability was named CVE-2018-9485. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android 8/8.1/9. It has been declared as problematic. Affected by this vulnerability is the function bta_hd_get_report_act of the file bta_hd_act.cc of the component Bluetooth Service. The manipulation leads to out-of-bounds read.
This vulnerability is known as CVE-2018-9480. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android 8/8.1/9 and classified as problematic. Affected by this issue is the function intr_data_copy_cb of the file btif_hd.cc of the component Bluetooth Service. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2018-9482. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android 8/8.1/9. It has been rated as problematic. Affected by this issue is the function bta_hd_set_report_act of the file bta_hd_act.cc of the component Bluetooth Service. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2018-9481. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical has been found in Google Android up to 8.1. This affects the function checkPermissions of the file RecognitionService.java. The manipulation leads to permission issues.
This vulnerability is uniquely identified as CVE-2017-13316. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in GeoServer up to 2.23.4/2.24.2 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to path traversal.
This vulnerability is handled as CVE-2024-24749. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ivanti Endpoint Manager Mobile up to 12.0.0.4/12.1.0.3 and classified as critical. Affected by this issue is some unknown functionality of the component Configuration File Handler. The manipulation leads to incorrect permission assignment.
This vulnerability is handled as CVE-2024-7612. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ivanti Avalanche up to 6.4.5 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2024-50331. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in AMD Management Plug-In for SCCM. This affects an unknown part. The manipulation leads to incorrect default permissions.
This vulnerability is uniquely identified as CVE-2024-21938. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in AMD Ryzen Master Monitoring SDK. This issue affects some unknown processing. The manipulation leads to incorrect default permissions.
The identification of this vulnerability is CVE-2024-21945. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in AMD Cloud Manageability Service Software and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to incorrect default permissions.
This vulnerability is known as CVE-2024-21939. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in AMD Management Console up to 9.x and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to incorrect default permissions.
This vulnerability is handled as CVE-2024-21957. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.