A vulnerability has been found in nilsteampassnet teampass and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to file inclusion.
This vulnerability is known as CVE-2023-1070. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in thorsten phpmyfaq up to 3.1.10. This vulnerability affects unknown code. The manipulation leads to code injection.
This vulnerability was named CVE-2023-0792. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in froxlor up to 2.0.10. It has been classified as critical. This affects an unknown part. The manipulation leads to code injection.
This vulnerability is uniquely identified as CVE-2023-0877. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in pixelfed up to 0.11.3 and classified as problematic. This issue affects some unknown processing. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2023-0901. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in vanessa219 Vditor up to 3.8.6 and classified as problematic. This vulnerability affects unknown code of the component Copy/Paste Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2021-32855. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Azure Credentials Plugin up to 253.v887e0 on Jenkins. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2023-25767. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Zoph up to 0.9.1. It has been rated as critical. This issue affects some unknown processing of the file group.php. The manipulation of the argument location_id leads to sql injection.
The identification of this vulnerability is CVE-2014-9235. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in H&H WebSoccer 2.80. This issue affects some unknown processing of the file liga.php. The manipulation of the argument ID leads to sql injection.
The identification of this vulnerability is CVE-2008-5064. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in RealNetworks RealJukebox 2 1.0.2.340. This vulnerability affects unknown code of the file skin.ini of the component RFS Skin Handler. The manipulation of the argument CONTROLnImage leads to memory corruption.
This vulnerability was named CVE-2002-1014. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Fastream NETFile Server 7.1.2. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2004-2534. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Geeos Team Gattaca Server 2003 1.1.10.0 and classified as problematic. This issue affects some unknown processing. The manipulation of the argument Language leads to basic cross site scripting.
The identification of this vulnerability is CVE-2004-2522. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in phpGroupWare. This affects an unknown part. The manipulation leads to cleartext storage of sensitive information.
This vulnerability is uniquely identified as CVE-2004-2578. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to add further authentication.
A vulnerability was found in phpMyAdmin. It has been declared as critical. This vulnerability affects unknown code of the file transformations/text_plain__external.inc.php. The manipulation leads to improper privilege management.
This vulnerability was named CVE-2004-2630. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in ArGoSoft FTP Server up to 1.4.1.5. Affected by this vulnerability is an unknown functionality. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2004-2673. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in BEA WebLogic 6.1/7.0/7.0.0.1/8.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component RMI via IIOP Handler. The manipulation leads to credentials management.
This vulnerability is known as CVE-2004-2696. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Flatnuke 2.5.6. Affected by this vulnerability is an unknown functionality. The manipulation of the argument ID leads to path traversal.
This vulnerability is known as CVE-2005-4208. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in LAN Messenger up to 1.2.28. Affected by this vulnerability is an unknown functionality. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2012-3845. The attack can be launched remotely. Furthermore, there is an exploit available.