A vulnerability was found in Info-Zip UnZip 12.04. It has been classified as critical. Affected is the function charset_to_intern of the file unix/unix.c of the component Flow. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2015-1315. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Apport up to 2.17.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file usr/share/apport/apport of the component Crash Reporter. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2015-1318. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ubuntu Linux up to 14.04. It has been rated as problematic. This issue affects some unknown processing of the file com.canonical.NMOfono.ReadImsiContexts of the component network-manager. The manipulation leads to path traversal.
The identification of this vulnerability is CVE-2015-1322. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Unity Settings Daemon up to 14.04/15.04 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Screen Lock. The manipulation leads to improper input validation.
This vulnerability is known as CVE-2015-1319. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ubuntu Linux up to 15.04. It has been classified as critical. Affected is an unknown function of the component overlayfs. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2015-1328. The attack needs to be approached locally. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Zeuscart 2.3 and classified as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument maincatid leads to sql injection.
The identification of this vulnerability is CVE-2009-4940. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Akiva Webboard 2.90. It has been rated as problematic. This issue affects some unknown processing of the file view.php. The manipulation of the argument topic leads to path traversal.
The identification of this vulnerability is CVE-2009-2600. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Zenhelpdesk Zen Help Desk 2.1. This affects an unknown part of the file adminlogin.asp of the component Login. The manipulation leads to sql injection.
This vulnerability is uniquely identified as CVE-2009-2604. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Roxio CinePlayer 3.2. It has been classified as very critical. Affected is an unknown function in the library SonicMediaPlayer.dll of the component ActiveX Control. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2009-4841. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in Mozilla Firefox 3.0.10. Affected is an unknown function of the component Event Handler. The manipulation leads to improper resource management.
This vulnerability is traded as CVE-2009-1828. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Bjsintay SiteX 0.6.4 Beta up to 0.7.4. It has been classified as critical. Affected is an unknown function of the component Themes. The manipulation of the argument THEME_FOLDER leads to path traversal.
This vulnerability is traded as CVE-2009-1846. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Easy PX 41 CMS 9.0 B1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument fiche leads to path traversal.
This vulnerability is known as CVE-2009-1847. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in JoomlaMe Com Agoragroup 0.3.5.3. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php. The manipulation of the argument id leads to sql injection.
This vulnerability is handled as CVE-2009-1848. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Benjamin Curtis phpBugTracker 1.0.3. This vulnerability affects unknown code of the file index.php. The manipulation of the argument password leads to sql injection.
This vulnerability was named CVE-2009-1850. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Cmsnx Million Dollar Text Links 1.0 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to improper authentication.
This vulnerability is handled as CVE-2009-1854. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in Phpmember WebMember 1.0. This affects an unknown part of the file form.php. The manipulation of the argument formID leads to sql injection.
This vulnerability is uniquely identified as CVE-2009-4667. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Graphiks MyForum 1.3. Affected is an unknown function. The manipulation leads to sql injection.
This vulnerability is traded as CVE-2009-1852. It is possible to launch the attack remotely. Furthermore, there is an exploit available.