A vulnerability was found in PHP Webquest 2.6. It has been classified as critical. This affects an unknown part of the file soporte_horizontal_w.php. The manipulation of the argument id_actividad leads to sql injection.
This vulnerability is uniquely identified as CVE-2008-0219. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in EvilBoard 0.1a. Affected is an unknown function of the file index.php. The manipulation leads to sql injection.
This vulnerability is traded as CVE-2008-0154. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic was found in EvilBoard 0.1a. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2008-0155. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in Zero CMS 1.0 Alpha. This affects an unknown part of the file index.php. The manipulation of the argument id leads to sql injection.
This vulnerability is uniquely identified as CVE-2008-0232. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Image Gallery with Access Database. It has been declared as critical. This vulnerability affects unknown code of the file dispimage.asp. The manipulation of the argument page leads to sql injection.
This vulnerability was named CVE-2006-6932. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as very critical, was found in SuSE Linux Enterprise up to 12 SP1. This affects an unknown part of the file /etc/shadow of the component yast2-users. The manipulation leads to credentials management.
This vulnerability is uniquely identified as CVE-2016-1601. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as very critical, has been found in Google Android up to 4.4.3/5.0.1/5.1.0. Affected by this issue is some unknown functionality of the component libvpx. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2016-1621. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Buzztouch EMT-Paramedic Lite 0.1. This affects an unknown part of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is uniquely identified as CVE-2014-7646. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability was found in Infosoftbd Clcknshop 1.0.0. It has been rated as critical. This issue affects some unknown processing of the file /collection/all of the component GET Parameter Handler. The manipulation of the argument tag leads to sql injection.
The identification of this vulnerability is CVE-2023-4708. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
Google's Chrome Web Store is now warning that the uBlock Origin ad blocker and other extensions may soon be blocked as part of the company's deprecation of the Manifest V2 extension specification. [...]
A vulnerability classified as critical was found in Google Chrome up to 51. This vulnerability affects unknown code of the component HPKP Cache Handler. The manipulation leads to improper access controls.
This vulnerability was named CVE-2016-1694. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Google Chrome up to 51. This affects an unknown part of the component Software Removal Tool Downloader. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2016-1693. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.