A vulnerability classified as problematic was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This vulnerability affects the function sub_40662C of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid leads to stack-based buffer overflow.
This vulnerability was named CVE-2024-12352. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in JFinalCMS 1.0. This affects the function findPage of the file src\main\java\com\cms\entity\ContentModel.java of the component File Content Handler. The manipulation of the argument name leads to sql injection.
This vulnerability is uniquely identified as CVE-2024-12351. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in JFinalCMS 1.0. It has been rated as critical. Affected by this issue is the function update of the file \src\main\java\com\cms\controller\admin\TemplateController.java of the component Template Handler. The manipulation of the argument content leads to command injection.
This vulnerability is handled as CVE-2024-12350. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in JFinalCMS 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/tag/save. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2024-12349. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Adobe Shockwave Player up to 8.0.195. It has been classified as very critical. Affected is an unknown function in the library dirapi.dll. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2010-3653. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Adobe Flash Player up to 10.x. It has been classified as very critical. This affects an unknown part. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2010-3654. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Adobe Acrobat Reader up to 9.4. It has been declared as critical. This vulnerability affects the function authplay.dll. The manipulation leads to memory corruption.
This vulnerability was named CVE-2010-3654. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in IBM DB2 9.7/9.7.0.1/9.7.0.2 and classified as critical. Affected by this issue is the function Dependent of the component Access Restriction. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2010-3474. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in IBM DB2 9.7/9.7.0.1/9.7.0.2. It has been classified as critical. This affects an unknown part of the component Access Restriction. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2010-3475. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Wireshark up to 1.4.0. It has been declared as problematic. Affected by this vulnerability is the function dissect_ber_unknown. The manipulation leads to improper resource management.
This vulnerability is known as CVE-2010-3445. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as very critical was found in OpenOffice 3.2.1. Affected by this vulnerability is an unknown functionality. The manipulation leads to numeric error.
This vulnerability is known as CVE-2010-2936. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.