A vulnerability has been found in Apache MyFaces and classified as problematic. Affected by this vulnerability is an unknown functionality of the component JavaServer Faces. The manipulation of the argument ln leads to path traversal.
This vulnerability is known as CVE-2011-4367. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in QEMU 4.2.0. Affected is an unknown function of the file hw/pci/pci.c. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2020-13791. An attack has to be approached locally. There is no exploit available.
A vulnerability was found in QEMU up to 3.1.0 and classified as problematic. This issue affects some unknown processing of the file hw/ppc/spapr.c of the component Hypervisor. The manipulation leads to data processing error.
The identification of this vulnerability is CVE-2019-8934. An attack has to be approached locally. There is no exploit available.
A vulnerability classified as problematic has been found in QEMU 3.0.0. This affects the function tcp_emu of the file slirp/tcp_subr.c. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2019-9824. Local access is required to approach this attack. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in QEMU 4.2.0. Affected by this issue is the function megasas_lookup_frame of the file hw/scsi/megasas.c. The manipulation of the argument reply_queue_head leads to out-of-bounds read.
This vulnerability is handled as CVE-2020-13362. Attacking locally is a requirement. There is no exploit available.
A vulnerability was found in QEMU 4.2.0. It has been classified as problematic. Affected is the function address_space_map of the file exec.c. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2020-13659. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in QEMU 4.2.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file hw/pci/msix.c of the component MSI-X MMIO. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2020-13754. It is possible to launch the attack on the local host. There is no exploit available.
A vulnerability was found in QEMU 3.1. It has been classified as critical. Affected is the function scsi_handle_inquiry_reply of the file hw/scsi/scsi-generic.c. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2019-6501. Attacking locally is a requirement. There is no exploit available.
A vulnerability, which was classified as critical, was found in QEMU 3.0.0. This affects the function tcp_emu of the file slirp/tcp_subr.c. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2019-6778. Attacking locally is a requirement. There is no exploit available.
A vulnerability was found in Fortinet FortiWeb. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component HTTP Request Handler. The manipulation leads to protection mechanism failure.
This vulnerability is known as CVE-2023-34984. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Fortinet FortiGate 6.4.0/6.4.1/6.4.2/6.4.3/6.4.4. It has been classified as critical. Affected is an unknown function of the component SSLVPN. The manipulation leads to improper certificate validation.
This vulnerability is traded as CVE-2021-24012. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in libssh2 up to 1.6.x. Affected is the function diffie_hellman_sha256 of the file kex.c. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2016-0787. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Aspell 0.50.5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file compress.c. The manipulation of the argument c/d leads to stack-based buffer overflow.
This vulnerability is known as CVE-2004-0548. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
A vulnerability was found in Juniper Junos 8.5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file scripter.php. The manipulation of the argument SNMP leads to cross site scripting.
This vulnerability is known as CVE-2009-3487. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in QEMU up to 3.1.0. Affected is the function i2c_ddc of the file hw/i2c/i2c-ddc.c. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2019-3812. It is possible to launch the attack on the local host. There is no exploit available.
A vulnerability was found in QEMU 3.1.50 and classified as problematic. Affected by this issue is some unknown functionality of the file hw/sparc64/sun4u.c of the component Device Driver. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2019-5008. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in QEMU 4.0.0. It has been classified as problematic. This affects the function interface_release_resource of the file hw/display/qxl.c. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2019-12155. It is possible to initiate the attack remotely. There is no exploit available.