A vulnerability, which was classified as problematic, was found in perltidy up to 20160302. This affects an unknown part. The manipulation leads to link following.
This vulnerability is uniquely identified as CVE-2016-10374. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in PEEL 1.0b/2.6/2.7. It has been classified as critical. This affects an unknown part of the component File Upload. The manipulation leads to improper input validation.
This vulnerability is uniquely identified as CVE-2008-1495. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Easy-Clanpage 2.2. Affected is an unknown function of the file index.php. The manipulation of the argument id leads to sql injection.
This vulnerability is traded as CVE-2008-1425. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Iatek ASPapp. It has been rated as critical. This issue affects some unknown processing of the file links.asp. The manipulation of the argument CatId leads to sql injection.
The identification of this vulnerability is CVE-2008-1430. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in Joomlaitalia Com Alberghi up to 2.1.3. This affects an unknown part of the file index.php. The manipulation of the argument id leads to sql injection.
This vulnerability is uniquely identified as CVE-2008-1459. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Joomlapixel Com Joovideo 1.2.2. This vulnerability affects unknown code of the file index.php. The manipulation of the argument id leads to sql injection.
This vulnerability was named CVE-2008-1460. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Detodas Com Restaurante 1.0. It has been classified as very critical. This affects an unknown part of the file index.php. The manipulation of the argument id leads to sql injection.
This vulnerability is uniquely identified as CVE-2008-1465. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability has been found in KAPhotoservice and classified as critical. Affected by this vulnerability is an unknown functionality of the file album.asp. The manipulation of the argument albumid leads to sql injection.
This vulnerability is known as CVE-2008-1426. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Com Acajoom 1.1.5/1.2.5 on Joomla and classified as critical. Affected by this issue is some unknown functionality of the file index.php. The manipulation of the argument mailingid leads to sql injection.
This vulnerability is handled as CVE-2008-1427. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as very critical, was found in Versalsoft Http File Upload Activex Control 6.0.0.35. Affected is an unknown function in the library UUploaderSvrD.dll of the component ActiveX Control. The manipulation leads to configuration.
This vulnerability is traded as CVE-2008-6638. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in MG-SOFT Net Inspector up to 6.5.0.828. Affected is an unknown function. The manipulation leads to path traversal.
This vulnerability is traded as CVE-2008-1400. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability has been found in MG-SOFT Net Inspector and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to format string.
This vulnerability is known as CVE-2008-1401. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in MG-SOFT Net Inspector up to 6.5.0.828 and classified as critical. Affected by this issue is some unknown functionality of the file mgwtrap3.exe. The manipulation leads to improper resource management.
This vulnerability is handled as CVE-2008-1402. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as very critical has been found in Evansprogramming Registry Pro. This affects an unknown part of the file epRegPro.ocx of the component ActiveX Control. The manipulation leads to Remote Code Execution.
This vulnerability is uniquely identified as CVE-2008-7122. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in PHPauction PHPauction GPL 2.51. This vulnerability affects unknown code of the file converter.inc.php. The manipulation of the argument include_path leads to code injection.
This vulnerability was named CVE-2008-1416. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Yodl up to 3.07.00 and classified as critical. This vulnerability affects the function queue_push of the file queue/queuepush.c. The manipulation leads to memory corruption.
This vulnerability was named CVE-2016-10375. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Oracle PeopleSoft Enterprise FIN Common Application Objects 9.2. This affects an unknown part of the component Common Objects. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2020-11022. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Oracle PeopleSoft Enterprise FIN Expenses 9.2. This vulnerability affects unknown code of the component Expenses. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2020-11022. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.