A vulnerability, which was classified as problematic, was found in Wireshark up to 1.12.8/2.0.0. Affected is the function dissect_zcl_pwr_prof_pwrprofstatersp of the file epan/dissectors/packet-zbee-zcl-general.c of the component ZigBee ZCL Dissector. The manipulation leads to improper input validation.
This vulnerability is traded as CVE-2015-8732. An attack has to be approached locally. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Fipsasp fipsCMS light up to 2.1 and classified as critical. This vulnerability affects unknown code. The manipulation leads to sql injection.
This vulnerability was named CVE-2008-3417. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Camera Life 2.6.2. It has been rated as critical. This issue affects some unknown processing of the file sitemap.xml.php of the component Camera. The manipulation of the argument id leads to sql injection.
The identification of this vulnerability is CVE-2008-3355. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Brandon Tallent phpTest 0.6.3. Affected by this vulnerability is an unknown functionality of the file picture.php. The manipulation of the argument image_id leads to sql injection.
This vulnerability is known as CVE-2008-3377. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in Fizzmedia 1.51.2. Affected by this issue is some unknown functionality of the file comment.php. The manipulation of the argument mid leads to sql injection.
This vulnerability is handled as CVE-2008-3378. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability has been found in XRMS CRM 1.99.2 and classified as critical. This vulnerability affects unknown code. The manipulation of the argument include_directory leads to code injection.
This vulnerability was named CVE-2008-3399. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in XRMS CRM 1.99.2 and classified as problematic. This issue affects the function phpinfo. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2008-3400. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic was found in Wireshark up to 1.12.8/2.0.0. This vulnerability affects unknown code of the file epan/dissectors/packet-nbap.c of the component NBAP Dissector. The manipulation leads to improper input validation.
This vulnerability was named CVE-2015-8730. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in XRMS CRM 1.99.2. This affects an unknown part of the file login.php. The manipulation of the argument msg leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2008-3398. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability has been found in atomPhotoBlog 1.0.9.1/1.1.5 and classified as critical. Affected by this vulnerability is an unknown functionality of the file atomphotoblog.php. The manipulation of the argument photoId leads to sql injection.
This vulnerability is known as CVE-2008-3351. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Nersoft Live Music Plus 1.1.0 and classified as critical. Affected by this issue is some unknown functionality of the file index.php. The manipulation of the argument id leads to sql injection.
This vulnerability is handled as CVE-2008-3352. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in WordPress Wp Downloads Manager 0.2 and classified as very critical. This issue affects some unknown processing of the file upload.php of the component File Upload. The manipulation of the argument upfile leads to improper input validation.
The identification of this vulnerability is CVE-2008-3362. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Interface-medien ibase 2.0/2.03. It has been rated as critical. This issue affects some unknown processing of the file download.php. The manipulation of the argument filename leads to path traversal.
The identification of this vulnerability is CVE-2008-6288. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Microsoft Office Snapshot Viewer ActiveX up to Office 2003 and classified as critical. Affected by this vulnerability is an unknown functionality of the file snapview.ocx of the component Snapshot Viewer ActiveX Control. The manipulation leads to code injection.
This vulnerability is known as CVE-2008-2463. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.