A vulnerability was found in Oracle MySQL Server up to 5.1.69/5.5.31/5.6.11. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component GIS. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2013-1861. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as very critical, has been found in Qualcomm Qpopper 2.4. This issue affects some unknown processing of the component POP Server. The manipulation of the argument PASS leads to memory corruption.
The identification of this vulnerability is CVE-1999-0006. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Grandstream SIP Phone Gxv-3000 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Firmware. The manipulation leads to denial of service.
This vulnerability is known as CVE-2007-4498. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Linux Kernel up to 4.17.1. It has been declared as problematic. This vulnerability affects unknown code of the file arch/x86/kvm/vmx.c. The manipulation leads to improper access controls.
This vulnerability was named CVE-2018-12904. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Juniper Junos OS. This affects an unknown part. The manipulation leads to time-of-check time-of-use.
This vulnerability is uniquely identified as CVE-2024-47494. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Zoom Workplace App, Meeting SDK, Video SDK and Rooms App up to 6.1.4 on macOS. This issue affects some unknown processing of the component Installer. The manipulation leads to resource consumption.
The identification of this vulnerability is CVE-2024-45417. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ruby on Rails up to 1.5.3/1.6.1. It has been declared as problematic. Affected by this vulnerability is an unknown functionality in the library lib/rack/utils.rb. The manipulation leads to data processing error.
This vulnerability is known as CVE-2015-3225. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.