A vulnerability was found in Red Lion N-Tron 702-W and N-Tron 702M12-W and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2020-16206. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability was found in Red Lion N-Tron 702-W and N-Tron 702M12-W. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2020-16208. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability was found in Google Go up to 1.14.7/1.15.0 and classified as problematic. Affected by this issue is some unknown functionality of the component CGI Handler. The manipulation as part of Content-Type Header leads to cross site scripting.
This vulnerability is handled as CVE-2020-24553. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Best Support System 3.0.4. This vulnerability affects unknown code. The manipulation leads to cross site scripting (Persistent).
This vulnerability was named CVE-2020-24963. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, has been found in Mara CMS 7.5. This issue affects some unknown processing of the file contact.php. The manipulation of the argument theme leads to cross site scripting.
The identification of this vulnerability is CVE-2020-24223. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Adobe InDesign up to 15.1.1 on macOS and classified as critical. This vulnerability affects unknown code. The manipulation leads to access of memory location after end of buffer.
This vulnerability was named CVE-2020-9727. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Adobe InDesign up to 15.1.1 on macOS and classified as critical. This issue affects some unknown processing. The manipulation leads to access of memory location after end of buffer.
The identification of this vulnerability is CVE-2020-9728. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Adobe InDesign up to 15.1.1 on macOS. It has been classified as critical. Affected is an unknown function. The manipulation leads to access of memory location after end of buffer.
This vulnerability is traded as CVE-2020-9729. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Adobe InDesign up to 15.1.1 on macOS. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to access of memory location after end of buffer.
This vulnerability is known as CVE-2020-9730. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Google Chrome. It has been classified as critical. This affects an unknown part of the component Video. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2020-6573. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Adobe InDesign up to 15.1.1 on macOS. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to access of memory location after end of buffer.
This vulnerability is handled as CVE-2020-9731. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Oracle Enterprise Manager Base Platform 12.1.0.5/13.3.0.0. It has been rated as critical. This issue affects some unknown processing of the component Application Service Level Mgmt. The manipulation leads to server-side request forgery.
The identification of this vulnerability is CVE-2019-0227. Access to the local network is required for this attack. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Google Chrome. It has been rated as critical. This issue affects some unknown processing of the component Mojo. The manipulation leads to race condition.
The identification of this vulnerability is CVE-2020-6575. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Google Chrome. Affected is an unknown function of the component Policy Handler. The manipulation leads to improper privilege management.
This vulnerability is traded as CVE-2020-15959. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Nifty Project Management 2020-08-26. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2020-25071. The attack may be initiated remotely. There is no exploit available.
The real existence of this vulnerability is still doubted at the moment.
A vulnerability was found in LibRaw 20.0. It has been declared as critical. This vulnerability affects the function parse_tiff_ifd of the file src/metadata/tiff.cpp. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2020-24890. Local access is required to approach this attack. There is no exploit available.
The real existence of this vulnerability is still doubted at the moment.
A vulnerability, which was classified as problematic, was found in BlackCat CMS 1.3.6. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2020-25453. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Powerproduction StoryBoard Quick 6.0. It has been rated as very critical. This issue affects some unknown processing. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2011-5172. The attack may be initiated remotely. Furthermore, there is an exploit available.