A vulnerability has been found in KDE Konqueror and classified as problematic. Affected by this vulnerability is the function replaceChild of the component Konqueror. The manipulation of the argument (zero) leads to denial of service.
This vulnerability is known as CVE-2006-3672. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Jelsoft vBulletin 3.0.0 Beta 2. This affects an unknown part of the file private.php of the component Preview Message Handler. The manipulation leads to basic cross site scripting.
This vulnerability is uniquely identified as CVE-2003-0295. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Union Bank of India Vyom 8.0.34 on Android and classified as problematic. This vulnerability affects unknown code of the component Rooting Detection. The manipulation leads to protection mechanism failure.
This vulnerability was named CVE-2025-0575. The attack needs to be approached locally. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Ajsquare AJ Shopping Cart 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php. The manipulation of the argument maincatid leads to sql injection.
This vulnerability is handled as CVE-2010-1876. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Appnitro Machform 2.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file view.php of the component File Upload. The manipulation leads to unrestricted upload.
This vulnerability is handled as CVE-2013-4949. The attack may be launched remotely. Furthermore, there is an exploit available.