A vulnerability was found in Codiad 2.4.3 and classified as problematic. This issue affects some unknown processing. The manipulation of the argument path leads to path traversal.
The identification of this vulnerability is CVE-2014-9581. The attack may be initiated remotely. Furthermore, there is an exploit available.
Popular video-sharing social network TikTok has officially gone dark in the United States, as a federal ban on the app comes into effect on January 19, 2025.
"We regret that a U.S. law banning TikTok will take effect on January 19 and force us to make our services temporarily unavailable," the company said in a pop-up message. "We're working to restore our service in the U.S. as soon as possible
A vulnerability has been found in Novell GroupWise 8.0 and classified as very critical. This vulnerability affects the function NgwiCalVTimeZoneBody::ParseSelf in the library gwwww1.dll of the component GroupWise Internet Agent. The manipulation of the argument TZNAME leads to memory corruption.
This vulnerability was named CVE-2011-0333. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in InduSoft Web Studio 7.0b2 and classified as very critical. This vulnerability affects unknown code of the file ISSymbol.ocx of the component ActiveX Control. The manipulation leads to memory corruption.
This vulnerability was named CVE-2011-0342. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Apple iOS up to 11.4.1 and classified as critical. This issue affects some unknown processing. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2018-4315. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Cisco PIX 6.3/7.0. It has been classified as problematic. This affects an unknown part. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2005-3774. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in University of Washington UW-IMAP up to 2004f. Affected is the function mail_valid_net_parse_work of the file mail.c of the component IMAP Server. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2005-2933. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple QuickTime 7.0/7.0.1/7.0.2/7.0.3 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to numeric error.
This vulnerability is handled as CVE-2005-3710. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple QuickTime 7.0/7.0.1/7.0.2/7.0.3. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2005-3713. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Adobe Shockwave Player up to 10.1.0.11. It has been rated as very critical. Affected by this issue is some unknown functionality of the component ActiveX Control. The manipulation leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2005-3525. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in pam_ldap Build 178. It has been rated as critical. This issue affects the function passwordPolicyResponse of the component Authentication. The manipulation of the argument error leads to Remote Code Execution.
The identification of this vulnerability is CVE-2005-2641. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Apple QuickTime 6.5.2/7.0.1/7.0.2. This affects an unknown part. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2005-2756. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Macromedia Flash Player up to 8.0.22.0. This affects an unknown part of the component SWF File Frame Type Identifier. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2005-2628. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linksys WRT54GC 1.02.5/1.02.8/1.05.7. It has been rated as critical. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2011-0352. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as very critical was found in Cisco Security Agent up to 5.0. This vulnerability affects unknown code of the file webagent.exe of the component Management Console. The manipulation leads to code injection.
This vulnerability was named CVE-2011-0364. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as very critical has been found in WellinTech KingView 6.53. Affected is an unknown function of the file HistorySvr.exe. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2011-0406. It is possible to launch the attack remotely. Furthermore, there is an exploit available.