A vulnerability was found in GazTek ghttpd 1.4/1.4.1/1.4.2/1.4.3. It has been declared as critical. This vulnerability affects the function log of the file util.c of the component GET Request Handler. The manipulation leads to memory corruption.
This vulnerability was named CVE-2002-1904. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in ProFTPD 1.2.9 Rc1. It has been classified as critical. This affects an unknown part of the component mod_sql_postgres. The manipulation of the argument USER leads to sql injection.
This vulnerability is uniquely identified as CVE-2003-0500. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Salvo Tomaselli Weborf HTTP Server up to 0.12.2 and classified as problematic. Affected by this vulnerability is the function modURL of the file instance.c. The manipulation with the input ..%2F leads to path traversal.
This vulnerability is known as CVE-2010-3306. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Poppler and classified as problematic. Affected by this vulnerability is the function ImageStream::ImageStream of the file Stream.cc. The manipulation leads to numeric error.
This vulnerability is known as CVE-2009-3609. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as very critical, was found in Poppler. Affected is the function ObjectStream::ObjectStream of the file XRef.cc. The manipulation leads to numeric error.
This vulnerability is traded as CVE-2009-3608. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as very critical was found in Poppler. This vulnerability affects the function PSOutputDev::doImageL1Sep. The manipulation leads to numeric error.
This vulnerability was named CVE-2009-3606. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as very critical has been found in Poppler. This affects the function Splash::drawImage of the file Splash.cc. The manipulation leads to improper resource management.
This vulnerability is uniquely identified as CVE-2009-3604. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Poppler. It has been rated as very critical. Affected by this issue is the function SplashBitmap::SplashBitmap. The manipulation leads to numeric error.
This vulnerability is handled as CVE-2009-3603. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Sun Solaris. This vulnerability affects unknown code of the component NTP Mode 7 Request Handler. The manipulation leads to denial of service.
This vulnerability was named CVE-2009-3563. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Adobe Shockwave Player and classified as very critical. This vulnerability affects unknown code. The manipulation leads to improper resource management.
This vulnerability was named CVE-2009-3466. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as very critical, has been found in Adobe Shockwave Player. Affected by this issue is some unknown functionality. The manipulation leads to code injection.
This vulnerability is handled as CVE-2009-3464. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as very critical, was found in Adobe Shockwave Player. This affects an unknown part. The manipulation leads to code injection.
This vulnerability is uniquely identified as CVE-2009-3465. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as very critical was found in Adobe Shockwave Player. Affected by this vulnerability is an unknown functionality. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2009-3463. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel 2.6.16.9. This vulnerability affects the function tc_fill_tclass. The manipulation leads to information disclosure.
This vulnerability was named CVE-2009-3228. Local access is required to approach this attack. There is no exploit available.
A vulnerability, which was classified as very critical, was found in Apple Safari. Affected is an unknown function. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2009-3384. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.