A vulnerability labeled as critical has been found in PowerPhlogger 2.0.9/2.2.1/2.2.2a. Affected by this issue is some unknown functionality of the file showhits.php3. Such manipulation of the argument rel_path leads to improper privilege management.
This vulnerability is documented as CVE-2002-1885. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability described as critical has been identified in Gregory Kokanosky phpMyNewsletter 0.6.10. This vulnerability affects unknown code of the file customize.php. Executing manipulation of the argument l can lead to improper privilege management.
This vulnerability appears as CVE-2002-1887. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability was found in phpBB 2.0.3. It has been classified as problematic. Affected is an unknown function of the file viewtopic.php. The manipulation of the argument highlight leads to basic cross site scripting.
This vulnerability is referenced as CVE-2002-1894. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability has been found in w-Agora 4.1.1/4.1.2/4.1.3 and classified as critical. Impacted is an unknown function. This manipulation of the argument inc_dir causes improper privilege management.
The identification of this vulnerability is CVE-2002-1878. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability marked as problematic has been reported in Pinboard 1.0. Impacted is an unknown function of the component Tasklist Handler. The manipulation leads to basic cross site scripting.
This vulnerability is documented as CVE-2002-1900. The attack can be initiated remotely. There is not any exploit available.
A vulnerability classified as problematic has been found in Markus Triska CGIForum up to 1.0.5. The impacted element is an unknown function of the component Post Handler. This manipulation causes infinite loop.
This vulnerability appears as CVE-2002-1902. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in Microsoft IIS 5.0/5.1. It has been classified as problematic. This affects an unknown part of the component HTTP Request Handler. This manipulation of the argument Host with the input / causes denial of service.
The identification of this vulnerability is CVE-2002-1908. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Apple macOS up to 15.0. This issue affects some unknown processing. The manipulation leads to sensitive information in log files.
This vulnerability is listed as CVE-2024-44292. The attack must be carried out locally. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic has been found in Apple macOS up to 13.6/14.6. Affected by this issue is some unknown functionality. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2024-44289. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Apple watchOS. This issue affects some unknown processing. Executing manipulation can lead to information disclosure.
The identification of this vulnerability is CVE-2024-44290. The attack can only be executed locally. There is no exploit available.
You should upgrade the affected component.
A vulnerability has been found in Apple iOS and iPadOS and classified as problematic. Impacted is an unknown function. The manipulation leads to information disclosure.
This vulnerability is referenced as CVE-2024-44290. The attack can only be performed from a local environment. No exploit is available.
The affected component should be upgraded.
A vulnerability described as critical has been identified in Apple macOS up to 13.6/14.6. The impacted element is an unknown function. The manipulation results in improper access controls.
This vulnerability was named CVE-2024-44287. The attack needs to be approached locally. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in Apple tvOS. It has been declared as problematic. The impacted element is an unknown function of the component Kernel Memory Handler. Executing manipulation can lead to use after free.
This vulnerability is registered as CVE-2024-44285. The attack needs to be launched locally. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple watchOS. It has been rated as problematic. This affects an unknown function of the component Kernel Memory Handler. The manipulation leads to use after free.
This vulnerability is documented as CVE-2024-44285. The attack needs to be performed locally. There is not any exploit available.
Upgrading the affected component is advised.