A vulnerability was found in Antiboard up to 0.63. It has been classified as critical. Affected is an unknown function of the file antiboard.php. The manipulation leads to sql injection.
This vulnerability is traded as CVE-2004-2062. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability has been found in ID Software Quake 4 up to 1.4.2 and classified as very critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to format string.
This vulnerability is known as CVE-2007-5248. The attack can be launched remotely. Furthermore, there is an exploit available.
Zyxel has issued a security advisory about actively exploited flaws in CPE Series devices, warning that it has no plans to issue fixing patches and urging users to move to actively supported models. [...]
A vulnerability classified as critical was found in Tecnick AIOCP 1.4.001. This vulnerability affects unknown code of the file cp_html2txt.php of the component Control Panel. The manipulation of the argument page leads to code injection.
This vulnerability was named CVE-2009-3220. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in WordPress 2.0.3. Affected is an unknown function of the component Installation. The manipulation leads to improper privilege management.
This vulnerability is traded as CVE-2006-3390. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Cisco Unified Communications Manager. Affected is the function sipSafeStrlen. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2009-2051. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Linux Kernel 2.6.11.8. Affected by this issue is the function do_sigaltstack. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2009-2847. An attack has to be approached locally. Furthermore, there is an exploit available.
A vulnerability was found in Sun Java System Access Manager 7.1. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2009-2713. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as critical was found in Apple macOS. This vulnerability affects unknown code of the component libxpc. The manipulation leads to memory corruption.
This vulnerability was named CVE-2019-6218. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in T. Hauck Jana Web Server up to 2.01 and classified as problematic. Affected by this issue is some unknown functionality of the file /aux of the component MS DOS Device Name. The manipulation leads to denial of service.
This vulnerability is handled as CVE-2001-0558. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Adobe Photoshop CC. Affected by this vulnerability is an unknown functionality. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2016-0952. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Google Chrome. It has been rated as critical. This issue affects some unknown processing of the component V8. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2025-0445. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in yogeshojha rengine up to 2.2.0. It has been declared as problematic. This vulnerability affects unknown code. The manipulation of the argument username leads to cross site scripting.
This vulnerability was named CVE-2025-24967. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in wpovernight woocommerce-pdf-invoices-packing-slips 3.x and classified as problematic. Affected by this issue is some unknown functionality of the component PDF Document Handler. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2025-24373. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.