A vulnerability classified as critical was found in LibreOffice up to 6.2.5. Affected by this vulnerability is an unknown functionality of the component LibreLogo. The manipulation as part of Python Command leads to improper input validation.
This vulnerability is known as CVE-2019-9851. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in DZOIC Handshakes 3.5 and classified as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument fname leads to sql injection.
The identification of this vulnerability is CVE-2008-2781. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Wikidforum 2.10. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2012-2099. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Apple Safari up to 11.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component WebKit. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2017-13783. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in AlstraSoft Affiliate Network Pro and classified as critical. Affected by this vulnerability is an unknown functionality of the file merchants/temp.php. The manipulation of the argument rowid leads to sql injection.
This vulnerability is known as CVE-2007-4081. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Apple iOS up to 11.0.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the component WebKit. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2017-13802. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.