A vulnerability was found in Apple iOS up to 2.0. It has been rated as critical. This issue affects some unknown processing of the component ImageIO. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2010-1811. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Apple Mac OS X up to 10.5.7 and classified as critical. This vulnerability affects unknown code. The manipulation leads to memory corruption.
This vulnerability was named CVE-2010-1846. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Apple Mac OS X up to 10.5.7. This affects an unknown part of the component ImageIO. The manipulation leads to improper input validation.
This vulnerability is uniquely identified as CVE-2010-1845. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Apple Mac OS X. Affected by this issue is some unknown functionality. The manipulation leads to improper input validation.
This vulnerability is handled as CVE-2010-1844. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple Mac OS X up to 10.5.7. It has been rated as very critical. This issue affects some unknown processing. The manipulation leads to improper input validation.
The identification of this vulnerability is CVE-2010-1841. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Apple Mac OS X up to 10.5.7. This vulnerability affects unknown code of the component Filesystem. The manipulation leads to denial of service.
This vulnerability was named CVE-2010-0105. Attacking locally is a requirement. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple Safari up to 12.0. It has been declared as critical. This vulnerability affects unknown code of the component WebKit. The manipulation leads to memory corruption.
This vulnerability was named CVE-2018-4416. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple iOS up to 12.3.2. It has been classified as critical. Affected is an unknown function of the component Core Data. The manipulation leads to use after free.
This vulnerability is traded as CVE-2019-8647. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apache RocketMQ. It has been classified as critical. Affected is an unknown function of the component Update Configuration Handler. The manipulation leads to code injection.
This vulnerability is traded as CVE-2023-33246. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in Microsoft Internet Explorer 3.0/4.0/4.0.1/5.0. This issue affects some unknown processing in the library regwizc.dll of the component Registration Wizard ActiveX Control. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-1999-1578. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in MP3Info 0.8.4. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument line leads to memory corruption.
This vulnerability is known as CVE-2006-2465. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, has been found in SpamTitan WebTitan 3.50. This issue affects some unknown processing of the file logs-x.php. The manipulation of the argument fname leads to path traversal.
The identification of this vulnerability is CVE-2011-4640. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in koha up to 3.14.15/3.16.11/3.18.9/3.20.0 and classified as critical. This vulnerability affects unknown code of the file svc/virtualshelves/search. The manipulation of the argument template_path with the input ..%2f leads to path traversal.
This vulnerability was named CVE-2015-4632. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.