A vulnerability was found in RSA WebID 5.3 and classified as problematic. This issue affects some unknown processing in the library iiswebagentif.dll. The manipulation of the argument postdata leads to cross site scripting.
The identification of this vulnerability is CVE-2008-1470. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in Zabbix up to 2.0.17/2.2.12/3.0.2. Affected is an unknown function of the file userparameter_mysql.conf of the component Configuration Script. The manipulation of the argument mysql.size leads to sql injection.
This vulnerability is traded as CVE-2016-4338. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Cisco ASA up to 7.0.4.2. Affected by this vulnerability is an unknown functionality. The manipulation leads to improper resource management.
This vulnerability is known as CVE-2010-4677. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Cisco ASA up to 7.0.4.2. Affected by this issue is some unknown functionality of the component Access Restriction. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2010-4678. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Cisco ASA up to 7.0.4.2. This affects an unknown part. The manipulation leads to improper input validation.
This vulnerability is uniquely identified as CVE-2010-4679. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Cisco ASA up to 7.0.4.3. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to improper resource management.
This vulnerability was named CVE-2010-4674. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Cisco ASA up to 7.0.4.2. It has been rated as critical. This issue affects some unknown processing of the component Access Restriction. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2010-4675. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Cisco ASA up to 7.0.4.2. Affected is an unknown function. The manipulation leads to improper resource management.
This vulnerability is traded as CVE-2010-4676. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Cisco ASA up to 7.0.4.3. Affected is an unknown function of the component IPv6 Stack. The manipulation leads to improper resource management.
This vulnerability is traded as CVE-2010-4670. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Cisco ASA up to 7.0.4.3 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to improper resource management.
This vulnerability is handled as CVE-2010-4672. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Cisco ASA up to 7.0.4.3. It has been classified as critical. This affects an unknown part. The manipulation leads to improper resource management.
This vulnerability is uniquely identified as CVE-2010-4673. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Apache Subversion up to 1.6.4 and classified as problematic. This issue affects some unknown processing of the file rev_hunt.c. The manipulation leads to improper resource management.
The identification of this vulnerability is CVE-2010-4644. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Sun OpenOffice. It has been classified as very critical. This affects an unknown part. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2010-4643. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Apache Subversion up to 1.6.4 and classified as critical. This vulnerability affects the function walk of the file repos.c of the component mod_dav_svn. The manipulation leads to improper resource management.
This vulnerability was named CVE-2010-4539. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in RealNetworks RealPlayer up to 14.0.1. This issue affects some unknown processing in the library vidplin.dll of the component AVI Header Parser. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2010-4393. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in hp Linux Imaging And Printing Project 3.10.9. Affected is the function hpmud_get_pml of the component Printing. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2010-4267. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in IBM solidDB and classified as problematic. This issue affects the function certain of the file solid.exe. The manipulation leads to improper resource management.
The identification of this vulnerability is CVE-2010-4055. The attack may be initiated remotely. Furthermore, there is an exploit available.