A vulnerability has been found in Microsoft Windows Vista/7/8/8.1 and classified as problematic. This vulnerability affects unknown code of the component Media Center. The manipulation leads to information disclosure.
This vulnerability was named CVE-2015-6127. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in HDF5 1.14.6. Affected is the function H5FL__reg_gc_list of the file src/H5FL.c. The manipulation leads to use after free.
This vulnerability is traded as CVE-2025-6856. Attacking locally is a requirement. Furthermore, there is an exploit available.
A vulnerability has been found in HDF5 1.14.6 and classified as problematic. Affected by this vulnerability is the function H5G__node_cmp3 of the file src/H5Gnode.c. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2025-6857. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
Currently trending CVE - Hype Score: 1 - FOG is a cloning/imaging/rescue suite/inventory management system. Prior to 1.5.10.34, packages/web/lib/fog/reportmaker.class.php in FOG was affected by a command injection via the filename parameter to /fog/management/export.php. This vulnerability is fixed in 1.5.10.34.
A vulnerability has been found in China-on-site FlexPHPLink 0.0.6/0.0.7 and classified as critical. This vulnerability affects unknown code of the file admin/index.php. The manipulation of the argument checkpass leads to sql injection.
This vulnerability was named CVE-2008-6730. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Microsoft Internet Explorer 7/8/9/10. Affected is an unknown function of the component CFlatMarkupPointer Object Handler. The manipulation of the argument InsertImage leads to memory corruption.
This vulnerability is traded as CVE-2013-3184. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in MyWebServer 1.0.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument searchTarget leads to memory corruption.
This vulnerability is known as CVE-2002-1452. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Oracle Financial Services Regulatory Reporting for US Federal Reserve 8.0.4/8.0.5/8.0.6/8.0.7. This affects an unknown part of the component Apache Batik. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2019-11358. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in China-on-site FlexPHPDirectory 0.0.1. It has been declared as critical. This vulnerability affects unknown code of the file admin/usercheck.php. The manipulation leads to sql injection.
This vulnerability was named CVE-2008-6749. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in 2daybiz Job Search Engine Script. It has been rated as critical. Affected by this issue is some unknown functionality of the file show_search_result.php of the component Search Engine. The manipulation of the argument keyword leads to sql injection.
This vulnerability is handled as CVE-2010-2609. The attack may be launched remotely. Furthermore, there is an exploit available.