A vulnerability was found in Trustwave Secure Web Gateway up to 11.8.0.27. It has been classified as critical. Affected is an unknown function of the file /sendKey of the component SSH Key Handler. The manipulation of the argument publicKey as part of Parameter leads to key management error.
This vulnerability is traded as CVE-2017-18001. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability was found in Kerio Personal Firewall up to 4.3.26x. It has been rated as problematic. Affected by this issue is the function api of the file kpf4ss.exe. The manipulation leads to denial of service.
This vulnerability is handled as CVE-2006-3787. Local access is required to approach this attack. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Chamilo LMS up to 1.9.6 and classified as critical. This vulnerability affects the function check_user_password of the component Installation. The manipulation of the argument password0 leads to sql injection.
This vulnerability was named CVE-2013-6787. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Etoshop C2C Forward Auction Creator 2.0 and classified as critical. This vulnerability affects unknown code. The manipulation of the argument pa leads to sql injection.
This vulnerability was named CVE-2013-7193. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in ZeroShell 3.9.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Web Application. The manipulation as part of HTTP Parameter leads to os command injection.
This vulnerability is known as CVE-2019-12725. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Canto Plugin 1.3.0 on WordPress. Affected by this vulnerability is an unknown functionality of the file /includes/lib/get.php. The manipulation of the argument subdomain leads to server-side request forgery.
This vulnerability is known as CVE-2020-28977. The attack can only be done within the local network. Furthermore, there is an exploit available.
A vulnerability was found in DiY-CMS 1.0 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument answer leads to cross site scripting.
This vulnerability is handled as CVE-2012-6517. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as very critical has been found in Apple iOS 3.1.3. This affects an unknown part. The manipulation leads to code injection.
This vulnerability is uniquely identified as CVE-2010-1180. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.