A vulnerability classified as problematic was found in Cisco IOS up to 12.4. Affected by this vulnerability is an unknown functionality of the component HTTP Handler. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2008-3821. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Guangzhou Huayi Intelligent Technology Jeewms up to 1.0.0 and classified as critical. This issue affects some unknown processing of the file /jeewms_war/webpage/system/druid/index.html of the component Druid Monitoring Interface. The manipulation leads to improper authorization.
The identification of this vulnerability is CVE-2024-12347. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Paul Vixie Cron 3.0 Pl1. It has been declared as problematic. This vulnerability affects unknown code of the file crontab. The manipulation of the argument -e leads to improper privilege management.
This vulnerability was named CVE-2000-1096. Local access is required to approach this attack. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel 2.6.16.59. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2009-0028. The attack needs to be approached locally. Furthermore, there is an exploit available.
A vulnerability has been found in Talentera up to 20241128 and classified as problematic. This vulnerability affects unknown code of the file /app/control/byt_cv_manager. The manipulation of the argument redirect_url leads to cross site scripting.
This vulnerability was named CVE-2024-12346. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The provided PoC only works in Mozilla Firefox. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, was found in TP-Link VN020 F3v(T) TT_V6.2.1021. This affects an unknown part of the component FTP USER Command Handler. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2024-12344. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability, which was classified as problematic, has been found in WeGIA up to 3.2.0. Affected by this issue is some unknown functionality of the component Password Change. The manipulation leads to permission issues.
This vulnerability is handled as CVE-2024-53473. Access to the local network is required for this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical was found in wphealth WP Umbrella Plugin up to 2.17.0 on WordPress. Affected by this vulnerability is the function umbrella-restore. The manipulation of the argument filename leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is known as CVE-2024-12209. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in TP-Link VN020 F3v(T) TT_V6.2.1021. It has been rated as critical. This issue affects some unknown processing of the file /control/WANIPConnection of the component Incomplete SOAP Request Handler. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2024-12342. The attack can only be initiated within the local network. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability, which was classified as problematic, has been found in Rundeck Community Edition up to 3.0.12. This issue affects some unknown processing of the file assets/javascripts/workflowStepEditorKO.js of the component Job Edit Page. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2019-6804. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Open-Xchange OX Guard up to 2.4.2-rev4 and classified as problematic. This vulnerability affects unknown code of the component guest Reader. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2016-6851. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Oracle VM VirtualBox up to 4.2.20/4.3.6. Affected by this issue is the function crNetRecvWriteback. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2014-0982. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Oracle VM VirtualBox up to 4.2.20/4.3.6. This affects the function crServerDispatchVertexAttrib4NubAR. The manipulation leads to improper resource management.
This vulnerability is uniquely identified as CVE-2014-0983. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Oracle Hyperion Infrastructure Technology 11.1.2.4/11.2.5.0 and classified as very critical. Affected by this vulnerability is an unknown functionality of the component Oracle WebLogic Server. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2019-2729. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.