A vulnerability was found in Linksys BEFSR41 1.40.2/1.41/1.42.3/1.42.7 and classified as problematic. This issue affects some unknown processing of the file Gozila.cgi of the component Remote Management. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2002-1236. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in bongomovie 1 and classified as critical. Affected by this issue is some unknown functionality of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is handled as CVE-2014-6762. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Intellinet NFC-30ir IP Camera LM.1.6.16.05. Affected by this issue is some unknown functionality of the component CGI Script. The manipulation leads to path traversal.
This vulnerability is handled as CVE-2017-7461. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Achievo 1.1.0. It has been declared as very critical. This vulnerability affects unknown code of the file index.php. The manipulation of the argument config_atkroot leads to file inclusion.
This vulnerability was named CVE-2007-2736. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Oracle Retail Point-of-Sale 14.0/14.1. This affects an unknown part of the component Transaction. The manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2016-9878. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Oracle Retail Integration Bus 14.0.x/14.1.x/15.0.x/16.0.x. Affected by this issue is some unknown functionality of the component Install. The manipulation leads to path traversal.
This vulnerability is handled as CVE-2016-9878. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in playSMS 1.4.4/1.4.5/1.4.6/1.4.7. Affected is an unknown function of the file /playsms/index.php?app=main&inc=core_auth&route=forgot&op=forgot of the component Template Handler. The manipulation of the argument username/email/captcha leads to code injection.
This vulnerability is traded as CVE-2024-8880. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The project maintainer was informed early about the issue. Investigation shows that playSMS up to 1.4.3 contained a fix but later versions re-introduced the flaw. As long as the latest version of the playsms/tpl package is used, the software is not affected. Version >=1.4.4 shall fix this issue for sure.
It is recommended to upgrade the affected component.
A vulnerability was found in Oracle Retail Central Office 14.0/14.1. It has been rated as critical. This issue affects some unknown processing of the component Security. The manipulation leads to path traversal.
The identification of this vulnerability is CVE-2016-9878. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as very critical, was found in Tinyirc TinyIdentD 2.2. This affects an unknown part. The manipulation leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2007-2711. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.