A vulnerability was found in Fannuo Enterprise Content Management System 凡诺企业网站管理系统 1.1/4.0. It has been declared as critical. This vulnerability affects unknown code of the file admin/cms_chip.php. The manipulation of the argument del leads to sql injection.
This vulnerability was named CVE-2025-3571. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Google Android and classified as critical. Affected by this issue is some unknown functionality of the component Qualcomm Camera Driver. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2017-0521. The attack needs to be approached locally. There is no exploit available.
A vulnerability was found in Google Android. It has been classified as problematic. This affects an unknown part of the component Qualcomm Video Driver. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2016-8478. It is possible to launch the attack on the local host. There is no exploit available.
A vulnerability was found in MIT Kerberos 5-1.7/5-1.7.1/5-1.8/5-1.8.1 and classified as problematic. Affected by this issue is some unknown functionality of the file do_tgs_req.c of the component Key Distribution Center. The manipulation leads to improper resource management.
This vulnerability is handled as CVE-2010-1320. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Samba. Affected by this issue is some unknown functionality of the component Default Configuration. The manipulation leads to path traversal.
This vulnerability is handled as CVE-2010-0926. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Apple QuickTime 7.0/7.0.1/7.0.2/7.0.3. This issue affects some unknown processing. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2005-3707. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in JamesZBL/code-projects db-hospital-drug 1.0. It has been classified as problematic. This affects the function Save of the file ContentController.java. The manipulation of the argument content leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-3570. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in JamesZBL/code-projects db-hospital-drug 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file ShiroConfig.java. The manipulation leads to improper authorization.
This vulnerability is handled as CVE-2025-3569. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in zend 2.2.3 and classified as problematic. This issue affects some unknown processing of the file php.ini. The manipulation of the argument -f leads to symlink following.
The identification of this vulnerability is CVE-2007-1369. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
A vulnerability was found in Dnesscarkey WP Armour Plugin up to 2.1.13 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-29091. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in Matt Manning MJM Clinic Plugin up to 1.1.22 on WordPress. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-29096. The attack can be initiated remotely. There is no exploit available.