Exploit: No
Auto Added by WPeMatico
-
A vulnerability, which was classified as problematic, was found in WordPress underConstruction plugin up to 1.8. Affected is an unknown function. The manipulation leads to cross-site request forgery. This vulnerability is traded as CVE-2013-2699. It is possible to launch the attack remotely. There is no exploit available. It is recommended to upgrade the affected component.
-
A vulnerability, which was classified as critical, was found in Rodrigo Polo Stream Video Player 1.4.0. Affected is an unknown function. The manipulation leads to cross-site request forgery. This vulnerability is traded as CVE-2013-2706. It is possible to launch the attack remotely. There is no exploit available.
-
A vulnerability was found in Kieranoshea Calendar 1.3.2. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The identification of this vulnerability is CVE-2013-2698. The attack may be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component.
-
A vulnerability was found in JavaScript WebGL API. It has been declared as critical. This vulnerability affects unknown code of the component GPU Memory Module. The manipulation leads to 7pk security features. This vulnerability was named CVE-2018-10229. The attack can be initiated remotely. There is no exploit available.
-
A vulnerability was found in Xen and classified as problematic. Affected by this issue is some unknown functionality of the component BTC SRSO Mitigation Handler. The manipulation leads to Privilege Escalation. This vulnerability is handled as CVE-2024-31142. The attack needs to be initiated within the local network. There is no exploit available. It is recommended…
-
A vulnerability classified as critical has been found in Dell ECS up to 3.8.1.2. This affects an unknown part. The manipulation leads to authentication bypass by capture-replay. This vulnerability is uniquely identified as CVE-2024-52534. It is possible to initiate the attack remotely. There is no exploit available. It is recommended to upgrade the affected component.
-
A vulnerability, which was classified as critical, was found in Dell NativeEdge. This affects an unknown part. The manipulation leads to execution with unnecessary privileges. This vulnerability is uniquely identified as CVE-2024-47978. It is possible to launch the attack on the local host. There is no exploit available. It is recommended to upgrade the affected…
-
A vulnerability, which was classified as problematic, has been found in Dell NativeEdge. Affected by this issue is some unknown functionality. The manipulation leads to creation of temporary file with insecure permissions. This vulnerability is handled as CVE-2024-52543. Attacking locally is a requirement. There is no exploit available. It is recommended to upgrade the affected…
-
A vulnerability, which was classified as critical, has been found in ImageMagick up to 6.7.8-7. Affected by this issue is the function ReadGIFImage of the file gif.c. The manipulation leads to memory corruption. This vulnerability is handled as CVE-2013-4298. The attack may be launched remotely. There is no exploit available. It is recommended to upgrade…
-
A vulnerability classified as problematic was found in MediaWiki up to 1.19.7/1.20.6/1.21.1. Affected by this vulnerability is an unknown functionality in the library includes/libs/IEUrlExtension.php of the component API. The manipulation of the argument siprop as part of Parameter leads to cross site scripting. This vulnerability is known as CVE-2013-4303. The attack can be launched remotely.…
-
A vulnerability was found in Jean-paul Calderone pyOpenSSL up to 0.13. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to improper input validation. This vulnerability was named CVE-2013-4314. The attack can be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component.
-
A vulnerability was found in AmosConnect 8. It has been declared as critical. This vulnerability affects unknown code of the component Task Manager. The manipulation leads to hard-coded credentials. This vulnerability was named CVE-2017-3222. The attack can be initiated remotely. There is no exploit available.
-
A vulnerability was found in AmosConnect 8. It has been classified as critical. This affects an unknown part of the component Login Form. The manipulation leads to sql injection. This vulnerability is uniquely identified as CVE-2017-3221. It is possible to initiate the attack remotely. There is no exploit available.
-
A vulnerability, which was classified as problematic, was found in Acronis True Image up to 2017 Build 8053. This affects an unknown part of the component Software Update. The manipulation leads to 7pk security features (MD5). This vulnerability is uniquely identified as CVE-2017-3219. It is possible to initiate the attack remotely. There is no exploit…
-
A vulnerability was found in Cisco UCS Director 6.0.0.0/6.0.0.1 and classified as problematic. Affected by this issue is some unknown functionality of the component RBAC. The manipulation leads to improper access controls. This vulnerability is handled as CVE-2017-3801. It is possible to launch the attack on the local host. There is no exploit available.
-
A vulnerability, which was classified as critical, has been found in Samsung Magician 5.0. Affected by this issue is some unknown functionality of the component TLS Certificate Handler. The manipulation leads to insufficient verification of data authenticity. This vulnerability is handled as CVE-2017-3218. The attack may be launched remotely. There is no exploit available. It…