A vulnerability was found in Zyxel ATP, USG FLEX, USG FLEX 50(W) and USG20(W)-VPN up to 5.38. It has been classified as critical. This affects an unknown part. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2024-42060. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Zyxel ATP, USG FLEX, USG FLEX 50(W) and USG20(W)-VPN up to 5.38 and classified as critical. Affected by this issue is some unknown functionality of the component FTP. The manipulation leads to os command injection.
This vulnerability is handled as CVE-2024-42059. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Zyxel ATP, USG FLEX, USG FLEX 50(W) and USG20(W)-VPN up to 5.38 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Packets Handler. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2024-42058. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Zyxel ATP, USG FLEX, USG FLEX 50(W) and USG20(W)-VPN up to 5.38. Affected is an unknown function of the component IPSec VPN. The manipulation of the argument username leads to os command injection.
This vulnerability is traded as CVE-2024-42057. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as very critical, has been found in Zyxel NWA1123ACv3, WAC500, WAX655E, WBE530 and USG LITE 60AX. This issue affects some unknown processing of the component Cookie Handler. The manipulation of the argument host leads to os command injection.
The identification of this vulnerability is CVE-2024-7261. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as critical was found in Zyxel ATP and USG FLEX up to 5.38. This vulnerability affects unknown code of the component CLI. The manipulation leads to os command injection.
This vulnerability was named CVE-2024-7203. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in YaBB SE 1.5.1. It has been classified as critical. Affected is an unknown function of the file News.php. The manipulation of the argument template leads to code injection.
This vulnerability is traded as CVE-2000-1176. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in SGI IRIX up to 6.4. This affects an unknown part of the component startmidi. The manipulation leads to improper privilege management.
This vulnerability is uniquely identified as CVE-1999-0959. An attack has to be approached locally. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in OneWorldStore. It has been declared as critical. This vulnerability affects unknown code of the file owProductDetail.asp. The manipulation of the argument idproduct leads to sql injection.
This vulnerability was named CVE-2005-1161. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in WordPress 2.1/2.1.1/2.1.2. It has been rated as critical. This issue affects some unknown processing of the file xmlrpc.php. The manipulation of the argument post_id leads to sql injection.
The identification of this vulnerability is CVE-2007-1897. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in 2G Live Tv 0.9 and classified as critical. This vulnerability affects unknown code of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability was named CVE-2014-5842. Access to the local network is required for this attack to succeed. There is no exploit available.
A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Bobby Gould of Trend Micro Zero Day Initiative' was reported to the affected vendor on: 2024-09-03, 63 days ago. The vendor is given until 2025-01-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 6.5 AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H severity vulnerability discovered by 'Chizuru Toyama of TXOne Networks' was reported to the affected vendor on: 2024-09-03, 63 days ago. The vendor is given until 2025-01-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H severity vulnerability discovered by 'Chizuru Toyama of TXOne Networks' was reported to the affected vendor on: 2024-09-03, 63 days ago. The vendor is given until 2025-01-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H severity vulnerability discovered by 'Chizuru Toyama of TXOne Networks' was reported to the affected vendor on: 2024-09-03, 63 days ago. The vendor is given until 2025-01-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.5 AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'dangdang777' was reported to the affected vendor on: 2024-09-03, 63 days ago. The vendor is given until 2025-01-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Nitesh Surana (@_niteshsurana) of Trend Micro Research' was reported to the affected vendor on: 2024-09-03, 35 days ago. The vendor is given until 2025-01-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.