A vulnerability was found in Apple iOS up to 12.1.3. It has been rated as critical. Affected by this issue is some unknown functionality of the component Foundation. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2019-7286. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in PGP Desktop 9.0.6/9.9.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Device Driver. The manipulation leads to improper resource management.
This vulnerability is handled as CVE-2008-5731. Local access is required to approach this attack. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in PHPmotion 1.0/2.0/2.1. This affects an unknown part of the file password.php. The manipulation of the argument email_address leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2008-6729. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Apple CUPS 1.3.8. Affected is an unknown function. The manipulation leads to link following.
This vulnerability is traded as CVE-2008-5377. An attack has to be approached locally. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Nodstrum MySQL Calendar 1.1. Affected by this issue is some unknown functionality of the file index.php of the component MySQL. The manipulation of the argument username leads to sql injection.
This vulnerability is handled as CVE-2008-5737. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Mozilla Firefox 3.0.5. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to improper input validation.
This vulnerability was named CVE-2008-5715. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as very critical, has been found in Psi-im PSI up to 0.12. This issue affects some unknown processing. The manipulation leads to numeric error.
The identification of this vulnerability is CVE-2008-6393. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Cms.maury91 SolarCMS 0.53.8/1.0. It has been classified as critical. Affected is an unknown function of the file Forum.php. The manipulation of the argument cat leads to sql injection.
This vulnerability is traded as CVE-2008-6345. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in RoundCube Webmail 0.2. It has been classified as very critical. This affects the function preg_replace of the file html2text.php. The manipulation leads to code injection.
This vulnerability is uniquely identified as CVE-2008-5619. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
Cybersecurity investigators found the leaked data to be information from a third party, not Ford itself, that is already accessible to the public and not sensitive in nature.