A vulnerability was found in bookx 1.7. It has been rated as problematic. This issue affects some unknown processing. The manipulation of the argument File leads to path traversal.
The identification of this vulnerability is CVE-2014-4937. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Dotonpaper Booking System up to 1.1 and classified as critical. Affected by this issue is some unknown functionality of the file dopbs-backend-forms.php of the component Backend. The manipulation of the argument booking_form_id leads to sql injection.
This vulnerability is handled as CVE-2014-3210. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in IDevSpot iSupport 1.02/1.06/1.8. It has been declared as problematic. This vulnerability affects unknown code of the file index.php. The manipulation of the argument include_file leads to path traversal.
This vulnerability was named CVE-2009-4434. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, has been found in Microsoft Windows 2000. This issue affects some unknown processing of the component Port Handler. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2000-0580. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
YouTube 以有害内容为由下架了主播 Jeff Geerling 讲解如何在 Raspberry Pi 5 上安装 LibreELEC 自托管媒体内容的教程《I replaced my Apple TV—with a Raspberry Pi》。对下架视频的第一次申诉遭到拒绝,在作者发表文章可能在社交媒体上引发广泛关注之后,人工审核批准了申诉,视频恢复了上架。此前这则视频上架一年多时间里播放量 50 万次,如今达到了 129 万次。YouTube 对视频的下架理由是涉嫌帮助获取未经授权的媒体内容,Geerling 否认了指控,称其教程仅涵盖合法自托管媒体内容,未提及盗版工具或版权规避。
A vulnerability was found in IDevSpot iSupport 1.02/1.06/1.8. It has been classified as problematic. This affects an unknown part of the file ticket_function.php. The manipulation of the argument which leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2009-4433. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in LTL Freight Quotes Plugin up to 1.0.11/2.1.10/2.2.6 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument expiry_date leads to cross site scripting.
This vulnerability is handled as CVE-2025-5303. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in GuppY up to 4.5.11. It has been declared as problematic. This vulnerability affects unknown code of the file dwnld.php. The manipulation of the argument pg leads to path traversal.
This vulnerability was named CVE-2006-1224. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Horde Application Framework up to 3.2.4. It has been classified as problematic. This affects an unknown part. The manipulation of the argument subdir leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2010-3077. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Total.js CMS 12.0.0 and classified as critical. This issue affects some unknown processing of the component Widget Handler. The manipulation with the input <script total>global.process.mainModule.require(child_process).exec(RCE);</script> leads to command injection.
The identification of this vulnerability is CVE-2019-15954. The attack may be initiated remotely. Furthermore, there is an exploit available.