A vulnerability was found in Apache HTTP Server up to 2.0.50. It has been declared as problematic. This vulnerability affects unknown code of the component .htaccess Handler. The manipulation leads to memory corruption.
This vulnerability was named CVE-2004-0786. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in GTK+ up to 2.4.4. Affected is an unknown function of the file io-xpm.c of the component gdk-pixbuf. The manipulation leads to heap-based buffer overflow.
This vulnerability is traded as CVE-2004-0782. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in GTK+ up to 2.4.4. Affected by this vulnerability is an unknown functionality of the file io-xpm.c of the component gdk-pixbuf. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2004-0783. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in GTK+ up to 0.21 and classified as problematic. This issue affects some unknown processing of the component gdk-pixbuf. The manipulation as part of ICO File leads to integer coercion error.
The identification of this vulnerability is CVE-2004-0788. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in IBM HTTP Server 2.0.42/2.0.47 and classified as problematic. This issue affects some unknown processing of the component apr-util. The manipulation as part of Environment Variable leads to denial of service.
The identification of this vulnerability is CVE-2004-0786. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in RealNetworks Helix Universal Server 9.0.2/9.0.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component POST Request Handler. The manipulation of the argument Content-Length with the input -1 leads to uncontrolled memory allocation.
This vulnerability is known as CVE-2004-0774. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Sun Solaris 8.0/9.0. It has been declared as problematic. This vulnerability affects unknown code of the component uucp. The manipulation leads to memory corruption.
This vulnerability was named CVE-2004-0780. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Linuxprinting.org Foomatic 3.0/3.0.1/3.0.2/3.1. It has been classified as critical. Affected is an unknown function of the component CUPS. The manipulation leads to improper privilege management.
This vulnerability is traded as CVE-2004-0801. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in IBM DB2 Universal Database 8.1. It has been declared as problematic. Affected by this vulnerability is the function DB2REMOTECMD of the file DB2RCMD.EXE. The manipulation leads to improper privilege management.
This vulnerability is known as CVE-2004-0795. Local access is required to approach this attack. There is no exploit available.
A vulnerability was found in Nokri Plugin up to 1.6.3 on WordPress and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to authentication bypass using alternate channel.
This vulnerability is handled as CVE-2025-1313. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in WPBookit Plugin up to 1.0.4 on WordPress and classified as critical. Affected by this vulnerability is the function handle_image_upload. The manipulation leads to unrestricted upload.
This vulnerability is known as CVE-2025-6057. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in WPBookit Plugin up to 1.0.4 on WordPress. Affected is the function image_upload_handle. The manipulation leads to unrestricted upload.
This vulnerability is traded as CVE-2025-6058. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in GIGABYTE UEFI-OverClockSmiHandler 1.0.0. This issue affects the function SwSmiInputValue of the component Software SMI Handler. The manipulation leads to untrusted pointer dereference.
The identification of this vulnerability is CVE-2025-7029. An attack has to be approached locally. There is no exploit available.
A vulnerability classified as critical was found in GIGABYTE UEFI-SmiFlash 1.0.0. This vulnerability affects the function SwSmiInputValue of the component Software SMI Handler. The manipulation leads to untrusted pointer dereference.
This vulnerability was named CVE-2025-7028. The attack needs to be approached locally. There is no exploit available.
A vulnerability classified as critical has been found in GIGABYTE UEFI-GenericComponentSmmEntry 1.0.0. This affects the function SwSmiInputValue of the component Software SMI Handler. The manipulation leads to untrusted pointer dereference.
This vulnerability is uniquely identified as CVE-2025-7027. It is possible to launch the attack on the local host. There is no exploit available.
A vulnerability was found in GIGABYTE UEFI-GenericComponentSmmEntry 1.0.0. It has been rated as critical. Affected by this issue is the function SwSmiInputValue of the component Software SMI Handler. The manipulation leads to untrusted pointer dereference.
This vulnerability is handled as CVE-2025-7026. Attacking locally is a requirement. There is no exploit available.
A vulnerability was found in gitroomhq postiz-app up to 1.62.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Outbound Request Handler. The manipulation leads to server-side request forgery.
This vulnerability is known as CVE-2025-53641. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.