A vulnerability was found in enyetech Coca-Cola FM Brasil 2.0.41709. It has been classified as critical. Affected is an unknown function of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is traded as CVE-2014-7798. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in Gotobestofprice Thai food 1 and classified as critical. This issue affects some unknown processing of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
The identification of this vulnerability is CVE-2014-7797. The attack needs to be approached within the local network. There is no exploit available.
Omni Family Health disclosed a data breach affecting nearly 470,000 current and former patients and employees. Omni Family Health is a nonprofit organization that provides healthcare services to communities in California, focusing on underserved populations. They offer a range of services, including primary care, dental care, behavioral health, and preventive services. Omni Family Health aims […]
A vulnerability has been found in Nobexrc House365 Radio 3.2.3 and classified as critical. This vulnerability affects unknown code of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability was named CVE-2014-7796. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability has been found in Adobe Acrobat Reader up to 11.0.17/15.006.30201/15.017.20053 and classified as critical. This vulnerability affects unknown code. The manipulation leads to memory corruption.
This vulnerability was named CVE-2016-7005. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Adobe Acrobat Reader up to 11.0.17/15.006.30201/15.017.20053. This affects an unknown part. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2016-7004. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple iOS up to 12.0.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Graphics Driver. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2018-4384. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Social Share Buttons Plugin up to 1.19 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-9219. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in torinriley ACON up to 1.1.0 and classified as very critical. This issue affects some unknown processing. The manipulation leads to improper input validation.
The identification of this vulnerability is CVE-2024-49361. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as problematic has been found in LibTIFF 3.9.0. Affected is the function TIFFReadDirectory. The manipulation leads to improper input validation.
This vulnerability is traded as CVE-2010-2630. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic was found in StreamWeasels Twitch Integration Plugin up to 1.8.6 on WordPress. Affected by this vulnerability is the function sw-twitch-embed of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-9897. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as very critical has been found in infiniflow ragflow up to 0.11.0. Affected is the function add_llm of the file llm_app.py. The manipulation of the argument req['llm_factory']/req['llm_name'] leads to command injection.
This vulnerability is traded as CVE-2024-10131. It is possible to launch the attack remotely. There is no exploit available.