A vulnerability was found in Trend Micro Email Encryption Gateway 5.5 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2018-6230. The attack may be launched remotely. Furthermore, there is an exploit available.
A ransomware attack on Great Plains Regional Medical Center compromised personal data of 133,000 individuals, exposing sensitive information. On September 8, 2024, Great Plains Regional Medical Center (Oklahoma) suffered a ransomware attack. The organization launched an investigation into the incident with the help of a cybersecurity firm. The healthcare center discovered that a threat actor […]
A vulnerability was found in step-security harden-runner up to 2.10.1. It has been rated as critical. This issue affects some unknown processing of the component Environment Variable Handler. The manipulation leads to os command injection.
The identification of this vulnerability is CVE-2024-52587. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
U.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted by Chinese threat actors to gain access to valuable information.
The adversaries, tracked as Salt Typhoon, breached the company as part of a "monthslong campaign" designed to harvest cellphone communications of "high-value intelligence targets." It's not clear what information was taken, if any,
A vulnerability was found in kalcaddle kodbox up to 1.52.04. It has been classified as problematic. This affects an unknown part of the component Captcha. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2024-51037. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in FlightPath 7.5 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Last Name Section. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-50983. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Flagsmith up to 2.134.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Setting Handler. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2024-52871. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Flagsmith up to 2.134.0. This affects the function get_document. The manipulation leads to permission issues.
This vulnerability is uniquely identified as CVE-2024-52872. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Google for WooCommerce Plugin up to 2.8.6 on WordPress. This affects an unknown part. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2024-10486. It is possible to initiate the attack remotely. There is no exploit available.