A vulnerability, which was classified as problematic, has been found in Tenda D152. Affected by this issue is some unknown functionality of the component SSID Handler. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2018-14497. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in F5 BIG-IP 10.2.1 and classified as problematic. Affected by this issue is some unknown functionality of the file properties.jsp of the component HTTP POST Request Handler. The manipulation of the argument name leads to path traversal.
This vulnerability is handled as CVE-2014-8727. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple macOS up to 10.12.1. It has been rated as critical. This issue affects some unknown processing of the component Power Management. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2016-7661. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Protect Your Crypto: Understanding the Ongoing Global Malware Attacks and What We Are Doing to Stop Them CISA warns of Windows flaw used in infostealer malware attacks Exotic SambaSpy is now dancing with Italian users Loki: […]
A vulnerability, which was classified as critical, was found in Yealink Voip Phone 28.72.0.2. Affected is an unknown function of the component Firmware. The manipulation of the argument model leads to crlf injection.
This vulnerability is traded as CVE-2014-3427. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Apple tvOS up to 10.0. Affected by this vulnerability is an unknown functionality of the component Power Management. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2016-7661. Local access is required to approach this attack. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Hackers stole over $44 million from Asian crypto platform BingX OP KAERB: Europol dismantled phishing scheme targeting mobile […]
A vulnerability was found in Sun Board. It has been declared as critical. This vulnerability affects unknown code of the file skin/board/default/doctype.php. The manipulation of the argument dir leads to Remote Code Execution.
This vulnerability was named CVE-2007-3370. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Apple iOS up to 10.1.1. It has been rated as critical. This issue affects some unknown processing of the component Power Management. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2016-7661. Attacking locally is a requirement. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Metroseoul Metro News 1.6.5. Affected is an unknown function of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is traded as CVE-2014-6924. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in Linux Kernel 2.2.19/2.4.10. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Symlink Handler. The manipulation leads to symlink following.
This vulnerability is handled as CVE-2001-0907. Attacking locally is a requirement. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Nazgul Nostromo. This affects an unknown part. The manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2011-0751. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Rapid7 Metasploit. It has been declared as critical. This vulnerability affects unknown code of the component APK File Handler. The manipulation leads to command injection.
This vulnerability was named CVE-2020-7384. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in ZyXEL Prestige 310 and 642R and classified as problematic. Affected by this vulnerability is an unknown functionality of the component ICMP Handler. The manipulation leads to denial of service.
This vulnerability is known as CVE-2002-1072. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in NetSupport NetSupport Manager Agent 11.00. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to memory corruption.
This vulnerability was named CVE-2011-0404. The attack can be initiated remotely. Furthermore, there is an exploit available.
GreyNoise Intelligence firm warns of a mysterious phenomenon observed since January 2020, massive waves of spoofed traffic called Noise Storms. GreyNoise Intelligence has been tracking a mysterious phenomenon since January 2020 consisting of massive waves of spoofed traffic, tracked by the experts as ‘Noise Storms.’ Despite the investigation into the traffic, the company has yet […]