Cybercriminals are targeting people working in Web3 with fake business meetings using a fraudulent video conferencing platform that infects Windows and Macs with crypto-stealing malware. [...]
The modern business landscape is thrilling yet daunting. Rapidly evolving technology, persistent cyberthreats and escalating operational complexities make data protection and seamless business continuity challenging for businesses of all sizes. Your organization needs robust security measures that go beyond traditional backup solutions to address the intricacies of today’s complex IT ecosystems.
A vulnerability, which was classified as problematic, has been found in Quarkus CXF. Affected by this issue is some unknown functionality of the component SOAP Message Logging. The manipulation leads to sensitive information in log files.
This vulnerability is handled as CVE-2024-9621. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in Message Filter for Contact Form Plugin up to 1.6.3 on WordPress. It has been declared as problematic. This vulnerability affects unknown code of the component Filter Handler. The manipulation leads to missing authorization.
This vulnerability was named CVE-2024-12027. The attack can be initiated remotely. There is no exploit available.
A vulnerability has been found in AI Quiz Plugin up to 1.1 on WordPress and classified as problematic. This vulnerability affects unknown code of the component Options Update Handler. The manipulation leads to missing authorization.
This vulnerability was named CVE-2024-11323. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in WP Private Content Plus Plugin up to 3.6.1 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2024-11292. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in gdlib up to 2.0.28. It has been declared as very critical. Affected by this vulnerability is the function gdimagecreatefrompngctx of the file gd_png.c of the component Graphics. The manipulation leads to heap-based buffer overflow.
This vulnerability is known as CVE-2004-0990. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.