Cryptocurrency exchange Bybit on Friday revealed that a "sophisticated" attack led to the theft of over $1.5 billion worth of cryptocurrency from one of its Ethereum cold (offline) wallets, making it the largest ever single crypto heist in history.
"The incident occurred when our ETH multisig cold wallet executed a transfer to our warm wallet. Unfortunately, this transaction was manipulated
A vulnerability, which was classified as problematic, has been found in Easy Social Feed Premium Plugin on WordPress. Affected by this issue is some unknown functionality of the component FancyBox JavaScript Library. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-5020. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in FancyBox Plugin on WordPress. This affects an unknown part of the component FancyBox JavaScript Library. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-5020. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in Firelight Lightbox Plugin on WordPress and classified as problematic. This vulnerability affects unknown code of the component FancyBox JavaScript Library. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-5020. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Form Maker Plugin on WordPress and classified as problematic. This issue affects some unknown processing of the component FancyBox JavaScript Library. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-5020. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in FV Flowplayer Video Player Plugin on WordPress. It has been classified as problematic. Affected is an unknown function of the component FancyBox JavaScript Library. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-5020. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Gallery Plugin on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component FancyBox JavaScript Library. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-5020. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Getwid Plugin on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality of the component FancyBox JavaScript Library. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-5020. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Photo Gallery, Sliders, Proofing and Themes Plugin on WordPress. This affects an unknown part of the component FancyBox JavaScript Library. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-5020. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Microsoft Windows NT 4.0. Affected by this issue is some unknown functionality of the component Remote Registry Request Handler. The manipulation leads to denial of service.
This vulnerability is handled as CVE-2000-0377. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, has been found in Apple Mac OS X 10.5.2. This issue affects some unknown processing of the component Wiki Server. The manipulation leads to path traversal.
The identification of this vulnerability is CVE-2008-1000. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in PHPJabbers Cleaning Business Software 1.0. This affects an unknown part of the component Languages Section Label Handler. The manipulation leads to csv injection.
This vulnerability is uniquely identified as CVE-2023-51331. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as problematic was found in PHPJabbers Cleaning Business Software 1.0. This vulnerability affects unknown code of the component Forgot Password Handler. The manipulation leads to denial of service.
This vulnerability was named CVE-2023-51326. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in PHPJabbers Cleaning Business Software 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Forgot Password Handler. The manipulation leads to denial of service.
This vulnerability is handled as CVE-2023-51327. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in libming 0.4.8. This affects the function parseSWF_SOUNDINFO of the file util/parser.c of the component SWF File Handler. The manipulation leads to memory leak.
This vulnerability is uniquely identified as CVE-2025-26305. The attack can only be done within the local network. There is no exploit available.
A vulnerability has been found in libming 0.4.8 and classified as problematic. This vulnerability affects the function parseSWF_DEFINESCENEANDFRAMEDATA of the file util/parser.c of the component SWF File Handler. The manipulation leads to memory leak.
This vulnerability was named CVE-2025-26309. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability classified as problematic has been found in libming 0.4.8. This affects the function parseSWF_EXPORTASSETS of the file util/parser.c. The manipulation leads to memory leak.
This vulnerability is uniquely identified as CVE-2025-26304. The attack needs to be approached within the local network. There is no exploit available.