A vulnerability was found in Church CRM 5.8.0 and classified as problematic. This issue affects some unknown processing of the component New Family Page. The manipulation of the argument Family Name leads to cross site scripting.
The identification of this vulnerability is CVE-2024-36647. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Modern Campus Omni CMS 2023.1. It has been classified as problematic. This affects the function blog. The manipulation of the argument Multiple leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2023-35859. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Simple Sitemap Plugin up to 3.5.13 on WordPress. This affects the function admin_notices. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2023-6492. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in Schema App Structured Data Plugin up to 2.2.0 on WordPress and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2024-0892. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in FooGallery Plugin up to 2.4.15 on WordPress and classified as problematic. This issue affects some unknown processing of the component Gallery Custom URL Handler. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-2122. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in WP Staging Pro Plugin up to 5.6.0 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2024-5551. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Microsoft Windows Vista SP2 up to Server 2012 R2. This issue affects some unknown processing in the library win32k.sys of the component Kernel Mode Driver. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2016-0094. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
Cisco Talos found UAT-5918, active since 2023, using web shells and open-source tools for persistence, info theft, and credential harvesting. Cisco Talos uncovered UAT-5918, an info-stealing threat actor active since 2023, using web shells and open-source tools for persistence and credential theft. The APT UAT-5918 targets Taiwan, exploiting N-day vulnerabilities in unpatched servers for long-term […]
The FBI is warning that fake online document converters are being used to steal people's information and, in worst-case scenarios, lead to ransomware attacks. [...]