A vulnerability classified as problematic has been found in iterate Cyberduck and Mountain Duck. Affected is an unknown function of the component TLS Certificate Handler. The manipulation leads to use of weak hash.
This vulnerability is traded as CVE-2025-41256. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Brother Industries/FUJIFILM Business Innovation/RICOH Printer. It has been rated as critical. This issue affects some unknown processing of the component HTTP Service/HTTPS Service/IPP Service. The manipulation of the argument Origin header leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2024-51979. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Brother Industries/FUJIFILM Business Innovation/RICOH/Toshiba Tec Printer. It has been classified as critical. This affects an unknown part of the component Web Service. The manipulation leads to server-side request forgery.
This vulnerability is uniquely identified as CVE-2024-51980. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Brother Industries/FUJIFILM Business Innovation/RICOH/Toshiba Tec Printer and classified as problematic. Affected by this issue is some unknown functionality of the file /etc/mnt_info.csv of the component HTTP Service/IPP Service. The manipulation leads to file and directory information exposure.
This vulnerability is handled as CVE-2024-51977. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Brother Industries/FUJIFILM Business Innovation/RICOH Printer and classified as critical. Affected by this vulnerability is an unknown functionality of the component Service Port 9100. The manipulation of the argument FORMLINES leads to improper validation of syntactic correctness of input.
This vulnerability is known as CVE-2024-51982. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Brother Industries/FUJIFILM Business Innovation/RICOH/Toshiba Tec Printer. Affected is an unknown function of the component Web Services Feature. The manipulation of the argument JobToken leads to improper validation of syntactic correctness of input.
This vulnerability is traded as CVE-2024-51983. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Brother Industries/Toshiba Tec Printer. This issue affects some unknown processing of the component HTTP/HTTPS/IPP. The manipulation leads to use of weak credentials.
The identification of this vulnerability is CVE-2024-51978. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Microsoft Windows XP. It has been rated as critical. Affected by this issue is some unknown functionality of the file uplddrvinfo.htm of the component Help/Support Center. The manipulation leads to denial of service (File).
This vulnerability is handled as CVE-2002-0974. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
在使用生成式 AI 制作科学家肖像引发争议之后,《侏罗纪世界:进化 3》开发商 Frontier 证实它已经放弃使用该功能。《侏罗纪世界:进化 3》预计于 10 月 21 日登陆 PC、PS5 和 Xbox Series X/S 平台。Steam 的新政策要求游戏开发商披露是否使用 AI,而在 Frontier 披露使用生成式 AI 之后,玩家的批评迫使它做出回应,表示听取了玩家们的反馈,移除了生成式 AI 刻画科学家肖像的功能。
A vulnerability classified as critical has been found in Realink C-Arbre 0.6 Pr7. Affected is an unknown function of the file richtxt_functions.inc.php. The manipulation of the argument root_path leads to file inclusion.
This vulnerability is traded as CVE-2007-1721. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
Cybersecurity researchers devised two attack techniques to disrupt the operations of cryptocurrency mining botnets. Akamai Researchers uncovered two novel techniques to disrupt cryptocurrency mining botnets by exploiting flaws in common mining topologies. Current methods to stop cryptocurrecy mining botnets are pool bans or infrastructure takedowns, however, both are slow and complex. Researchers developed two faster techniques exploiting […]
A vulnerability has been found in Oracle Financial Services Liquidity Risk Management 8.0.1/8.0.2/8.0.4/8.0.5/8.0.6 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Apache Commons FileUpload. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2019-11358. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.