The legal spars between Delta Air Lines and CrowdStrike are heating up, with the cybersecurity firm claiming that Delta's extended IT outage was caused by poor disaster recovery plans and the airline refusing to accept free onsite help in restoring Windows devices. [...]
A vulnerability was found in biscuit-auth biscuit 3 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to exposure of resource.
This vulnerability is handled as CVE-2024-42350. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /setlogo.php. The manipulation of the argument bgimg leads to unrestricted upload.
This vulnerability is known as CVE-2024-7506. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in itsourcecode Bike Delivery System 1.0. Affected is an unknown function of the file contact_us_action.php. The manipulation of the argument name leads to sql injection.
This vulnerability is traded as CVE-2024-7505. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, has been found in WPBakery Plugin up to 7.7 on WordPress. This issue affects some unknown processing. The manipulation leads to file inclusion.
The identification of this vulnerability is CVE-2024-5709. The attack needs to be done within the local network. There is no exploit available.
A vulnerability classified as problematic was found in WPBakery Plugin up to 7.7 on WordPress. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-5708. The attack can be initiated remotely. There is no exploit available.
A ransomware group called Dark Angels made headlines this past week when it was revealed the crime group recently received a record $75 million data ransom payment from a Fortune 50 company. Security experts say the Dark Angels have been around since 2021, but the group doesn't get much press because they work alone and maintain a low profile, picking one target at a time and favoring mass data theft over disrupting the victim's operations.
A ransomware group called Dark Angels made headlines this past week when it was revealed the crime group recently received a record $75 million data ransom payment from a Fortune 50 company. Security experts say the Dark Angels have been around since 2021, but the group doesn't get much press because they work alone and maintain a low profile, picking one target at a time and favoring mass data theft over disrupting the victim's operations.
A vulnerability classified as problematic has been found in RoundCube up to 1.5.7/1.6.7. This affects the function rcmail_action_mail_get of the component Content-Type Header Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-42008. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in JFrog Artifactory up to 7.90.5. It has been rated as critical. Affected by this issue is some unknown functionality of the component Cache Handler. The manipulation leads to improper input validation.
This vulnerability is handled as CVE-2024-6915. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in RoundCube up to 1.5.7/1.6.7. It has been declared as problematic. Affected by this vulnerability is the function mod_css_styles of the component Cascading Style Sheet Handler. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2024-42010. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A design flaw in Windows Smart App Control and SmartScreen that enables attackers to launch programs without triggering security warnings has been under exploitation since at least 2018. [...]
A vulnerability was found in RoundCube up to 1.5.7/1.6.7. It has been classified as problematic. Affected is the function message_body of the file program/actions/mail/show.php of the component E-Mail Message Handler. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-42009. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.