A vulnerability, which was classified as problematic, was found in WellinTech KingView 6.52. Affected is an unknown function in the library KCHARTXYLib.KChartXY of the file KChartXY.ocx of the component ActiveX Control. The manipulation of the argument pathname leads to improper access controls.
This vulnerability is traded as CVE-2013-6128. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in EventON Plugin up to 2.2.7/4.5.4 on WordPress. Affected by this issue is the function evo_eventpost_update_meta. The manipulation leads to missing authorization.
This vulnerability is handled as CVE-2023-6158. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in FreeImage 3.18.0. It has been declared as critical. This vulnerability affects the function LoadPixelDataRLE4 of the file PluginBMP.cpp. The manipulation leads to integer overflow.
This vulnerability was named CVE-2023-47994. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as problematic was found in FreeImage 3.18.0. Affected by this vulnerability is the function FreeImage_AllocateBitmap of the file BitmapAccess.cpp. The manipulation leads to denial of service.
This vulnerability is known as CVE-2023-47997. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in JFinalcms 5.0.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component New Custom Table Creation. The manipulation of the argument Name leads to cross site scripting.
This vulnerability is known as CVE-2023-50136. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Hospital Management System 4.0. It has been declared as critical. This vulnerability affects unknown code. The manipulation of the argument Admin Remark leads to sql injection.
This vulnerability was named CVE-2020-26627. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in karlomikus Bar Assistant up to 3.1.x. It has been rated as critical. Affected by this issue is the function Image::make. The manipulation leads to server-side request forgery.
This vulnerability is handled as CVE-2023-49471. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Zentao up to 4.1.3. This vulnerability affects unknown code. The manipulation leads to open redirect.
This vulnerability was named CVE-2023-49394. The attack needs to be done within the local network. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Tenda AX1803 1.0.0.1. Affected by this issue is the function getIptvInfo. The manipulation leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2023-51971. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in Tenda AX1803 1.0.0.1. It has been declared as critical. Affected by this vulnerability is the function formSetIptv. The manipulation of the argument vlan leads to stack-based buffer overflow.
This vulnerability is known as CVE-2023-51956. Access to the local network is required for this attack. There is no exploit available.
A vulnerability classified as critical has been found in Tenda AX1803 1.0.0.1. This affects the function formSetIptv. The manipulation of the argument port leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2023-51954. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in Tenda AX1803 1.0.0.1. It has been rated as critical. This issue affects the function setIptvInfo. The manipulation of the argument port leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2023-51964. The attack can only be done within the local network. There is no exploit available.
Web-to-App Pipeline Uses Meta Pixel and Yandex Metrica American social media giant Meta and Russian counterpart Yandex each found methods to break through privacy protections enabled by Android users, say academics in newly disclosed research. A Meta spokesperson in a prepared statement said it stopped the tracking "upon becoming aware of the concerns."
Malware Operation Shows Signs of Regrouping Just days after a global takedown disrupted over 2,300 Lumma-linked domains, the info-stealing malware-as-a-service operation resurfaced, exposing how modular malware and resilient infrastructure allow cybercriminals to rapidly rebound and evade law enforcement.