Aggregator
CVE-2010-0980 | Mitchell Sleeper L4d Stats 1.1 player.php steamid sql injection (EDB-10930 / XFDB-55299)
CVE-2010-2006 | LetoDMS 1.5.0/1.5.1/1.6.0/1.7.0/1.7.2 Login op/op.Login.php lang path traversal (DSA-2146 / EDB-33530)
CVE-2010-1112 | Tristan Barczyk KloNews 2.0 cat.php cat cross site scripting (EDB-33957 / SA38268)
CVE-2010-4878 | Hinnendahl Kontakt Formular 1.1 formmailer.php script_pfad code injection (EDB-14809 / OSVDB-67555)
CVE-2010-4752 | LightNEasy 3.2.1 LightNEasy.php page sql injection (EDB-15060 / ID 118994)
CVE-2010-2911 | Kayako eSupport 3.70.02 index.php newsid sql injection (EDB-14392 / XFDB-60455)
CVE-2010-2912 | Kayako eSupport 3.70.02 index.php _a sql injection (EDB-14404 / XFDB-60457)
INC
You must login to view this content
DragonForce
You must login to view this content
Warlock
You must login to view this content
Warlock
You must login to view this content
Pear
You must login to view this content
LG WebOS TV Vulnerability Let Attackers Bypass Authentication and Enable Full Device Takeover
A critical vulnerability has been discovered in LG’s WebOS for smart TVs, allowing an attacker on the same local network to bypass authentication mechanisms and achieve full control over the device. The flaw, which affects models like the LG WebOS 43UT8050, enables unauthenticated attackers to gain root access, install malicious applications, and completely compromise the […]
The post LG WebOS TV Vulnerability Let Attackers Bypass Authentication and Enable Full Device Takeover appeared first on Cyber Security News.
Ransomware attackers used incorrectly stored recovery codes to disable EDR agents
All target organizations are different, but ransomware attackers are highly adaptive and appreciate – and will exploit – any mistake you make. The latest Akira ransomware attacks Managed security service providers and external incident responders have had a front-row seat for observing many of the actions carried out by Akira ransomware affiliates in the last few months. In early August 2025, both Arctic Wolf and Huntress researchers warned about the possibility of Akira affiliates using … More →
The post Ransomware attackers used incorrectly stored recovery codes to disable EDR agents appeared first on Help Net Security.