A vulnerability was found in gnuedu. It has been rated as critical. This issue affects some unknown processing of the file scripts/weigh_keywords.php. The manipulation of the argument ETCDIR leads to code injection.
The identification of this vulnerability is CVE-2007-2609. The attack may be initiated remotely. Furthermore, there is an exploit available.
Cybersecurity researchers have uncovered a new variant of an Android banking trojan called TrickMo that comes packed with new capabilities to evade analysis and display fake login screens to capture victims' banking credentials.
"The mechanisms include using malformed ZIP files in combination with JSONPacker," Cleafy security researchers Michele Roviello and Alessandro Strino said. "In addition,
Even as cyber threats become increasingly sophisticated, the number one attack vector for unauthorized access remains phished credentials (Verizon DBIR, 2024). Solving this problem resolves over 80% of your corporate risk, and a solution is possible.
However, most tools available on the market today cannot offer a complete defense against this attack vector because they were architected to
Malicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in Progress Software WhatsUp Gold to conduct opportunistic attacks.
The activity is said to have commenced on August 30, 2024, a mere five hours after a PoC was released for CVE-2024-6670 (CVSS score: 9.8) by security researcher Sina Kheirkhah of the Summoning Team, who
A vulnerability classified as critical was found in mobilesoft Morocco Weather 3.1. This vulnerability affects unknown code of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability was named CVE-2014-6697. The attack can only be done within the local network. There is no exploit available.
A vulnerability classified as critical has been found in Candy Girl Party Makeover 1.0.0.0. This affects an unknown part of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is uniquely identified as CVE-2014-6696. The attack needs to be approached within the local network. There is no exploit available.