A vulnerability was found in Synactis PDF In-The-Box. It has been classified as critical. This affects the function ConnectToSynactis in the library PDF_IN_1.ocx. The manipulation of the argument ldCmdLine leads to stack-based buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is uniquely identified as CVE-2013-10057. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The use on online tracking tools on the health-related websites and apps of HIPAA and non-HIPAA regulated entities continues to be a lightning rod due to a long list of ongoing data privacy, regulatory and legal concerns, said partner and attorney Elizabeth Hodge of the law firm Akerman.
Investor Umesh Padval on Platform Power, Scaling Fast and Global AI Plays Q2 2025 saw AI dominate global VC funding, grabbing $47.5 billion of the $94.6 billion raised. AI Investor Umesh Padval breaks down what makes AI infrastructure startups worth betting on - from platform depth and speed to regional ecosystems and exit timing.
AI Tools Can Steal Crypto Autonomously, Even From Audited Code Armed with just a smart contract address, researchers developed an autonomous artificial intelligence tool that can scan for vulnerabilities, write working exploits in the Solidity blockchain programming language and siphon funds. "It behaves more like a human hacker," said its co-creator.
Security Experts Laud Project Zero's Push for Greater Transparency, Faster Patches Google is trying out a new approach to publicizing flaws found by its in-house bug hunters meant to get patches more rapidly into end users' hands. Under a trial policy effective immediately, Google's Project Zero team will publish a general alert to the public within seven days.
GenAI Chooses Insecure Code Nearly Half the Time, Veracode Finds There's been little improvement in how well AI models handle core security decisions, says a report from application security company Veracode. Large language models introduce vulnerabilities in nearly half of test cases when asked to complete secure code tasks, it found.
A vulnerability classified as problematic has been found in Kayako liveResponse 2.0. Affected is an unknown function of the file index.php. The manipulation of the argument Username leads to basic cross site scripting.
This vulnerability is traded as CVE-2005-2460. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, has been found in Kayako Email up to 3.00.26. Affected by this issue is some unknown functionality of the file index.php of the component Downloads Module. The manipulation of the argument nav leads to basic cross site scripting.
This vulnerability is handled as CVE-2005-4637. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic was found in Kayako eSupport 2.3. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument _c leads to basic cross site scripting.
This vulnerability is known as CVE-2005-0842. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Kayako liveResponse 2.0. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument Date leads to sql injection.
This vulnerability is known as CVE-2005-2461. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in JustWilliam's Amazon Webstore and classified as problematic. This issue affects some unknown processing of the file index.php. The manipulation leads to basic cross site scripting.
The identification of this vulnerability is CVE-2005-1403. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Turn-k K-Search 1.0. It has been classified as critical. This affects an unknown part of the file index.php. The manipulation of the argument term leads to sql injection.
This vulnerability is uniquely identified as CVE-2005-3868. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic was found in JustWilliam's Amazon Webstore. Affected by this vulnerability is an unknown functionality of the file closeup.php. The manipulation of the argument image leads to basic cross site scripting.
This vulnerability is known as CVE-2005-1403. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in Cisco Intelligent Node Manager and Intelligent Node Software. Affected is an unknown function of the component TLS Connection Handler. The manipulation leads to use of hard-coded cryptographic key
.
This vulnerability is traded as CVE-2024-20323. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Progress MOVEit Transfer. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component SFTP Module. The manipulation leads to improper authentication.
This vulnerability is known as CVE-2024-6576. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in sandboxie-plus Sandboxie up to 5.69.5 on Windows. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file explorer.exe. The manipulation leads to path traversal.
This vulnerability is known as CVE-2024-49360. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in beego up to 2.3.3. This affects an unknown part. The manipulation leads to use of weak hash.
This vulnerability is uniquely identified as CVE-2024-55885. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in 1Panel-dev MaxKB up to 1.8.x and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to os command injection.
This vulnerability is known as CVE-2024-56137. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.