While still under development, the malware contains Turkish-language filenames, can record the screen and keystrokes, and inject custom overlays to steal passwords and sensitive data.
A vulnerability, which was classified as critical, was found in Django up to 4.2.14/5.0.7. This affects the function QuerySet.values/values_list. The manipulation leads to sql injection.
This vulnerability is uniquely identified as CVE-2024-42005. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Django up to 4.2.14/5.0.7. Affected by this issue is the function urlize/urlizetrunc of the component Template Filter. The manipulation leads to denial of service.
This vulnerability is handled as CVE-2024-41991. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in gofiber Django up to 4.2.14/5.0.7. Affected by this vulnerability is the function urlize/urlizetrunc of the component Template Filter. The manipulation leads to denial of service.
This vulnerability is known as CVE-2024-41990. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Django up to 4.2.14/5.0.7. Affected is the function django.utils.numberformat.floatformat of the component Template Filter. The manipulation leads to uncontrolled memory allocation.
This vulnerability is traded as CVE-2024-41989. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Accept Stripe Payments Plugin up to 2.0.86 on WordPress. It has been rated as problematic. This issue affects the function accept_stripe_payment_ng of the component Shortcode Handler. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-7353. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Organization Chart Plugin up to 1.5.0 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation of the argument title_input/node_description leads to cross site scripting.
This vulnerability was named CVE-2024-7355. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Modern Events Calendar Plugin up to 7.12.1 on WordPress. It has been classified as critical. This affects an unknown part. The manipulation leads to server-side request forgery.
This vulnerability is uniquely identified as CVE-2024-6522. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Samsung Devices and classified as critical. Affected by this issue is some unknown functionality in the library libcodec2secmp4vdec.so. The manipulation leads to heap-based buffer overflow.
This vulnerability is handled as CVE-2024-34612. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Samsung Devices and classified as problematic. Affected by this vulnerability is an unknown functionality of the component KnoxService. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2024-34611. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Samsung Devices. Affected is an unknown function of the component ExtControlDeviceService. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2024-34610. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.