Key Takeaways Case Summary This intrusion began in November 2024 with a password spray attack targeting an internet-facing RDP server. Over the course of several hours, the threat actor attempted … Read More
A vulnerability has been found in SourceCodester Best Salon Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /panel/edit-subscription.php. The manipulation of the argument editid leads to sql injection.
This vulnerability is known as CVE-2025-6875. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in SourceCodester Best Salon Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /panel/add-category.php. The manipulation of the argument Name leads to sql injection.
This vulnerability is handled as CVE-2025-6876. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in IBM Lotus Notes up to 7.0.1. It has been rated as critical. Affected by this issue is some unknown functionality of the component UUE File Handler. The manipulation as part of Long File Name leads to memory corruption.
This vulnerability is handled as CVE-2005-2618. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in IBM Lotus Notes up to 7.0.1. This affects an unknown part in the library kvarcve.dll of the component Archive Preview. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2005-2618. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in IBM Lotus Notes up to 7.0.1. This vulnerability affects unknown code in the library tarrdr.dll of the component TAR Archive Filename Handler. The manipulation leads to memory corruption.
This vulnerability was named CVE-2005-2618. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in IBM Lotus Notes up to 7.0.1. This issue affects some unknown processing in the library htmsr.dll. The manipulation as part of Long URL Link leads to memory corruption.
The identification of this vulnerability is CVE-2005-2618. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in ECW-Shop 6.0.2 and classified as problematic. This issue affects some unknown processing of the file index.php. The manipulation of the argument ctg leads to basic cross site scripting.
The identification of this vulnerability is CVE-2005-2622. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in IBM Lotus Notes up to 7.0.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality in the library kvarcve.dll of the component ZIP Archive Handler. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2005-2618. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in WinFtp Server 1.6.8 and classified as critical. This vulnerability affects the function log-scr. The manipulation leads to memory corruption.
This vulnerability was named CVE-2005-2634. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as problematic was found in Juniper Netscreen ScreenOS up to 5.2.0. This vulnerability affects unknown code of the component IKE Aggressive Mode. The manipulation leads to information disclosure.
This vulnerability was named CVE-2005-2640. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Mozilla Firefox and Thunderbird up to 17.0 and classified as critical. Affected by this issue is some unknown functionality of the component XMLSerializer. The manipulation leads to improper resource management.
This vulnerability is handled as CVE-2013-0753. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
Facebook asks users to allow “cloud processing” to access phone photos for AI-generated collages and recaps, even if not uploaded. Meta-owned Facebook is prompting users to enable “cloud processing” to access photos from their phones, even those not uploaded. If users opt into “cloud processing,” Facebook will continuously upload media to its servers and use […]
A vulnerability, which was classified as critical, has been found in SourceCodester Simple Company Website 1.0. This issue affects some unknown processing of the file /classes/Users.php?f=save. The manipulation of the argument img leads to unrestricted upload.
The identification of this vulnerability is CVE-2025-6873. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in SourceCodester Best Salon Management System 1.0. Affected is an unknown function of the file /panel/add_subscribe.php. The manipulation of the argument user_id/plan_id leads to sql injection.
This vulnerability is traded as CVE-2025-6874. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in Oracle Insurance Allocation Manager for Enterprise Profitability 8.0.8. This affects an unknown part of the component Apache Commons FileUpload. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2019-11358. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.