A vulnerability, which was classified as critical, has been found in VMware ESXi and ESX up to 4.1. This issue affects the function data pointers. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2012-1516. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Chrome up to 56. It has been declared as critical. This vulnerability affects unknown code of the component Blink. The manipulation leads to cross site scripting (Universal).
This vulnerability was named CVE-2017-5007. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Oracle Database Server 11.1.0.7. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to an unknown weakness.
The identification of this vulnerability is CVE-2009-1995. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in ISC BIND. It has been rated as critical. This issue affects some unknown processing of the component DNS Cache. The manipulation leads to use of cache containing sensitive information.
The identification of this vulnerability is CVE-2002-2211. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Apache HTTP Server up to 1.3.3. This affects the function ap_proxy_send_fb of the component mod_proxy. The manipulation leads to numeric error.
This vulnerability is uniquely identified as CVE-2010-0010. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Ajsquare Aj Auction Pro-oopd 2.0. This issue affects some unknown processing of the file store.php. The manipulation of the argument id leads to sql injection.
The identification of this vulnerability is CVE-2009-3203. The attack may be initiated remotely. Furthermore, there is an exploit available.
The North Korea-linked APT group Lazarus uses a cross-platform JavaScript stealer to target crypto wallets in a new hacking campaign. Bitdefender researchers reported that the North Korea-linked Lazarus group uses fake LinkedIn job offers in the cryptocurrency and travel sectors to deliver a cross-platform JavaScript stealer to target crypto wallets in a new hacking campaign. Scammers lure […]