Free unofficial patches are now available for a new Windows Themes zero-day vulnerability that allows attackers to steal a target's NTLM credentials remotely. [...]
A vulnerability was found in SpiderControl SCADA Webserver up to 2.08 and classified as critical. Affected by this issue is some unknown functionality of the component Upload File Handler. The manipulation leads to path traversal.
This vulnerability is handled as CVE-2023-3329. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Axis Door Controller and Intercom. This affects an unknown part of the component OSDP Handler. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2023-21405. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability classified as problematic has been found in HCL DRYiCE MyCloud. This affects an unknown part. The manipulation leads to risky cryptographic algorithm.
This vulnerability is uniquely identified as CVE-2023-23346. It is possible to launch the attack on the local host. There is no exploit available.
A vulnerability was found in Google Android. It has been classified as problematic. This affects an unknown part. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2023-35680. Attacking locally is a requirement. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android and classified as critical. This issue affects the function onCreate of the file DeviceAdminAdd.java. The manipulation leads to permission issues.
The identification of this vulnerability is CVE-2023-35677. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Apple iOS and iPadOS and classified as problematic. This vulnerability affects unknown code. The manipulation leads to information disclosure.
This vulnerability was named CVE-2023-35990. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple watchOS and classified as problematic. This issue affects some unknown processing. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2023-35990. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple macOS. It has been classified as problematic. Affected is an unknown function. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2023-35990. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in VMware vCenter Server up to 6.5 U2/6.7 U2/8.0 U1. Affected is an unknown function. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2023-34056. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in National Tax Agency e-Tax software 3.0.10. It has been declared as problematic. This vulnerability affects unknown code of the component XML Handler. The manipulation leads to xml external entity reference.
This vulnerability was named CVE-2023-46802. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in Apple macOS up to 10.12.3 and classified as critical. This issue affects some unknown processing of the component Kernel. The manipulation leads to improper input validation.
The identification of this vulnerability is CVE-2017-2410. The attack needs to be approached locally. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Nissc IPsec 1.0. This issue affects some unknown processing. The manipulation leads to cleartext storage of sensitive information.
The identification of this vulnerability is CVE-2005-0039. The attack may be initiated remotely. There is no exploit available.