Aggregator
老牌音乐播放器 Winamp 已在 GitHub 开放源代码,但…别急
11 months 1 week ago
Home业界消息老牌音乐播放器 Winamp 已在 GitHub 开放源代码,但…别急
China's 'Salt Typhoon' Cooks Up Cyberattacks on US ISPs
11 months 1 week ago
The state-sponsored advanced persistent threat (APT) is going after high-value communications service provider networks in the US, potentially with a dual set of goals.
Tara Seals, Managing Editor, News, Dark Reading
CVE-2014-7018 | efunfun LOVE DANCE 1.2.0626 X.509 Certificate cryptographic issues (VU#582497)
11 months 1 week ago
A vulnerability was found in efunfun LOVE DANCE 1.2.0626 and classified as critical. Affected by this issue is some unknown functionality of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is handled as CVE-2014-7018. Access to the local network is required for this attack to succeed. There is no exploit available.
vuldb.com
How to Intercept Data Exfiltrated by Malware via Telegram and Discord
11 months 1 week ago
Often, malware uses pl
CVE-2007-3811 | eSyndiCat page.php name sql injection (EDB-4183 / XFDB-35427)
11 months 1 week ago
A vulnerability was found in eSyndiCat. It has been classified as critical. This affects an unknown part of the file page.php. The manipulation of the argument name leads to sql injection.
This vulnerability is uniquely identified as CVE-2007-3811. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
vuldb.com
Cisco security advisory (AV24-540)
11 months 1 week ago
Canadian Centre for Cyber Security
CVE-2024-8803 | Bulk NoIndex & NoFollow Toolkit Plugin up to 2.15 on WordPress cross site scripting
11 months 1 week ago
A vulnerability was found in Bulk NoIndex & NoFollow Toolkit Plugin up to 2.15 on WordPress. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-8803. The attack may be initiated remotely. There is no exploit available.
vuldb.com
CVE-2024-8552 | Download Monitor Plugin up to 5.0.9 on WordPress Shop Enable authorization
11 months 1 week ago
A vulnerability was found in Download Monitor Plugin up to 5.0.9 on WordPress. It has been declared as problematic. This vulnerability affects unknown code of the component Shop Enable. The manipulation leads to missing authorization.
This vulnerability was named CVE-2024-8552. The attack can be initiated remotely. There is no exploit available.
vuldb.com
CVE-2024-7781 | Jupiter X Core Plugin up to 4.7.5 on WordPress improper authentication
11 months 1 week ago
A vulnerability was found in Jupiter X Core Plugin up to 4.7.5 on WordPress. It has been classified as critical. This affects an unknown part. The manipulation leads to improper authentication.
This vulnerability is uniquely identified as CVE-2024-7781. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2024-44825 | InVesalius 3.1.99995 inv3 File path traversal
11 months 1 week ago
A vulnerability was found in Centro de Tecnologia da Informação Renato Archer InVesalius 3.1.99995 and classified as critical. Affected by this issue is some unknown functionality of the component inv3 File Handler. The manipulation leads to path traversal.
This vulnerability is handled as CVE-2024-44825. The attack can only be done within the local network. There is no exploit available.
vuldb.com
CVE-2024-47315 | GiveWP Plugin up to 3.15.1 on WordPress cross-site request forgery
11 months 1 week ago
A vulnerability has been found in GiveWP Plugin up to 3.15.1 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2024-47315. The attack can be launched remotely. There is no exploit available.
vuldb.com
CVE-2024-47305 | Dnesscarkey Use Any Font Plugin up to 6.3.08 on WordPress cross-site request forgery
11 months 1 week ago
A vulnerability, which was classified as problematic, was found in Dnesscarkey Use Any Font Plugin up to 6.3.08 on WordPress. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2024-47305. It is possible to launch the attack remotely. There is no exploit available.
vuldb.com
CVE-2024-46655 | Ellevo 6.2.0.38160 cross site scripting
11 months 1 week ago
A vulnerability, which was classified as problematic, has been found in Ellevo 6.2.0.38160. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-46655. The attack may be initiated remotely. There is no exploit available.
vuldb.com
CVE-2024-47082 | strawberry graphql up to 0.242.x Multipart File Upload cross-site request forgery (GHSA-79gp-q4wv-33fr)
11 months 1 week ago
A vulnerability classified as problematic was found in strawberry graphql up to 0.242.x. This vulnerability affects unknown code of the component Multipart File Upload Handler. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2024-47082. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-46489 | promptr 6.0.7 URL Privilege Escalation
11 months 1 week ago
A vulnerability classified as critical has been found in promptr 6.0.7. This affects an unknown part of the component URL Handler. The manipulation leads to Privilege Escalation.
This vulnerability is uniquely identified as CVE-2024-46489. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2023-51157 | ZKTeco WDMS 5.1.3 Emp Name cross site scripting
11 months 1 week ago
A vulnerability was found in ZKTeco WDMS 5.1.3. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument Emp Name leads to cross site scripting.
This vulnerability is handled as CVE-2023-51157. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2024-46488 | sqlite-vec 0.1.1 File npy_token_next denial of service
11 months 1 week ago
A vulnerability was found in sqlite-vec 0.1.1. It has been declared as problematic. Affected by this vulnerability is the function npy_token_next of the component File Handler. The manipulation leads to denial of service.
This vulnerability is known as CVE-2024-46488. The attack can only be done within the local network. There is no exploit available.
vuldb.com
CVE-2024-45750 | TheGreenBow Windows Standard VPN Client IKEv2 Authentication improper authentication
11 months 1 week ago
A vulnerability was found in TheGreenBow Windows Standard VPN Client, Windows Enterprise VPN Client, Android VPN Client, VPN Client Linux and VPN Client MacOS. It has been classified as critical. Affected is an unknown function of the component IKEv2 Authentication. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2024-45750. It is possible to launch the attack remotely. There is no exploit available.
vuldb.com
CVE-2023-0636 | ABB ASPECT Enterprise command injection
11 months 1 week ago
A vulnerability, which was classified as critical, has been found in ABB ASPECT Enterprise. This issue affects some unknown processing. The manipulation leads to command injection.
The identification of this vulnerability is CVE-2023-0636. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com