A vulnerability classified as critical was found in Adobe Acrobat Reader up to 11.0.17/15.006.30201/15.017.20053. Affected by this vulnerability is an unknown functionality. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2016-7002. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Adobe Acrobat Reader up to 11.0.17/15.006.30201/15.017.20053. Affected is an unknown function. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2016-7001. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
Boston Children's Health Physicians Says Incident Involved Unnamed IT Vendor Ransomware gang BianLian has listed Boston Children's Health Physicians - a pediatric group that practices in New York and Connecticut - on its dark web site, threatening to release stolen patient and employee data. The practice said the September incident involved an IT vendor.
Phishing Emails Impersonating Eset Target Cybersecurity Professionals With Malware Cybercriminals posing as a top security firm in Israel have launched wiper attacks on local cybersecurity professionals after bypassing significant security measures, according to recent reports. Cybersecurity firm Eset said threat actors did not compromise its systems.
Report Reveals North Korean Workers Expanding Into Intellectual Property Theft North Korean threat actors posing as remote information technology workers are increasingly extorting ransom from Western companies after securing jobs under false pretenses, according to a new report from Secureworks' counter threat unit.
Company Shifts Cyber Focus to QNX and Secure Communications as Key Growth Drivers As Cylance continues to incur significant losses, BlackBerry is reallocating resources toward its more promising QNX and secure communications teams. The company expects its cybersecurity unit to stabilize and become profitable by the end of the fiscal year, thanks to strategic bets and cost cuts.
A vulnerability was found in Moxa MXsecurity up to 1.1.0. It has been classified as critical. Affected is an unknown function. The manipulation leads to hard-coded credentials.
This vulnerability is traded as CVE-2024-4740. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Time Clock Plugin and Time Clock Pro Plugin on WordPress. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to improper authentication.
The identification of this vulnerability is CVE-2024-9593. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. It has been classified as problematic. Affected is an unknown function of the file /InnerRepPlus.html of the component Operator Details Form. The manipulation leads to missing password field masking.
This vulnerability is traded as CVE-2024-10122. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Koobi CMS up to 4.3.0 and classified as critical. Affected by this issue is some unknown functionality of the file index.php. The manipulation of the argument categ leads to sql injection.
This vulnerability is handled as CVE-2008-1336. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Maxdev My Egallery. Affected is an unknown function of the file modules.php. The manipulation of the argument gid leads to sql injection.
This vulnerability is traded as CVE-2008-7038. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic was found in Centreon up to 1.4.2.3. This vulnerability affects unknown code. The manipulation of the argument img leads to path traversal.
This vulnerability was named CVE-2008-1119. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.