A vulnerability, which was classified as problematic, was found in IBM Algorithmics. Affected is an unknown function. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2014-0894. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Myanmar Housing : mmHome 1.3. This affects an unknown part of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is uniquely identified as CVE-2014-6927. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in Infinite Automation Mango Automation. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2015-6494. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in paperton Allt om Brollop 1.53. Affected by this issue is some unknown functionality of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is handled as CVE-2014-6926. The attack can only be initiated within the local network. There is no exploit available.
Google is testing a new API that uses machine learning models to offer real-time language translation for inputted text and to make it easier to translate web pages. [...]
A vulnerability classified as critical was found in Gcspublishing Steyr Forum 3.9.12. Affected by this vulnerability is an unknown functionality of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is known as CVE-2014-6925. The attack can only be done within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Tenda D152. Affected by this issue is some unknown functionality of the component SSID Handler. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2018-14497. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in F5 BIG-IP 10.2.1 and classified as problematic. Affected by this issue is some unknown functionality of the file properties.jsp of the component HTTP POST Request Handler. The manipulation of the argument name leads to path traversal.
This vulnerability is handled as CVE-2014-8727. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple macOS up to 10.12.1. It has been rated as critical. This issue affects some unknown processing of the component Power Management. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2016-7661. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Protect Your Crypto: Understanding the Ongoing Global Malware Attacks and What We Are Doing to Stop Them CISA warns of Windows flaw used in infostealer malware attacks Exotic SambaSpy is now dancing with Italian users Loki: […]
A vulnerability, which was classified as critical, was found in Yealink Voip Phone 28.72.0.2. Affected is an unknown function of the component Firmware. The manipulation of the argument model leads to crlf injection.
This vulnerability is traded as CVE-2014-3427. It is possible to launch the attack remotely. Furthermore, there is an exploit available.