A vulnerability classified as critical has been found in Zoho WebNMS Framework 5.2/5.2 SP1. Affected is an unknown function of the file WEB-INF/conf/securitydbData.xml of the component Password Storage. The manipulation leads to risky cryptographic algorithm (Password).
This vulnerability is traded as CVE-2016-6602. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in forfone Free Calls and Messages 1.5.11. Affected by this issue is some unknown functionality of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is handled as CVE-2014-5840. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability classified as critical was found in labanquepostale Acces Compte 3.2.6. Affected by this vulnerability is an unknown functionality of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is known as CVE-2014-5839. The attack needs to be done within the local network. There is no exploit available.
A vulnerability classified as critical has been found in SGI IRIX 6.4. Affected is an unknown function of the file ioconfig. The manipulation leads to Local Privilege Escalation.
This vulnerability is traded as CVE-1999-0314. An attack has to be approached locally. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
CISA 'Committing More Resources Than Ever Before' to Election Infrastructure The Cybersecurity and Infrastructure Security Agency told Information Security Media Group it is in the process of carrying out its most expansive national effort to secure election infrastructure across the country ahead of the upcoming November election.
Supreme Court Panel Upholds Ban, After X Failed to Appoint a Legal Representative Brazil has begun blocking domestic access to social platform X - including criminalizing access by Brazilians who might use a VPN - after the company failed to comply with court orders tied to combating disinformation campaigns, and a law requiring it has a legal representative in the country.
Cryptocurrency Users Targeted in Latest Campaign Involving FudModule Rootkit A hacking group tied to North Korea exploited a zero-day vulnerability in the open source Google Chromium web browser to try and steal cryptocurrency, Microsoft said. The attack campaign is the latest to involve a sophisticated North Korean rootkit called FudModule. Google has fixed the flaw.
A vulnerability was found in Geutebrueck re_porter 16 up to 7.8. It has been classified as problematic. Affected is an unknown function of the file /statistics/gscsetup.xml of the component Service Port 12003. The manipulation leads to information disclosure (Username).
This vulnerability is traded as CVE-2018-15534. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.