The RealHome theme and the Easy Real Estate plugins for WordPress are vulnerable to two critical severity flaws that allow unauthenticated users to gain administrative privileges. [...]
A vulnerability, which was classified as problematic, was found in Alexandre Dubus AudiStat 1.3. This affects an unknown part of the file index.php. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2010-1052. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in SAP NetWeaver AS JAVA 7.5 and classified as critical. Affected by this issue is some unknown functionality of the file sap.com~tc~bpem~him~uwlconn~provider~web/bpemuwlconn of the component BC-BMT-BPM-DSK. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2016-9563. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Aruba EdgeConnect Enterprise and classified as problematic. This issue affects some unknown processing of the component Command Line Interface. The manipulation leads to path traversal.
The identification of this vulnerability is CVE-2023-30508. Access to the local network is required for this attack. There is no exploit available.
A vulnerability was found in Xen on AMD. It has been rated as problematic. Affected by this issue is some unknown functionality of the component SSBD Handler. The manipulation leads to integer overflow.
This vulnerability is handled as CVE-2022-42336. The attack can only be done within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Algoo Tracim up to 4.4.1 and classified as problematic. This vulnerability affects unknown code of the component HTML File Upload Handler. The manipulation leads to HTML injection.
This vulnerability was named CVE-2022-45144. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in pcs on Red Hat and classified as problematic. This vulnerability affects unknown code. The manipulation leads to Privilege Escalation.
This vulnerability was named CVE-2023-2319. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Piwigo 13.5.0. It has been declared as critical. This vulnerability affects unknown code of the file user_list_backend.php. The manipulation of the argument order[0][dir] leads to sql injection.
This vulnerability was named CVE-2023-27233. Access to the local network is required for this attack. There is no exploit available.
A vulnerability classified as critical was found in Belkin Smart Outlet V2 2.00.11420.OWRT.PVT_SNSV2. Affected by this vulnerability is the function ChangeFriendlyName of the component UPNP Handler. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2023-27217. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in Umbraco CMS 7.12.4 and classified as problematic. This issue affects the function xsltSelection of the file developer/Xslt/xsltVisualize.aspx. The manipulation leads to xml injection.
The identification of this vulnerability is CVE-2019-25137. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Apple tvOS up to 12.3. It has been declared as critical. This vulnerability affects unknown code of the component Quick Look. The manipulation leads to use after free.
This vulnerability was named CVE-2019-8662. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Sun Solaris 8.0/9.0. It has been rated as critical. Affected by this issue is some unknown functionality in the library nss_ldap.so.1 of the component LDAP Handler. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2003-1055. The attack needs to be approached locally. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
The rush to say "yes" allows cybersecurity teams to avoid hard conversations with business stakeholders but also risks losing their ability to effectively protect organizations.
The new administration moved quickly to remove any constraints on AI development and collected $500 billion in investment pledges for an American-owned AI joint venture.
Trend Micro’s Zero Day Initiative (ZDI) announced that $380K was awarded on Day 1 of Pwn2Own Automotive 2025. Trend Micro’s Zero Day Initiative (ZDI) announced that over $380,000 was awarded on Day 1 of Pwn2Own Automotive 2025, a hacking contest that was held in Tokyo. In total, the organizers awarded $382,750 for 16 unique working […]