A vulnerability, which was classified as very critical, has been found in AuraCMS 2.2. Affected by this issue is some unknown functionality. The manipulation of the argument albums leads to sql injection.
This vulnerability is handled as CVE-2008-0735. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Prince Clan Chess Club up to 0.8 on Joomla. It has been declared as critical. This vulnerability affects unknown code of the file index.php. The manipulation of the argument user_id leads to sql injection.
This vulnerability was named CVE-2008-0761. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in Rapid Recipe up to 1.6.5 on Joomla. This affects an unknown part. The manipulation of the argument category_id leads to sql injection.
This vulnerability is uniquely identified as CVE-2008-0831. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function copy_from_user_mmap_sem. The manipulation leads to improper input validation.
This vulnerability is uniquely identified as CVE-2008-0010. Attacking locally is a requirement. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Phil Taylor Comments 0.5.8.5g. This issue affects some unknown processing. The manipulation of the argument id leads to sql injection.
The identification of this vulnerability is CVE-2008-0773. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Itechscripts iTechBids 6.0 and classified as critical. Affected by this issue is some unknown functionality of the file detail.php. The manipulation of the argument item_id leads to sql injection.
This vulnerability is handled as CVE-2008-0776. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as very critical, was found in Facebook PhotoUploader 4.5.57.0/5.0.14.0. Affected is an unknown function of the component ActiveX Control. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2008-5711. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Linux Kernel 2.6.23. This affects the function vmsplice_to_pipe. The manipulation leads to code injection.
This vulnerability is uniquely identified as CVE-2008-0600. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Pocketmags Pony Magazine and classified as critical. This issue affects some unknown processing of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
The identification of this vulnerability is CVE-2014-7740. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability classified as critical was found in Adobe Flash Player. Affected by this vulnerability is an unknown functionality. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2016-4163. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
In the most recent SiegeCast, Corey Overstreet, Senior Security Consultant at Red Siege, took cybersecurity professionals on a deep dive into modern malware techniques. With the landscape of malware evolving […]
A vulnerability was found in F5 BIG-IP up to 15.1.10.4/16.1.4/17.1.1.3. It has been declared as critical. This vulnerability affects unknown code of the component Monitor. The manipulation leads to missing authentication.
This vulnerability was named CVE-2024-45844. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace.
Joint U.S. and UK advisory identifies 24 vulnerabilities exploited by Russian state-sponsored APT 29, with GreyNoise detecting active probing on nine of these critical CVEs. Stay informed with real-time intelligence to prioritize patching and strengthen your organization's defenses against opportunistic cyber threats.