Security Leadership in Focus - From AI Risks to Cloud Responsibility AI fragmentation, non-human identities and nation-state threats dominated conversations at the Gartner Security & Risk Management Summit. ISMG editors discuss how the event stood out for its vendor-neutral focus and strategic discussions tailored for senior security decision-makers.
A vulnerability was found in Onestopjoomla Com Tupinambis 1.0. It has been classified as critical. This affects an unknown part of the file index.php. The manipulation of the argument proyecto leads to sql injection.
This vulnerability is uniquely identified as CVE-2009-3434. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Jeppesen JetPlanner Pro 1.6.2.20. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-57529. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Telex Remote Dispatch Console Server. It has been classified as very critical. Affected is an unknown function. The manipulation leads to code injection.
This vulnerability is traded as CVE-2025-29902. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in RTS VLink Virtual Matrix Software. It has been declared as very critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to code injection.
This vulnerability is known as CVE-2025-29902. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in nobossextensions No Boss Calendar Component up to 5.0.6 on Joomla. This affects an unknown part. The manipulation of the argument id_module leads to sql injection.
This vulnerability is uniquely identified as CVE-2025-49468. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Auto Attachments Plugin up to 1.8.5 on WordPress. Affected is an unknown function of the component Setting Handler. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-6012. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Ricoh Streamline NX V3 PC Client up to 3.7.0. Affected by this issue is some unknown functionality. The manipulation leads to use of less trusted source.
This vulnerability is handled as CVE-2025-48825. Local access is required to approach this attack. There is no exploit available.