A vulnerability was found in E-Xoopport Samsara 3.0/3.1. It has been classified as critical. This affects an unknown part of the file modules/sections/index.php. The manipulation of the argument secid leads to sql injection.
This vulnerability is uniquely identified as CVE-2010-3467. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in FFmpeg and classified as critical. Affected by this issue is the function showwaves_filter_frame of the file libavfilter/avf_showwaves.c. The manipulation leads to buffer overflow.
This vulnerability is handled as CVE-2023-51797. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in FFmpeg and classified as critical. Affected by this vulnerability is the function image_copy_plane of the file libavutil/imgutils.c. The manipulation leads to buffer overflow.
This vulnerability is known as CVE-2023-51793. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in FFmpeg. It has been classified as critical. This affects the function areverse_request_frame of the file libavfilter/f_reverse.c. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2023-51796. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as problematic was found in CmSimple 5.15. This vulnerability affects unknown code of the file functions.php. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-32392. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in MacCMS 10 v.2024.1000.3000 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-32391. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in hCaptcha Plugin up to 4.0.0 on WordPress. Affected by this issue is some unknown functionality of the component cf7-hcaptcha Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-4014. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in GStreamer. It has been rated as critical. This issue affects some unknown processing of the component AV1 Video Parser. The manipulation leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2023-50186. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as problematic was found in Thimo Grauerholz WP-Spreadplugin up to 3.8.6.1 on WordPress. This vulnerability affects unknown code of the file spreadplugin.php. The manipulation of the argument Spreadplugin leads to cross site scripting.
This vulnerability was named CVE-2015-10132. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Icon Widget Plugin up to 1.3.0 on WordPress and classified as problematic. This vulnerability affects unknown code of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-1993. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in bdthemes Prime Slider Plugin up to 3.14.0 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation of the argument Link leads to cross site scripting.
This vulnerability is traded as CVE-2024-1730. It is possible to launch the attack remotely. There is no exploit available.
Het kabinet presenteert een nieuwe strategie om de Nederlandse defensie een impuls te geven. Dat is nodig vanwege de groeiende veiligheidsdreigingen in Europa. De strategie richt zich op het versterken van de defensie-industrie en een toekomstbestendige krijgsmacht. Dat melden minister Ruben Brekelmans en staatssecretaris Gijs Tuinman van Defensie vandaag aan de Tweede Kamer.
A vulnerability has been found in Apple watchOS up to 5.2.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the component WebKit. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2019-8689. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in 3com 3Cdaemon 2.0. It has been classified as critical. This affects an unknown part of the component FTP Server. The manipulation of the argument Login leads to memory corruption.
This vulnerability is uniquely identified as CVE-2002-0606. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
Shifting to a RaaS business model has accelerated the group's growth, and targeting critical industries like healthcare, legal, and manufacturing hasn't hurt either.