A vulnerability, which was classified as critical, was found in Brother Industries/FUJIFILM Business Innovation/RICOH/Toshiba Tec Printer. Affected is an unknown function of the component Web Services Feature. The manipulation of the argument JobToken leads to improper validation of syntactic correctness of input.
This vulnerability is traded as CVE-2024-51983. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Brother Industries/Toshiba Tec Printer. This issue affects some unknown processing of the component HTTP/HTTPS/IPP. The manipulation leads to use of weak credentials.
The identification of this vulnerability is CVE-2024-51978. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Microsoft Windows XP. It has been rated as critical. Affected by this issue is some unknown functionality of the file uplddrvinfo.htm of the component Help/Support Center. The manipulation leads to denial of service (File).
This vulnerability is handled as CVE-2002-0974. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
在使用生成式 AI 制作科学家肖像引发争议之后,《侏罗纪世界:进化 3》开发商 Frontier 证实它已经放弃使用该功能。《侏罗纪世界:进化 3》预计于 10 月 21 日登陆 PC、PS5 和 Xbox Series X/S 平台。Steam 的新政策要求游戏开发商披露是否使用 AI,而在 Frontier 披露使用生成式 AI 之后,玩家的批评迫使它做出回应,表示听取了玩家们的反馈,移除了生成式 AI 刻画科学家肖像的功能。
A vulnerability classified as critical has been found in Realink C-Arbre 0.6 Pr7. Affected is an unknown function of the file richtxt_functions.inc.php. The manipulation of the argument root_path leads to file inclusion.
This vulnerability is traded as CVE-2007-1721. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
Cybersecurity researchers devised two attack techniques to disrupt the operations of cryptocurrency mining botnets. Akamai Researchers uncovered two novel techniques to disrupt cryptocurrency mining botnets by exploiting flaws in common mining topologies. Current methods to stop cryptocurrecy mining botnets are pool bans or infrastructure takedowns, however, both are slow and complex. Researchers developed two faster techniques exploiting […]
A vulnerability has been found in Oracle Financial Services Liquidity Risk Management 8.0.1/8.0.2/8.0.4/8.0.5/8.0.6 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Apache Commons FileUpload. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2019-11358. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in php-parser 3.2.1. It has been classified as problematic. This affects the function lib.combine. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution').
This vulnerability is uniquely identified as CVE-2024-57071. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in xe-utils 3.5.31. It has been rated as problematic. Affected by this issue is the function lib.merge. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution').
This vulnerability is handled as CVE-2024-57074. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability classified as problematic has been found in eazy-logger 4.0.1. This affects the function lib.Logger. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution').
This vulnerability is uniquely identified as CVE-2024-57075. The attack can only be done within the local network. There is no exploit available.
A vulnerability classified as problematic was found in ajax-request 1.2.3. This vulnerability affects the function lib.post. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution').
This vulnerability was named CVE-2024-57076. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in expand-object 0.4.2. Affected by this issue is the function lib. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution').
This vulnerability is handled as CVE-2024-57069. Access to the local network is required for this attack. There is no exploit available.
A vulnerability was found in module-from-string 3.3.1 and classified as problematic. This issue affects the function lib.requireFromString. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution').
The identification of this vulnerability is CVE-2024-57072. The attack can only be done within the local network. There is no exploit available.