A vulnerability, which was classified as critical, was found in Alex Heiphetz Group EZShopper 2.0/3.0. Affected is an unknown function of the file loadpage.cgi. The manipulation of the argument file with the input /<filename> leads to improper privilege management.
This vulnerability is traded as CVE-2000-1092. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Sun Solaris 5.10. It has been declared as very critical. Affected by this vulnerability is an unknown functionality of the file rpc.cmsd of the component CDE Calendar Manager Service Daemon. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2010-4435. The attack can be launched remotely. Furthermore, there is an exploit available.
European Space Agency's official web shop was hacked as it started to load a piece of JavaScript code that generates a fake Stripe payment page at checkout. [...]
Washington and Nevada were among states enacting new data privacy laws in 2024, and that trend among states will likely continue into 2025 as the next presidential administration comes into office promising to reduce federal regulations, said attorney Melissa Crespo of law firm Morrison Foerster.
Blackpoint Cyber CEO Jon Murchison on MSP Cloud Identity Risks With a 30-to-1 ratio of cloud to on-premises attacks, Blackpoint Cyber CEO Jon Murchison stresses the importance of enhanced identity detection and AI-driven solutions. He also outlines strategic moves for managed service providers to align with Microsoft’s ecosystem.
Cybercriminals Say They Hacked 66 Companies The Clop cybercriminal group is threatening to make public the companies swept up by its mass hacking of managed file-transfer software built by Cleo Communications. In a Dec. 24 update to its dark web leak site, Clop asserted it has "data of many companies who use Cleo."
New Framework in o3 Models Aims to Better Align With Human Safety Values OpenAI says its latest o3 series is the most advanced and safest of its "reasoning" AI models yet. The company says the new models take a fresh approach to safety via the deliberative alignment framework, rely more on synthetic data and outperform peers in resisting jailbreaking efforts.
A vulnerability was found in WP Data Access Plugin up to 5.5.22 on WordPress. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection.
This vulnerability is known as CVE-2024-12428. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Amazon Redshift JDBC Driver 2.1.0.31 and classified as critical. This issue affects the function getSchemas/getTables/getColumns of the component Metadata API. The manipulation leads to sql injection.
The identification of this vulnerability is CVE-2024-12744. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Amazon Redshift Python Connector 2.1.4 and classified as critical. This vulnerability affects the function get_schemas/get_tables/get_columns of the component Metadata API. The manipulation leads to sql injection.
This vulnerability was named CVE-2024-12745. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Amazon Redshift ODBC Driver 2.1.5.0. This affects an unknown part of the component Metadata API. The manipulation leads to sql injection.
This vulnerability is uniquely identified as CVE-2024-12746. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Intelbras VIP S3020 G2, VIP S4020 G2, VIP S4020 G3 and VIP S4320 G2 up to 20241222 and classified as problematic. Affected by this issue is some unknown functionality of the file /web_caps/webCapsConfig of the component Web Interface. The manipulation leads to information disclosure. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is handled as CVE-2024-12896. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor assesses that "the information disclosed in the URL is not sensitive or poses any risk to the user".
It is recommended to apply restrictive firewalling.
The vendor assesses that "the information disclosed in the URL is not sensitive or poses any risk to the user".
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.4.133/5.10.51/5.12.18/5.13.3. Affected is the function fb_delete_videomode in the library lib/dump_stack.c. The manipulation leads to use after free.
This vulnerability is traded as CVE-2021-47338. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.