Cybersecurity researchers have discovered a software supply chain attack that has remained active for over a year on the npm package registry by starting off as an innocuous library and later adding malicious code to steal sensitive data and mine cryptocurrency on infected systems.
The package, named @0xengine/xmlrpc, was originally published on October 2, 2023 as a JavaScript-based XML-RPC
A vulnerability, which was classified as very critical, has been found in Trend Micro ServerProtect 5.7/5.58. Affected by this issue is some unknown functionality. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2008-0012. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as very critical, was found in Trend Micro ServerProtect 5.7/5.58. This affects an unknown part. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2008-0013. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in Trend Micro ServerProtect 5.7/5.58 and classified as very critical. This vulnerability affects unknown code. The manipulation leads to memory corruption.
This vulnerability was named CVE-2008-0014. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in SourceFire ClamAV 0.91. Affected is an unknown function. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2007-6336. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Learn2 STRunner. This affects an unknown part in the library iestm32.dll of the component ActiveX Control. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2007-6252. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Adobe Form Client 5.0. It has been classified as very critical. Affected is an unknown function in the library filedlg.dll of the component ActiveX Control. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2007-6253. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as very critical was found in SAP Business Objects up to 6.4. This vulnerability affects unknown code in the library rptviewerax.dll of the component ActiveX Control. The manipulation leads to memory corruption.
This vulnerability was named CVE-2007-6254. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.