Aggregator
CVE-2019-6456 | GNU Recutils 1.8 rec-fex.c rec_fex_size null pointer dereference (Nessus ID 212065)
8 months 1 week ago
A vulnerability classified as problematic has been found in GNU Recutils 1.8. This affects the function rec_fex_size of the file rec-fex.c. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2019-6456. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2019-6457 | GNU Recutils 1.8 rec-aggregate.c rec_aggregate_reg_new resource management (Nessus ID 212065)
8 months 1 week ago
A vulnerability classified as problematic was found in GNU Recutils 1.8. This vulnerability affects the function rec_aggregate_reg_new of the file rec-aggregate.c. The manipulation leads to improper resource management.
This vulnerability was named CVE-2019-6457. The attack can be initiated remotely. There is no exploit available.
vuldb.com
CVE-2019-6458 | GNU Recutils 1.8 rec-buf.c rec_buf_new resource management (Nessus ID 212065)
8 months 1 week ago
A vulnerability, which was classified as problematic, has been found in GNU Recutils 1.8. This issue affects the function rec_buf_new of the file rec-buf.c. The manipulation leads to improper resource management.
The identification of this vulnerability is CVE-2019-6458. The attack may be initiated remotely. There is no exploit available.
vuldb.com
CVE-2019-6459 | GNU Recutils 1.8 rec-utils.c rec_extract_type resource management (Nessus ID 212065)
8 months 1 week ago
A vulnerability, which was classified as problematic, was found in GNU Recutils 1.8. Affected is the function rec_extract_type of the file rec-utils.c. The manipulation leads to improper resource management.
This vulnerability is traded as CVE-2019-6459. It is possible to launch the attack remotely. There is no exploit available.
vuldb.com
CVE-2019-6460 | GNU Recutils 1.8 rec-field.c rec_field_set_name null pointer dereference (Nessus ID 212065)
8 months 1 week ago
A vulnerability has been found in GNU Recutils 1.8 and classified as problematic. Affected by this vulnerability is the function rec_field_set_name of the file rec-field.c. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2019-6460. The attack can be launched remotely. There is no exploit available.
vuldb.com
CVE-2019-6455 | GNU Recutils 1.8 rec-mset.c rec_mset_elem_destroy double free (Nessus ID 212065)
8 months 1 week ago
A vulnerability was found in GNU Recutils 1.8. It has been rated as critical. Affected by this issue is the function rec_mset_elem_destroy of the file rec-mset.c. The manipulation leads to double free.
This vulnerability is handled as CVE-2019-6455. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2019-11638 | GNU Recutils 1.8 rec-field-name.c rec_field_name_equal_p out-of-bounds (Nessus ID 212065)
8 months 1 week ago
A vulnerability classified as problematic has been found in GNU Recutils 1.8. Affected is the function rec_field_name_equal_p of the file rec-field-name.c. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2019-11638. It is possible to launch the attack remotely. There is no exploit available.
vuldb.com
CVE-2019-11639 | GNU Recutils 1.8 rec-types.c rec_type_check_enum memory corruption (Nessus ID 212065)
8 months 1 week ago
A vulnerability classified as critical was found in GNU Recutils 1.8. Affected by this vulnerability is the function rec_type_check_enum of the file rec-types.c. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2019-11639. The attack can be launched remotely. There is no exploit available.
vuldb.com
CVE-2019-11640 | GNU Recutils 1.8 rec-fex.c rec_fex_parse_str_simple memory corruption (Nessus ID 212065)
8 months 1 week ago
A vulnerability, which was classified as critical, has been found in GNU Recutils 1.8. Affected by this issue is the function rec_fex_parse_str_simple of the file rec-fex.c. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2019-11640. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2019-11637 | GNU Recutils 1.8 rec-rset.c rec_rset_get_props out-of-bounds (Nessus ID 212065)
8 months 1 week ago
A vulnerability was found in GNU Recutils 1.8. It has been rated as problematic. This issue affects the function rec_rset_get_props of the file rec-rset.c. The manipulation leads to out-of-bounds read.
The identification of this vulnerability is CVE-2019-11637. The attack may be initiated remotely. There is no exploit available.
vuldb.com
CVE-2021-46019 | GNU Recutils 1.8.90 rec-db.c rec_db_destroy null pointer dereference (Nessus ID 212065)
8 months 1 week ago
A vulnerability was found in GNU Recutils 1.8.90 and classified as problematic. Affected by this issue is the function rec_db_destroy of the file rec-db.c. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2021-46019. The attack can only be initiated within the local network. There is no exploit available.
vuldb.com
CVE-2021-46021 | GNU Recutils 1.8.90 rec-record.c rec_record_destroy use after free (Nessus ID 212065)
8 months 1 week ago
A vulnerability was found in GNU Recutils 1.8.90. It has been classified as critical. This affects the function rec_record_destroy of the file rec-record.c. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2021-46021. The attack needs to be done within the local network. There is no exploit available.
vuldb.com
CVE-2021-46022 | GNU Recutils 1.8.90 rec-mset.c rec_mset_elem_destroy use after free (Nessus ID 212065)
8 months 1 week ago
A vulnerability was found in GNU Recutils 1.8.90. It has been declared as critical. This vulnerability affects the function rec_mset_elem_destroy of the file rec-mset.c. The manipulation leads to use after free.
This vulnerability was named CVE-2021-46022. The attack needs to be initiated within the local network. There is no exploit available.
vuldb.com
NCA Busts Russian Crypto Networks Laundering Funds and Evading Sanctions
8 months 1 week ago
The U.K. National Crime Agency (NCA) on Wednesday announced that it led an international investigation to disrupt Russian money laundering networks that were found to facilitate serious and organized crime across the U.K., the Middle East, Russia, and South America.
The effort, codenamed Operation Destabilise, has resulted in the arrest of 84 suspects linked to two Russian-speaking networks
The Hacker News
JVN: トレンドマイクロ製Deep Security Agent(Windows版)およびDeep Security NotifierにおけるOSコマンドインジェクションの脆弱性
8 months 1 week ago
トレンドマイクロ株式会社から、Deep Security Agent(Windows版)およびDeep Security Notifier向けのアップデートが公開されました。
От Терминатора до таблеток: дипфейки превращают кумиров в продавцов БАДов
8 months 1 week ago
Как мошенники используют знаменитостей для продажи сомнительных препаратов.
CVE-2000-0438 | SuSE Linux up to 7.0 fdmount mountpoint memory corruption (EDB-19952 / BID-1239)
8 months 1 week ago
A vulnerability classified as critical has been found in SuSE Linux up to 7.0. This affects an unknown part of the component fdmount. The manipulation of the argument mountpoint leads to memory corruption.
This vulnerability is uniquely identified as CVE-2000-0438. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
Preparing for Q-day: The essential role of cloud migration in securing enterprise data
8 months 1 week ago
As the era of quantum computing draws closer, businesses face a new and unprecedented threat to data security: “Q-day.” This looming turning point—when quantum machines can break traditional encryption with ease—has the potential to upend cybersecurity, rendering current encryption ineffective.
The post Preparing for Q-day: The essential role of cloud migration in securing enterprise data appeared first on Help Net Security.
Help Net Security
CVE-2006-6937 | Pensacola Web Designs Xtremeasp Photogallery 2.0 displaypic.asp sortorder sql injection (EDB-29063 / XFDB-30324)
8 months 1 week ago
A vulnerability, which was classified as critical, was found in Pensacola Web Designs Xtremeasp Photogallery 2.0. This affects an unknown part of the file displaypic.asp. The manipulation of the argument sortorder leads to sql injection.
This vulnerability is uniquely identified as CVE-2006-6937. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
vuldb.com