A vulnerability, which was classified as problematic, has been found in Chiyu BF-630, BF-630W and BF-660C. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2015-2870. The attack may be launched remotely. There is no exploit available.
Election Day 2024 in the US saw a surge in cyber activity. Cloudflare blocked several DDoS attacks on political and election sites, ensuring no impact. In this post, we analyze these attacks, as well Internet traffic increases across the US and other key trends.
A vulnerability classified as critical was found in itsourcecode Farm Management System 1.0. Affected by this vulnerability is an unknown functionality of the file manage-breed.php. The manipulation of the argument breed leads to sql injection.
This vulnerability is known as CVE-2024-10738. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability has been found in code-projects E-Health Care System 1.0 and classified as critical. This vulnerability affects unknown code of the file /Users/registration.php. The manipulation of the argument f_name leads to sql injection.
This vulnerability was named CVE-2024-10741. The attack can be initiated remotely. Furthermore, there is an exploit available.
Other parameters might be affected as well.
A vulnerability was found in Project Worlds Life Insurance Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /editNominee.php. The manipulation of the argument nominee_id leads to sql injection.
This vulnerability was named CVE-2024-10735. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in code-projects E-Health Care System up to 1.0. This affects an unknown part of the file /Admin/consulting_detail.php. The manipulation of the argument consulting_id with the input 11%27%20union%20select%20group_concat(table_name),database(),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23%20from%20information_schema.tables%20where%20table_schema%20=%20database();--+ as part of String leads to sql injection.
This vulnerability is uniquely identified as CVE-2024-10740. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in code-projects E-Health Care System 1.0. Affected by this issue is some unknown functionality of the file /Admin/adminlogin.php. The manipulation of the argument email/admin_pswd as part of String leads to sql injection.
This vulnerability is handled as CVE-2024-10739. The attack may be launched remotely. Furthermore, there is an exploit available.
The initial researcher advisory only mentions the parameter "email" to be affected. But it must be assumed that parameter "admin_pswd" is affected as well.
A vulnerability was found in code-projects Wazifa System 1.0 and classified as critical. This issue affects some unknown processing of the file /controllers/control.php. The manipulation of the argument to leads to sql injection.
The identification of this vulnerability is CVE-2024-10742. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic has been found in TP-Link MR200 V4 210201. Affected is an unknown function of the file /cgi/login of the component Administration Panel. The manipulation of the argument sign/Action/LoginStatus leads to null pointer dereference.
This vulnerability is traded as CVE-2024-22733. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in LB-LINK BL-WR 1300H 1.0.4. It has been rated as problematic. This issue affects some unknown processing of the file /etc/shadow. The manipulation leads to hard-coded credentials.
The identification of this vulnerability is CVE-2024-51431. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, was found in WPChill Strong Testimonials Plugin up to 3.1.16 on WordPress. This affects an unknown part. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2024-47362. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in WPChill Htaccess File Editor Plugin up to 1.0.18 on WordPress. This issue affects some unknown processing. The manipulation leads to incorrect authorization.
The identification of this vulnerability is CVE-2024-49256. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Yealink Meeting Server 26.0.0.66 and classified as problematic. This issue affects some unknown processing. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2024-48353. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Yealink Meeting Server 26.0.0.66. It has been classified as problematic. Affected is an unknown function of the component Server Response Handler. The manipulation of the argument Enterprise ID leads to information disclosure.
This vulnerability is traded as CVE-2024-48352. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.