JPMorgan Chase Bank (Chase) will soon start blocking Zelle payments to social media contacts to combat a significant rise in online scams utilizing the service for fraud. [...]
A vulnerability was found in Microsoft Internet Explorer 9/10/11 and classified as critical. This issue affects some unknown processing. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2016-7202. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Edge. It has been classified as critical. Affected is an unknown function of the component Scripting Engine. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2016-7202. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, has been found in NewStatPress Plugin up to 0.9.8 on WordPress. This issue affects some unknown processing of the file includes/nsp_search.php. The manipulation of the argument where1 leads to cross site scripting.
The identification of this vulnerability is CVE-2015-4063. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
Surge in Attack Attempts Spotted After Palo Alto Networks Details and Patches Flaw Attackers have stepped up efforts to exploit a vulnerability in the software that runs Palo Alto Networks firewall appliances that could give them direct access to the underlying software. Unauthenticated hackers could use PHP scripts to bypass the PAN-OS management web interface.
A vulnerability was found in Symphony CMS up to 2.3.1 and classified as problematic. This issue affects some unknown processing. The manipulation of the argument sort leads to cross-site request forgery.
The identification of this vulnerability is CVE-2013-7346. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple iOS up to 10.2. It has been rated as critical. Affected by this issue is some unknown functionality of the component WebKit. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2017-2468. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
Currently trending CVE - hypeScore: 1 - Vitest is a testing framework powered by Vite. The `__screenshot-error` handler on the browser mode HTTP server that responds any file on the file system. Especially if the server is exposed on the network by `browser.api.host: true`, an attacker can send a request to that handle
Currently trending CVE - hypeScore: 1 - The Brizy – Page Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'storeUploads' function in all versions up to, and including, 2.6.4. This makes it possible for authenticated attackers, with Contributor-level access
Currently trending CVE - hypeScore: 1 - An incorrect privilege assignment vulnerability [CWE-266] in Fortinet FortiOS version 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.9 and before 7.0.15 allows an authenticated admin whose access profile has the Security Fabric permission to escalate their privileges to super-admi
A vulnerability, which was classified as problematic, was found in Felix Moira Poll Builder Plugin up to 1.3.5 on WordPress. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-54276. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in Wibergs Web CSV to HTML Plugin up to 3.04 on WordPress and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-54275. The attack can be initiated remotely. There is no exploit available.