Multiple cybersecurity incident response firms are warning about the possibility that a zero-day vulnerability in some SonicWall devices is allowing ransomware attacks.
A vulnerability was found in Synology Surveillance Station. It has been rated as critical. Affected by this issue is the function SnapShot.CountByCategory of the component WebAPI. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2024-29230. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Synology Surveillance Station. This affects the function UserPrivilege.Enum of the component WebAPI. The manipulation leads to improper validation of array index.
This vulnerability is uniquely identified as CVE-2024-29231. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Synology Surveillance Station. This vulnerability affects the function Alert.Enum of the component WebAPI. The manipulation leads to sql injection.
This vulnerability was named CVE-2024-29232. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Synology Surveillance Station. This issue affects the function Emap.Delete of the component WebAPI. The manipulation leads to sql injection.
The identification of this vulnerability is CVE-2024-29233. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Synology Surveillance Station. Affected is the function Group.Save of the component WebAPI. The manipulation leads to sql injection.
This vulnerability is traded as CVE-2024-29234. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Synology Surveillance Station and classified as critical. Affected by this vulnerability is the function IOModule.EnumLog of the component WebAPI. The manipulation leads to sql injection.
This vulnerability is known as CVE-2024-29235. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Synology Surveillance Station. It has been rated as critical. This issue affects the function AudioPattern.Delete of the component WebAPI. The manipulation leads to sql injection.
The identification of this vulnerability is CVE-2024-29236. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Synology Surveillance Station. Affected is the function ActionRule.Delete of the component WebAPI. The manipulation leads to sql injection.
This vulnerability is traded as CVE-2024-29237. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Synology Surveillance Station and classified as critical. Affected by this issue is the function Layout.LayoutSave of the component WebAPI. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2024-29227. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in File::Temp on Perl. It has been rated as critical. This issue affects the function _is_safe. The manipulation leads to link following.
The identification of this vulnerability is CVE-2011-4116. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Supermalink Plugin up to 1.1 on WordPress and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-49433. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Download Counter Plugin up to 1.3 on WordPress. This affects an unknown part. The manipulation of the argument Name leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-8294. It is possible to initiate the attack remotely. There is no exploit available.
Not only are attacks against macOS users ramping up, but threat actors have proved to be advanced with deepfake technology. Security awareness training may be the best defense.
A vulnerability, which was classified as problematic, has been found in Employee Directory Plugin up to 4.5.1 on WordPress. Affected by this issue is some unknown functionality. The manipulation of the argument noaccess_msg leads to cross site scripting.
This vulnerability is handled as CVE-2025-8295. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in Campus Directory Plugin up to 1.9.1 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation of the argument noaccess_msg leads to cross site scripting.
This vulnerability is known as CVE-2025-8313. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in WP Easy Contact Plugin up to 4.0.1 on WordPress. Affected is an unknown function. The manipulation of the argument noaccess_msg leads to cross site scripting.
This vulnerability is traded as CVE-2025-8315. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Simple File List Plugin up to 6.1.14 on WordPress. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to path traversal.
The identification of this vulnerability is CVE-2025-54021. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Druco Plugin up to 1.5.2 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-54055. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Advanced Google Universal Analytics Plugin up to 1.0.3 on WordPress. It has been classified as problematic. This affects an unknown part. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2025-28962. It is possible to initiate the attack remotely. There is no exploit available.