Currently trending CVE - Hype Score: 1 - VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
Currently trending CVE - Hype Score: 1 - VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.
Currently trending CVE - Hype Score: 1 - In the Linux kernel, the following vulnerability has been resolved:
HID: core: zero-initialize the report buffer
Since the report buffer is used by all kinds of drivers in various ways, let's
zero-initialize it during allocation to make sure that it can't be ever used
to leak ...
Currently trending CVE - Hype Score: 1 - In shouldHideDocument of ExternalStorageProvider.java, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution ...
A vulnerability classified as critical has been found in Ciamos CMS 0.9/0.9.2/0.9.5. This affects an unknown part of the file modules/pms/index.php. The manipulation of the argument module_path leads to code injection.
This vulnerability is uniquely identified as CVE-2009-4156. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Magic Hills Wonderplugin Audio Player and classified as problematic. Affected by this issue is the function wp_ajax_save_item of the file wonderpluginaudio.php. The manipulation of the argument itemid leads to cross site scripting.
This vulnerability is handled as CVE-2015-2218. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple tvOS up to 10.1. It has been rated as critical. This issue affects some unknown processing of the component WebKit. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2017-2469. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Liberologico DBSite 1.0. This vulnerability affects unknown code of the file index.php. The manipulation of the argument ID leads to sql injection.
This vulnerability was named CVE-2010-4809. The attack can be initiated remotely. Furthermore, there is an exploit available.
Qilin Ransomware group claims to have breached the Ministry of Foreign Affairs of Ukraine, marking a significant cybersecurity attack. The Russian-speaking Qilin Ransomware group claims responsibility for an attack on the Ministry of Foreign Affairs of Ukraine. The group stated that it stole sensitive data such as private correspondence, personal information, and official decrees. The […]
A vulnerability, which was classified as critical, has been found in chCounter 3.1.3. Affected by this issue is some unknown functionality of the component Administration. The manipulation of the argument login_name leads to sql injection.
This vulnerability is handled as CVE-2009-1362. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in 10Web Form Maker up to 1.15.22 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2024-2112. The attack can be launched remotely. There is no exploit available.