A vulnerability, which was classified as critical, has been found in Grouperahal Karim Rahal Essoulami 1. This issue affects some unknown processing of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
The identification of this vulnerability is CVE-2014-6978. The attack can only be initiated within the local network. There is no exploit available.
Cybersecurity researchers have discovered a new version of an Android banking trojan called Octo that comes with improved capabilities to conduct device takeover (DTO) and perform fraudulent transactions.
The new version has been codenamed Octo2 by the malware author, Dutch security firm ThreatFabric said in a report shared with The Hacker News, adding campaigns distributing the malware have
A vulnerability, which was classified as critical, has been found in Inforest Communications SuperCali 0.4.0. Affected by this issue is some unknown functionality of the file index.php. The manipulation of the argument o leads to sql injection.
This vulnerability is handled as CVE-2007-3582. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in chattanoogastate eLearn 1.0.649.1194. This vulnerability affects unknown code of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability was named CVE-2014-6977. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in MongoDB. It has been classified as problematic. This affects an unknown part of the file .dbshell of the component Client. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2016-6494. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
The latest version of the evolving threat is a multistage attack demonstrating a move away from ransomware to purely espionage activities, typically targeting Ukraine and its supporters.
A vulnerability classified as problematic has been found in IBM Algorithmics. This affects an unknown part. The manipulation of the argument STYLESHEET leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2014-0870. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Olgu Computer Systems e-Belediye. It has been classified as very critical. Affected is an unknown function. The manipulation leads to file inclusion.
This vulnerability is traded as CVE-2024-9142. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in VBZooM 1.11. It has been classified as critical. Affected is an unknown function of the file forum.php. The manipulation of the argument MainID leads to sql injection.
This vulnerability is traded as CVE-2006-3142. It is possible to launch the attack remotely. Furthermore, there is an exploit available.