A vulnerability classified as critical was found in Squirrelmail Gpg Plugin up to 2.1. This vulnerability affects the function gpg_recv_key. The manipulation of the argument keyserver leads to improper privilege management.
This vulnerability was named CVE-2005-1924. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Google Cloud Storage XML API and Cloud Console Private API Service. This affects an unknown part of the component Audit Log Handler. The manipulation leads to insufficient logging.
It is possible to initiate the attack remotely. There is no exploit available.
The real existence of this vulnerability is still doubted at the moment.
This product is a managed service. This means that users are not able to maintain vulnerability countermeasures themselves.
A vulnerability classified as critical was found in Google Cloud Composer. Affected by this vulnerability is an unknown functionality of the component GCP Service. The manipulation leads to injection.
The attack can be launched remotely. There is no exploit available.
This product is available as a managed service. Users are not able to maintain vulnerability countermeasures themselves.
Phishing attacks are becoming more advanced and harder to detect, but there are still telltale signs that can help you spot them before it's too late. See these key indicators that security experts use to identify phishing links:1. Check Suspicious URLs
Phishing URLs are often long, confusing, or filled with random characters. Attackers use these to disguise the link's true destination
A vulnerability has been found in TeamViewer Remote Full Client and Remote Host on Windows and classified as critical. Affected by this vulnerability is an unknown functionality of the file TeamViewer_service.exe of the component Printer Driver Installation. The manipulation leads to improper verification of cryptographic signature.
This vulnerability is known as CVE-2024-7481. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in TeamViewer Remote Full Client and Remote Host on Windows. Affected is an unknown function of the file TeamViewer_service.exe of the component VPN Driver Installation. The manipulation leads to improper verification of cryptographic signature.
This vulnerability is traded as CVE-2024-7479. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Hitachi Energy RTU500 up to 13.3.1. This vulnerability affects unknown code of the component HCI Modbus TCP. The manipulation leads to stack-based buffer overflow.
This vulnerability was named CVE-2022-2081. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in SeaCMS 12.9 and classified as problematic. This vulnerability affects unknown code of the file admin_notify.php. The manipulation leads to Privilege Escalation.
This vulnerability was named CVE-2023-44169. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in SeaCMS 12.9 and classified as problematic. This issue affects some unknown processing of the file admin_ping.php. The manipulation leads to Privilege Escalation.
The identification of this vulnerability is CVE-2023-44170. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in SeaCMS 12.9. It has been classified as problematic. Affected is an unknown function of the file admin_smtp.php. The manipulation leads to Privilege Escalation.
This vulnerability is traded as CVE-2023-44171. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in SeaCMS 12.9. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file admin_weixin.php. The manipulation leads to Privilege Escalation.
This vulnerability is known as CVE-2023-44172. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01 and classified as critical. This issue affects the function setSchedWifi. The manipulation of the argument schedEndTime leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2023-44015. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been classified as critical. Affected is the function addWifiMacFilter. The manipulation of the argument deviceId leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2023-44016. The attack can only be done within the local network. There is no exploit available.