A vulnerability classified as critical was found in Adobe Acrobat Reader up to 11.0.18/15.006.30244/15.020.20042. Affected by this vulnerability is an unknown functionality of the component Image Conversion Engine. The manipulation as part of TIFF File leads to memory corruption.
This vulnerability is known as CVE-2017-2966. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A new ransomware-as-a-service (RaaS) operation named Cicada3301 has already listed 19 victims on its extortion portal, as it quickly attacked companies worldwide. [...]
A new ransomware-as-a-service (RaaS) operation named Cicada3301 has already listed 19 victims on its extortion portal, as it quickly attacked companies worldwide. [...]
A vulnerability was found in Nonghyup Smart Calculator 2.0. It has been declared as critical. This vulnerability affects unknown code of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability was named CVE-2014-5798. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability classified as critical has been found in Adobe Acrobat Reader up to 11.0.18/15.006.30244/15.020.20042. Affected is an unknown function of the component Image Conversion Engine. The manipulation as part of TIFF File leads to memory corruption.
This vulnerability is traded as CVE-2017-2965. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Grocy up to 4.2.0. This vulnerability affects unknown code of the file /api/files/recipepictures/ of the component SVG File Upload Handler. The manipulation of the argument force_serve_as with the input picture' leads to cross site scripting.
This vulnerability was named CVE-2024-8370. The attack can be initiated remotely. Furthermore, there is an exploit available.
The real existence of this vulnerability is still doubted at the moment. The project maintainer explains that "this is 'nonsense' and practically irrelevant according to the project's security policy" which expects additional authentication for the software.
A vulnerability, which was classified as problematic, was found in EMC Watch4Net up to 6.4. Affected is an unknown function. The manipulation leads to path traversal.
This vulnerability is traded as CVE-2015-0516. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in techjewel Contact Form Plugin Plugin up to 5.1.18 on WordPress. This affects the function verifyRequest of the component MailChimp API Key Handler. The manipulation leads to improper authorization.
This vulnerability is uniquely identified as CVE-2024-5053. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Adobe Acrobat Reader up to 11.0.18/15.006.30244/15.020.20042. It has been rated as critical. This issue affects some unknown processing of the component Image Conversion Engine. The manipulation as part of JPEG Image leads to memory corruption.
The identification of this vulnerability is CVE-2017-2964. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Kaqoo Auction Software. Affected is an unknown function of the file include/display/search.inc.php. The manipulation of the argument install_root leads to improper privilege management.
This vulnerability is traded as CVE-2007-1790. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
A vulnerability was found in Kaqoo Auction Software. It has been rated as critical. This issue affects some unknown processing of the file include/display/item/item_info.inc.php. The manipulation of the argument install_root leads to improper privilege management.
The identification of this vulnerability is CVE-2007-1790. Attacking locally is a requirement. Furthermore, there is an exploit available.
A vulnerability in an air transport security system allowed unauthorized individuals to bypass airport security screenings. The Known Crewmember (KCM) and Cockpit Access Security System (CASS) programs are two transport security systems that pilots, flight attendants, and other airline employees to bypass traditional airport security checks and access cockpit jumpseats. These systems verify an employee’s […]
A vulnerability was found in Adobe Acrobat Reader up to 11.0.18/15.006.30244/15.020.20042. It has been declared as critical. This vulnerability affects unknown code of the component Image Conversion Engine. The manipulation as part of TIFF File leads to memory corruption.
This vulnerability was named CVE-2017-2963. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Kaqoo Auction Software. It has been declared as critical. This vulnerability affects unknown code of the file include/display/item/new_item.inc.php. The manipulation of the argument install_root leads to improper privilege management.
This vulnerability was named CVE-2007-1790. Local access is required to approach this attack. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Camtron CMNC-200 1.102a-008. This vulnerability affects unknown code. The manipulation leads to improper resource management.
This vulnerability was named CVE-2010-4234. The attack can be initiated remotely. Furthermore, there is an exploit available.