A vulnerability classified as problematic was found in GeoVision GV-LPC2011 and LPC2211 up to 1.10 . This affects an unknown part of the component Web Interface . Executing a manipulation can lead to …
cyberintel.kalymoon.com · 22466 articles · updated every 4 hours · grows forever
A vulnerability classified as problematic was found in GeoVision GV-LPC2011 and LPC2211 up to 1.10 . This affects an unknown part of the component Web Interface . Executing a manipulation can lead to …
A vulnerability, which was classified as problematic , has been found in GeoVision GV-LPC2011 and LPC2211 up to 1.10 . This vulnerability affects unknown code of the component Web Interface . The mani…
A vulnerability, which was classified as problematic , was found in phpBB up to 3.3.15 . This issue affects the function force_server_vars of the component Header Validation Handler . The manipulation…
A vulnerability has been found in Magic Export & Import Plugin up to 1.1.x on WordPress and classified as problematic . Impacted is an unknown function of the component CSV File Handler . This manipul…
A vulnerability was found in MediaTek MT2735, MT2737, MT6739, MT6761, MT6762, MT6763, MT6765, MT6767, MT6768, MT6769, MT6771, MT6779, MT6781, MT6783, MT6785, MT6789, MT6813, MT6815, MT6833, MT6835, MT…
A vulnerability was found in MediaTek MT2735, MT2737, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT…
A vulnerability was found in WebPros Comet Backup up to 26.1.1/26.2.1 . It has been declared as problematic . This affects an unknown function of the component API Call Handler . Executing a manipulat…
A vulnerability was found in MediaTek MT6768, MT6789, MT6877, MT6899, MT6989, MT6991, MT6993, MT8196, MT8367, MT8766, MT8768, MT8781, MT8786, MT8788E, MT8791T, MT8793 and MT8910 . It has been rated as…
A vulnerability categorized as problematic has been discovered in MediaTek MT6765, MT6768, MT6789, MT6877, MT6897, MT6899, MT6989, MT6991, MT6993, MT8367, MT8766, MT8768, MT8775, MT8781, MT8786, MT878…
A vulnerability identified as problematic has been detected in MediaTek MT2718, MT6899, MT6985, MT6989, MT6991, MT8115, MT8186, MT8188, MT8196, MT8365, MT8367, MT8370, MT8371, MT8390, MT8391, MT8395, …
A vulnerability labeled as problematic has been found in mutt up to 2.3.1 . Affected by this issue is the function url_pct_decode . Such manipulation leads to improper neutralization of null byte or n…
A vulnerability marked as problematic has been reported in mutt up to 2.3.1 . This affects the function imap_auth_gss . Performing a manipulation results in type confusion. This vulnerability is known…
A vulnerability described as problematic has been identified in mutt up to 2.3.1 . This vulnerability affects the function data_object_to_stream of the file crypt-gpgme.c . Executing a manipulation ca…
A vulnerability classified as problematic has been found in mutt up to 2.3.1 . This issue affects the function show_sig_summary . The manipulation leads to null pointer dereference. This vulnerability…
A vulnerability classified as problematic was found in mutt up to 2.3.1 . Impacted is the function auth_cram . The manipulation results in improper neutralization of null byte or nul character. This v…
A vulnerability, which was classified as problematic , has been found in mutt up to 2.3.1 . The affected element is the function hash_passwd of the component IMAP . This manipulation causes off-by-one…
Wireshark release 4.6.5 fixes 43 vulnerabilities (38 CVEs) and 35 bugs.
Microsoft Defender triggered widespread false positive alerts after a faulty security update caused it to flag two legitimate DigiCert root certificates as malicious, potentially disrupting SSL/TLS va…
A new wave of cyberattacks is targeting employees through a combination of inbox flooding and fake IT support contacts on Microsoft Teams, tricking users into handing over remote access to their own d…
The FreeBSD Project has released a critical security advisory addressing a severe flaw in its default IPv4 DHCP client. Tracked as CVE-2026-42511, this vulnerability allows a local network attacker to…
The way cyberattacks are launched has fundamentally changed. Threat actors are no longer spending months hunting for software flaws by hand. With artificial intelligence in their toolkit, they can now…
Ein Botnetz besteht aus vielen “Zombie”-Rechnern und lässt sich beispielsweise einsetzen, um DDoS-Attacken zu fahren. Das sollten Sie zum Thema wissen. FOTOKINA | shutterstock.com Kriminelle Hacker su…
Google, Microsoft, Amazon Web Services, Nvidia, OpenAI, Reflection and SpaceX will provide resources to help augment warfighter decision-making in complex operational environments,” the Defense Depart…