A vulnerability classified as problematic has been found in MariaDB up to 5.5.51/10.0.27/10.1.17. This affects an unknown part. The manipulation leads to race condition.
This vulnerability is uniquely identified as CVE-2016-6663. An attack has to be approached locally. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in IRCD-Hybrid up to 8.0.5. This issue affects the function try_parse_v4_netmask of the file hostmask.c. The manipulation leads to improper input validation.
The identification of this vulnerability is CVE-2013-0238. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel 2.0.36 and classified as critical. Affected by this issue is some unknown functionality of the file /dev/kmem. The manipulation leads to authentication bypass by spoofing.
This vulnerability is handled as CVE-1999-0426. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
US Cyber Command Says National Mission Force was Deployed Over 85 Times in 2024 A secretive U.S. military unit has surged its support to partner nations across the globe in 2024 while combatting escalating threats from foreign adversaries like China and North Korea, a top official from Cyber Command told the Cyberwarcon summit on Friday.
Researches Find Deep Ties to North Korea Among Fake IT Services Firms Websites North Korean state actors are using fake websites of foreign technology services firms sidestep sanctions and raise funding for Kim Jong-un regime's weapons development programs. SentinelLabs found many of these sites shared similar infrastructure, owners and locations.
Also: Highlights from ISMG's Financial Services Summit and Key Insights on AI Adoption On the 200th episode of the ISMG Editors' Panel, the team discussed the major China-linked cyberespionage campaign targeting U.S. telecommunications, highlighted key insights from ISMG's Financial Services Summit in New York, and unpacked the top findings from ISMG’s annual Generative AI Survey.
PE Firm Takes Majority Stake to Drive Certificate Lifecycle Management Innovation Private equity firm Haveli has purchased a majority stake in AppViewX to scale globally, targeting automation in certificate lifecycle management and public key infrastructure. CEO Gregory Webb says the acquisition will fund international expansion and next-gen technology investments.
A vulnerability was found in Webevents 2.7/2.61/2.71/2.72/4.03. It has been classified as problematic. This affects an unknown part of the file webevent.cgi. The manipulation of the argument cmd leads to basic cross site scripting.
This vulnerability is uniquely identified as CVE-2007-4146. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in Adobe Acrobat Reader up to 10.1.15/11.0.12. This issue affects some unknown processing. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2015-7621. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.