Tax season is here, so are scammers
Watch out for malicious ads tricking you as you prepare to file your taxes.
Watch out for malicious ads tricking you as you prepare to file your taxes.
A vulnerability was found in GLPI up to 10.0.11 and classified as problematic. Affected by this issue is some unknown functionality of the component Report Page. The manipulation leads to basic cross site scripting.
This vulnerability is handled as CV…
A vulnerability has been found in Dell Data Protection Search up to 19.6.3 and classified as problematic. Affected by this vulnerability is the function LdapSettings.get_ldap_info. The manipulation leads to file and directory information exposure.
Thi…
A vulnerability, which was classified as problematic, was found in GLPI up to 10.0.11. Affected is an unknown function. The manipulation leads to ldap injection.
This vulnerability is traded as CVE-2023-51446. It is possible to launch the attack remot…
A vulnerability, which was classified as critical, has been found in Mastodon up to 3.5.16/4.0.12/4.1.12/4.2.4. This issue affects some unknown processing of the component LDAP Authentication. The manipulation leads to authentication bypass by spoofing…
A vulnerability classified as problematic was found in brefphp bref up to 2.1.12. This vulnerability affects the function RequestHandlerInterface. The manipulation leads to interpretation conflict.
This vulnerability was named CVE-2024-24754. The atta…
A vulnerability classified as critical has been found in Dataease up to 1.18.14/2.2.x. This affects an unknown part of the file core/core-backend/src/main/java/io/dataease/datasource/type/Mysql.java. The manipulation leads to deserialization.
This vul…
A vulnerability was found in brefphp bref up to 2.1.12. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Response Header Handler. The manipulation leads to interpretation conflict.
This vulnerabil…
A vulnerability was found in brefphp bref up to 2.1.12. It has been declared as problematic. Affected by this vulnerability is the function RequestHandlerInterface of the file /tmp of the component Multipart Request Handler. The manipulation leads to r…
The threat actor behind a peer-to-peer (P2P) botnet known as FritzFrog has made a return with a new variant that leverages the Log4Shell vulnerability to propagate internally within an already compromised network.
“The vulnerability…