Search
lenovo warranty check/lookup | check warranty status | lenovo support us
Found 10000 results in 75 ms.
Automox Agent before 32 on Windows incorrectly sets permissions on a temporary directory.
The Support Board WordPress plugin before 3.3.6 does not have any CSRF checks in actions handled by the include/ajax.php file, which could allow attackers to make logged in users do unwanted actions. For example, make an admin delete arbitrary files
Joomla Sexy Polling extension versions 2.1.7 and below suffer from a remote SQL injection vulnerability.
SAP Focused Run Simple Diagnostics Agent version 1.0 suffers from a missing authentication vulnerability.
["An improper length check in APAService prior to SMR Sep-2021 Release 1 results in stack based Buffer Overflow."]
elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.
With certain LDAP configurations, Zammad 5.0.1 was found to be vulnerable to unauthorized access with existing user accounts.
Are ransomware groups shifting attention to Europe? Or just expanding into new territories? Categories: Malwarebytes news Tags: angling direct conti European Graff hive lockean mediamarkt phishing ransomware retailers saturn web shops *( Read more... ( https://blog.malwarebytes.com/malwarebytes-news/2021/11/are-cybercriminals-turning-away-from-the-us-and-targeting-europe-instead/ ) )* The post Are cybercriminals turning away from the US and targeting Europe instead? appeared first on Malwarebytes Labs.
MariaDB v10.5 to v10.7 was discovered to contain an assertion failure at table->get_ref_count() == 0 in dict0dict.cc.
A blind SQL injection vulnerability in McAfee Enterprise ePolicy Orchestrator (ePO) prior to 5.10 Update 13 allows a remote authenticated attacker to potentially obtain information from the ePO database. The data obtained is dependent on the privileges the attacker has and to obtain sensitive data the attacker would require administrator privileges.