Tag
Ubuntu Security Notice 6220-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.
Banner RotatorCMS version 1.0 suffers from a database disclosure vulnerability.
Avidi Media version 2.0 appears to leave default credentials installed after installation.
AtTestimonials CMS version 1.2 suffers from a missing authentication vulnerability.
Atom CMS version 2.0 suffers from a directory traversal vulnerability.
Nedal CMS version 1.2 suffers from a remote SQL injection vulnerability.
Asanhamayesh CMS version 3.4.6 suffers from a directory traversal vulnerability.
ARTISTRY LIMITED LMS version 0.5 appears to leave default credentials installed after installation.
Artificial intelligence (AI) holds immense potential for optimizing internal processes within businesses. However, it also comes with legitimate concerns regarding unauthorized use, including data loss risks and legal consequences. In this article, we will explore the risks associated with AI implementation and discuss measures to minimize damages. Additionally, we will examine regulatory
The 10WebAnalytics plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.8. This is due to missing or incorrect nonce validation on the create_csv_file() function. This makes it possible for unauthenticated attackers to create a CSV file via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.