CVE-2020-36077
SQL injection vulnerability found in Tailor Mangement System v.1 allows a remote attacker to execute arbitrary code via the customer parameter of the orderadd.php file...
CVE-2015-10099
A vulnerability classified as critical has been found in CP Appointment Calendar Plugin up to 1.1.5. This affects the function dex_process_ready_to_go_appointment of the file dex_appointments.php....
Review, Revise, Repeat: Snapshot Your Cybersecurity Roadmap
The last step with your cybersecurity roadmap involves examining the plan you've implemented, revising and streamlining, and starting the process anew. Read More
LLMs and Phishing
Here’s an experiment being run by undergraduate computer science students everywhere: Ask ChatGPT to generate phishing emails, and test whether these are better at persuading...
USN-6002-1: Irssi vulnerability
It was discovered that Irssi incorrectly handled certain internal routines. An attacker could possibly use this issue to cause a crash. Read More
What is the true potential impact of artificial intelligence on cybersecurity?
Will artificial intelligence become clever enough to upend computer security? AI is already surprising the world of art by producing masterpieces in any style on...
CVE-2014-125098 (http_server)
A vulnerability was found in Dart http_server up to 0.9.5 and classified as problematic. Affected by this issue is the function VirtualDirectory of the file...
CVE-2014-125097
A vulnerability, which was classified as problematic, was found in BestWebSoft Facebook Like Button up to 2.33. Affected is the function fcbkbttn_settings_page of the file...
CVE-2014-125096
A vulnerability was found in Fancy Gallery Plugin 1.5.12. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the...
CVE-2012-10012
A vulnerability has been found in BestWebSoft Facebook Like Button up to 2.13 and classified as problematic. Affected by this vulnerability is the function fcbk_bttn_plgn_settings_page...