Jackson County hit by ransomware, declares state of emergency
Jackson County has suffered “significant disruptions within its IT systems,” and its offices are closed.
Jackson County has suffered “significant disruptions within its IT systems,” and its offices are closed.
A vulnerability has been found in mobsf and classified as critical. This vulnerability affects unknown code of the component Firebase Database Check. The manipulation leads to server-side request forgery.
This vulnerability was named CVE-2024-31215. T…
A vulnerability, which was classified as problematic, was found in dectalk-tts. This affects an unknown part of the component HTTP Request Handler. The manipulation leads to cleartext transmission of sensitive information.
This vulnerability is unique…
A vulnerability, which was classified as critical, has been found in Apache HTTP Server up to 2.4.58. Affected by this issue is some unknown functionality of the component Module. The manipulation leads to http response splitting.
This vulnerability i…
A vulnerability classified as critical was found in Apache HTTP Server up to 2.4.58. Affected by this vulnerability is an unknown functionality. The manipulation leads to http response splitting.
This vulnerability is known as CVE-2023-38709. The atta…
A vulnerability classified as problematic has been found in Red Hat Undertow. Affected is an unknown function of the component FormAuthenticationMechanism. The manipulation leads to uncontrolled memory allocation.
This vulnerability is traded as CVE-2…
A vulnerability was found in Collabora Online. It has been rated as problematic. This issue affects some unknown processing of the component Document Text Handler. The manipulation leads to cross site scripting.
The identification of this vulnerabilit…
A vulnerability was found in AlexxIT go2rtc up to 1.8.5. It has been declared as problematic. This vulnerability affects unknown code of the file links.html of the component GET Parameter Handler. The manipulation of the argument src leads to cross sit…
A vulnerability was found in Canonical Pebble up to 1.10.1. It has been classified as problematic. This affects an unknown part of the component Read-File API. The manipulation leads to permission issues.
This vulnerability is uniquely identified as C…
A vulnerability was found in nodejs Undici up to 5.28.3/6.0.0/6.11.0 and classified as problematic. Affected by this issue is the function fetch. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2024-30261. The …