image
-
A vulnerability classified as problematic has been found in idcCMS 1.35. This affects an unknown part of the component Image Advertising Management. The manipulation leads to cross site scripting. This vulnerability is uniquely identified as CVE-2024-40336. It is possible to initiate the attack remotely. There is no exploit available.
-
A Chaotic Image Encryption Scheme Using Novel Geometric Block Permutation and Dynamic Substitution
·
arXiv:2503.09939v1 Announce Type: new Abstract: In this digital era, ensuring the security of digital data during transmission and storage is crucial. Digital data, particularly image data, needs to be protected against unauthorized access. To address this, this paper presents a novel image encryption scheme based on a confusion diffusion architecture. The diffusion module introduces a…
-
arXiv:2503.09953v1 Announce Type: new Abstract: In this digital age, ensuring the security of digital data, especially the image data is critically important. Image encryption plays an important role in securing the online transmission/storage of images from unauthorized access. In this regard, this paper presents a novel diffusion-confusion-based image encryption algorithm named as X-CROSS. The diffusion…
-
arXiv:2503.09038v1 Announce Type: new Abstract: Securing image data in IoT networks and other insecure information channels is a matter of critical concern. This paper presents a new image encryption scheme using DNA encoding, snake permutation and chaotic substitution techniques that ensures robust security of the image data with reduced computational overhead. The DNA encoding and…
-
A vulnerability has been found in Share This Image Plugin up to 2.01 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument alignment leads to cross site scripting. This vulnerability is known as CVE-2024-8108. The attack can be launched remotely. There is no exploit available.
-
A vulnerability, which was classified as critical, has been found in FastStone Image Viewer. This issue affects some unknown processing of the component GIF File Parser. The manipulation leads to out-of-bounds write. The identification of this vulnerability is CVE-2024-9114. The attack may be initiated remotely. There is no exploit available.
-
CVE-2024-8291 | Concrete CMS up to 8.5.18/9.3.3 Image Editor Background Color cross site scripting
·
A vulnerability has been found in Concrete CMS up to 8.5.18/9.3.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Image Editor Background Color. The manipulation leads to cross site scripting. This vulnerability is known as CVE-2024-8291. The attack can be launched remotely. There is no exploit available. It…
-
A vulnerability was found in Image Optimizer, Resizer and CDN Plugin up to 7.2.9 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component SVG File Upload Handler. The manipulation leads to cross site scripting. This vulnerability is known as CVE-2024-8964. The attack can be launched…
-
A vulnerability classified as critical was found in Hugin 2022.0.0. Affected by this vulnerability is the function HuginBase::PanoramaMemento::loadPTScript of the component Image Handler. The manipulation leads to heap-based buffer overflow. This vulnerability is known as CVE-2024-25442. Access to the local network is required for this attack to succeed. There is no exploit available.
-
A vulnerability, which was classified as problematic, was found in Parallax Image Plugin up to 1.8 on WordPress. This affects the function dd-parallax of the component Shortcode Handler. The manipulation leads to cross site scripting. This vulnerability is uniquely identified as CVE-2024-9898. It is possible to initiate the attack remotely. There is no exploit available.
-
A vulnerability was found in Apple visionOS and classified as problematic. This issue affects some unknown processing of the component Image Handler. The manipulation leads to information disclosure. The identification of this vulnerability is CVE-2024-44215. The attack may be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component.
-
A vulnerability has been found in Apple macOS and classified as problematic. This vulnerability affects unknown code of the component Image Handler. The manipulation leads to information disclosure. This vulnerability was named CVE-2024-44215. The attack can be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component.
-
A vulnerability was found in Apple watchOS. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Image Handler. The manipulation leads to information disclosure. This vulnerability is handled as CVE-2024-44215. The attack may be launched remotely. There is no exploit available. It is recommended to upgrade the…
-
A vulnerability was found in Apple tvOS. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Image Handler. The manipulation leads to information disclosure. This vulnerability is known as CVE-2024-44215. The attack can be launched remotely. There is no exploit available. It is recommended to upgrade the…
-
A vulnerability was found in Apple iOS and iPadOS. It has been classified as problematic. Affected is an unknown function of the component Image Handler. The manipulation leads to information disclosure. This vulnerability is traded as CVE-2024-44215. It is possible to launch the attack remotely. There is no exploit available. It is recommended to upgrade…
-
A vulnerability classified as problematic was found in Coral Web Design CWD 3D Image Gallery Plugin up to 1.0 on WordPress. This vulnerability affects unknown code. The manipulation leads to cross site scripting. This vulnerability was named CVE-2024-49632. The attack can be initiated remotely. There is no exploit available.