live,
-
A vulnerability classified as problematic has been found in Live Composer Team Page Builder Plugin up to 1.5.42 on WordPress. Affected is an unknown function. The manipulation leads to cross site scripting. This vulnerability is traded as CVE-2024-35779. It is possible to launch the attack remotely. There is no exploit available.
-
A vulnerability has been found in Live Composer Team Page Builder Plugin up to 1.5.42 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. This vulnerability is known as CVE-2024-35768. The attack can be launched remotely. There is no exploit available.
-
A vulnerability, which was classified as problematic, was found in Wavelog up to 1.8.0. Affected is the function index of the file /qso of the component Live QSO. The manipulation of the argument manual leads to cross site scripting. This vulnerability is traded as CVE-2024-8521. It is possible to launch the attack remotely. Furthermore, there…
-
A vulnerability classified as problematic was found in Pacific Software URL Live! 1.0. Affected by this vulnerability is an unknown functionality. The manipulation leads to path traversal. This vulnerability is known as CVE-1999-0915. The attack can be launched remotely. Furthermore, there is an exploit available. It is recommended to upgrade the affected component.
-
Cisco’s Security Operations Centre (SOC) team provided comprehensive security services for the Cisco Live Melbourne 2024 conference, leveraging a suite of Cisco Security Cloud capabilities and Splunk Enterprise Security. The SOC monitored and analyzed data from various sources to ensure secure access to event services, handling over 48 million DNS queries and 320TB of total…
-
A vulnerability was found in Winlin Live Streaming Video Player Plugin up to 1.0.18 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting. This vulnerability was named CVE-2025-27327. The attack can be initiated remotely. There is no exploit available.
-
* bsc#1229663 * bsc#1230998 * bsc#1231993 Cross-References:
-
* bsc#1229644 * bsc#1230998 * bsc#1231993 Cross-References:
-
* bsc#1229644 * bsc#1229663 * bsc#1230998 * bsc#1231993
-
Meet Arctic Wolf at ICBA Live and learn how we’re providing mission-critical security operations to community banks across the country.
-
* bsc#1230998 * bsc#1231993 Cross-References: * CVE-2024-45016
-
An encryption algorithm that passes security tests and seems flawless… But once it goes live, imagine accounts being taken over without a single click. So, how did I make this possible? 1) We have a demo environment alongside the target application. Let’s call our target application “redacted.com” and the demo application “demo.com”. The demo environment…