A vulnerability was found in Amazon CloudTrail S3. It has been rated as problematic. This issue affects some unknown processing of the component S3 API. The manipulation leads to information exposure through error message.
The attack may be initiated remotely. There is no exploit available.
This product is a managed service. It is not possible for users to maintain vulnerability countermeasures themselves.
A vulnerability, which was classified as very critical, was found in Veeam Backup and Replication 12.0/12.1/12.2/12.3. Affected is an unknown function of the component Domain User Handler. The manipulation leads to deserialization.
This vulnerability is traded as CVE-2025-23120. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Microsoft Defender for Cloud. It has been declared as problematic. This vulnerability affects unknown code of the component Configuration Template. The manipulation leads to improper authorization.
The attack can be initiated remotely. There is no exploit available.
This product is available as a managed service. Users are not able to maintain vulnerability countermeasures themselves.
A critical security flaw has been disclosed in the Next.js React framework that could be potentially exploited to bypass authorization checks under certain conditions.
The vulnerability, tracked as CVE-2025-29927, carries a CVSS score of 9.1 out of 10.0.
"Next.js uses an internal header x-middleware-subrequest to prevent recursive requests from triggering infinite loops," Next.js said in an
A vulnerability, which was classified as problematic, was found in wpdevteam Essential Addons for Elementor Plugin up to 5.9.23 on WordPress. This affects an unknown part. The manipulation of the argument custom_js leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-5189. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Fortinet FortiPAM, FortiSwitchManager, FortiOS and FortiProxy. Affected is an unknown function of the component Packets Handler. The manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2024-26010. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.