A vulnerability, which was classified as problematic, has been found in xmlsoft libxml2 up to 2.13.7/2.14.1. Affected by this issue is some unknown functionality of the component Python API. The manipulation leads to return of wrong status code.
This vulnerability is handled as CVE-2025-32414. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in x-oauth2-jws up to 0.26.x on Go. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to resource consumption.
The identification of this vulnerability is CVE-2025-22868. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in GNOME libsoup up to 3.6.0. Affected by this vulnerability is the function soup_header_parse_param_list_strict. The manipulation leads to buffer overflow.
This vulnerability is known as CVE-2024-52531. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in xmlsoft libxml2 up to 2.13.7/2.14.1. This affects the function xmlSchemaIDCFillNodeTables of the file xmlschemas.c of the component XML Document Handler. The manipulation leads to improper validation of specified quantity in input.
This vulnerability is uniquely identified as CVE-2025-32415. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel 6.0.8. This affects the function run_unpack of the file fs/ntfs3/run.c of the component Sector Size Handler. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2023-26544. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.10.200/5.15.138/6.1.62/6.5.11/6.6.1. Affected is the function mtk_alloc_clk_data of the component clk-mt6765. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2023-52870. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mozilla Firefox 65.0.0. It has been rated as critical. This issue affects the function transferFromImageBitmap of the component Canvas. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2018-18511. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.19.1. This affects the function snd_card_register of the component driver. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2022-50229. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in TRENDnet TN-200 1.02b02. It has been declared as problematic. This vulnerability affects unknown code of the component Lighttpd. The manipulation of the argument secdownload.secret with the input neV3rUseMe leads to use of hard-coded cryptographic key
.
This vulnerability was named CVE-2025-8759. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
Embargo ransomware, likely a BlackCat/Alphv successor, has netted $34.2M in crypto since mid-2024, researchers say. The Embargo ransomware group has processed $34.2M in crypto since emerging in April 2024, researchers from Blockchain intelligence company TRM Labs report. “TRM Labs has identified approximately USD 34.2 million in incoming transaction volume likely associated with the group, with […]
A vulnerability was found in ProSSHD 1.2 on Windows. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to denial of service.
This vulnerability was named CVE-2024-0725. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability was found in Software AG webMethods up to 10.15.0 Core_Fix6. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /WmAdmin/ of the component Administration Panel. The manipulation leads to empty password in configuration file.
This vulnerability is handled as CVE-2024-23733. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Office and 365 Apps for Enterprise and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2024-38200. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in freeSSHd 1.0.9 on Windows. It has been classified as problematic. This affects an unknown part. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2024-0723. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
Currently trending CVE - Hype Score: 29 - Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the ...
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.12.22/6.13.10/6.14.1. This affects the function alloc_preauth_hash. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2025-22037. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.