A vulnerability classified as critical was found in Splunk Enterprise up to 8.x. The impacted element is an unknown function of the component Command-Line Interface. Executing a manipulation can lead to improper certificate validation.
This vulnerability is tracked as CVE-2022-32156. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability was found in nameless up to 2.0.1. It has been declared as critical. The impacted element is an unknown function. Executing a manipulation can lead to improper access controls.
This vulnerability is tracked as CVE-2022-2820. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in OpenEMR up to 7.0.0.0. Affected by this vulnerability is an unknown functionality. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2022-2824. It is possible to initiate the attack remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in vim. The impacted element is an unknown function. Such manipulation leads to buffer over-read.
This vulnerability is uniquely identified as CVE-2022-2845. The attack can be launched remotely. No exploit exists.
You should upgrade the affected component.
A vulnerability has been found in Hitachi RAID Manager Storage Replication Adapter and classified as problematic. Affected by this vulnerability is an unknown functionality. This manipulation causes information exposure through error message.
The identification of this vulnerability is CVE-2022-34882. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability was found in Hitachi RAID Manager Storage Replication Adapter and classified as critical. Affected by this issue is some unknown functionality. Such manipulation leads to os command injection.
This vulnerability is referenced as CVE-2022-34883. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Delta Industrial Automation DIAEnergie. Impacted is an unknown function. This manipulation causes hard-coded credentials.
This vulnerability is handled as CVE-2022-3214. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability marked as critical has been reported in budibase up to 1.3.19. This impacts an unknown function. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2022-3225. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Hitachi Storage Plug-in for VMware vCenter 04.8.0. This issue affects some unknown processing. Such manipulation leads to incorrect privilege assignment.
This vulnerability is referenced as CVE-2022-2637. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in nocodb up to 0.91.x and classified as problematic. Impacted is an unknown function. The manipulation results in resource consumption.
This vulnerability is known as CVE-2022-3423. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic was found in Wireshark up to 4.6.3. This impacts an unknown function of the component NTS-KE Protocol Dissector. Such manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2026-3202. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as problematic, has been found in Wireshark up to 4.4.13/4.6.3. Affected is an unknown function of the component RF4CE Profile Protocol Dissector. Performing a manipulation results in buffer over-read.
This vulnerability is known as CVE-2026-3203. Remote exploitation of the attack is possible. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in Apache Airflow up to 3.1.3 and classified as problematic. This issue affects some unknown processing of the component kwargs. The manipulation results in information disclosure.
This vulnerability is identified as CVE-2025-65995. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Moodle. It has been rated as problematic. This affects an unknown function of the component TeX Formula Editor. The manipulation leads to resource consumption.
This vulnerability is documented as CVE-2026-26047. The attack can be initiated remotely. There is not any exploit available.
In offices across the world, the most productive employees are already working with artificial intelligence (AI), and their organizations are just beginning to notice. According to Gallup, “the percentage of U.S. employees who reported using AI at work at least a few times a year increased from 40% to 45% between the...
Google's Threat Intelligence Group (GTIG), Mandiant, and partners disrupted a global espionage campaign attributed to a suspected Chinese threat actor that used SaaS API calls to hide malicious traffic in attacks targeting telecom and government networks. [...]
Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic's Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials.
"The vulnerabilities exploit various configuration mechanisms, including Hooks, Model Context Protocol (MCP) servers, and environment variables – executing