GreyNoise is bringing awareness to in-the-wild activity against several known vulnerabilities (CVE-2020-8515, CVE-2021-20123, and CVE-2021-20124) in DrayTek devices.
Trend Research identified Russian threat actor Water Gamayun exploiting CVE-2025-26633, a zero-day vulnerability in the Microsoft Management Console that attackers exploit to execute malicious code and exfiltrate data.
A vulnerability was found in BanPro Net Banpro Dms 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument action leads to path traversal.
This vulnerability is known as CVE-2008-0812. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Apple macOS up to 13.6/14.6/15.2. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to permission issues.
This vulnerability was named CVE-2025-24176. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in DTEX DEC-M 6.1.1. This issue affects the function submitQuery of the component com.DTEXsystems.helper Service. The manipulation leads to improper authorization.
The identification of this vulnerability is CVE-2024-55968. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability was found in A5 Custom Login Page Plugin up to 2.8.1 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-13226. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in OpenPanel 0.3.4. Affected is an unknown function of the component File Manager. The manipulation leads to path traversal.
This vulnerability is traded as CVE-2024-53582. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Octopus Deploy Octopus Server. This affects an unknown part. The manipulation leads to information exposure through error message.
This vulnerability is uniquely identified as CVE-2025-0525. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mercedes Benz Head-Unit NTG6. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Profile Settings Handler. The manipulation leads to denial of service.
This vulnerability is handled as CVE-2023-34397. It is possible to launch the attack on the physical device. There is no exploit available.
A vulnerability was found in Apple iOS and iPadOS. It has been classified as problematic. Affected is an unknown function. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2025-24160. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple watchOS and classified as problematic. This issue affects some unknown processing. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2025-24160. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Apple macOS up to 13.6/14.6/15.2 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to incorrect authorization.
This vulnerability is known as CVE-2025-24099. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Alpine Halo9 and classified as critical. This vulnerability affects unknown code. The manipulation leads to stack-based buffer overflow.
This vulnerability was named CVE-2024-23963. The attack can be initiated remotely. There is no exploit available.
It is recommended to replace the affected component with an alternative.
A vulnerability was found in ChargePoint Home Flex. It has been classified as very critical. Affected is an unknown function of the component wlanapp. The manipulation leads to command injection.
This vulnerability is traded as CVE-2024-23921. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability has been found in Microsoft Clip Art Gallery 5.0 and classified as critical. This vulnerability affects unknown code of the component CIL File Handler. The manipulation leads to memory corruption.
This vulnerability was named CVE-2000-0200. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.