A vulnerability described as critical has been identified in FFmpeg up to 7.x. Affected by this issue is the function stored_frame of the component SANM Decoder. Executing manipulation can lead to use after free.
This vulnerability is tracked as CVE-2025-59734. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in FFmpeg up to 7.x. Affected by this vulnerability is the function dwa_uncompress of the component OpenEXR File Decoder. Performing manipulation results in out-of-bounds write.
This vulnerability is identified as CVE-2025-59733. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in FFmpeg up to 7.x. Affected is the function uncompressed_data of the component OpenEXR File Decoder. Such manipulation leads to out-of-bounds write.
This vulnerability is referenced as CVE-2025-59732. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in FFmpeg up to 7.x. This impacts the function rle_raw_size of the component OpenEXR File Decoder. This manipulation causes out-of-bounds write.
The identification of this vulnerability is CVE-2025-59731. It is possible to initiate the attack remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in FFmpeg up to 7.x. This affects the function process_frame_obj of the component SANM File Parser. The manipulation results in out-of-bounds write.
This vulnerability was named CVE-2025-59730. The attack may be performed from remote. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in FFmpeg up to 7.x. It has been rated as critical. The impacted element is an unknown function of the component DHAV File Handler. The manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2025-59729. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability has been found in SICK Enterprise Analytics and classified as problematic. This vulnerability affects unknown code of the component POST Request Handler. This manipulation causes allocation of resources.
This vulnerability appears as CVE-2025-58582. The attack may be initiated remotely. There is no available exploit.
A vulnerability, which was classified as problematic, was found in SICK Enterprise Analytics. This affects an unknown part. The manipulation results in information exposure through error message.
This vulnerability is reported as CVE-2025-58581. The attack can be launched remotely. No exploit exists.
A vulnerability, which was classified as critical, has been found in SICK Enterprise Analytics. Affected by this issue is some unknown functionality of the component POST Request Handler. The manipulation leads to improper output neutralization for logs.
This vulnerability is documented as CVE-2025-58580. The attack can be initiated remotely. There is not any exploit available.
De mbo-opleiding Veiligheid & Vakmanschap (VeVa) speelt de komende jaren een grotere rol bij de opbouw van de krijgsmacht. Dat bevestigen Defensie en 21 ROC’s. Ten opzichte van een jaar geleden is het aantal inschrijvingen met 7% toegenomen.
A vulnerability classified as critical was found in FFmpeg MPEG-DASH up to 7.x. Affected by this vulnerability is an unknown functionality of the component MPEG-DASH Manifest Handler. Executing manipulation can lead to out-of-bounds write.
This vulnerability is registered as CVE-2025-59728. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is advised.