The openSNP project, a platform for sharing genetic and phenotypic data, will shut down on April 30, 2025, and delete all user submissions over privacy concerns and the risk of misuse by authoritarian governments. [...]
A vulnerability was found in Big Boom Directory Plugin up to 2.5.0 on WordPress. It has been rated as problematic. This issue affects the function bbd-search of the component Shortcode Handler. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-13673. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in unitecms Unlimited Elements for Elementor Plugin up to 1.5.142 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-1663. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in User Submitted Posts Plugin up to 20240319 on WordPress. It has been classified as problematic. This affects an unknown part of the component Setting Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-2874. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Pexip Infinity Connect up to 1.12.x and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to privilege escalation.
This vulnerability is handled as CVE-2024-38392. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Trend Micro Trend Vision One and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Backend Service. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-31286. The attack can be launched remotely. There is no exploit available.
This product is available as a managed service. Users are not able to maintain vulnerability countermeasures themselves.
A vulnerability, which was classified as critical, was found in Trend Micro Trend Vision One. Affected is an unknown function of the component Role Name. The manipulation leads to improper privilege management.
This vulnerability is traded as CVE-2025-31285. It is possible to launch the attack remotely. There is no exploit available.
This product is a managed service. This means that users are not able to maintain vulnerability countermeasures themselves.
A vulnerability, which was classified as problematic, has been found in AMD Ryzen AI Software up to 1.2. This issue affects some unknown processing of the component NPU Driver. The manipulation leads to integer overflow.
The identification of this vulnerability is CVE-2024-36328. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in AMD Ryzen AI Software up to 1.2. This vulnerability affects unknown code of the component Installation Folder. The manipulation leads to incorrect default permissions.
This vulnerability was named CVE-2025-0014. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Trend Micro Trend Vision One. This affects an unknown part of the component User Roles. The manipulation leads to improper privilege management.
This vulnerability is uniquely identified as CVE-2025-31283. It is possible to initiate the attack remotely. There is no exploit available.
This product is a managed service. This means that users are not able to maintain vulnerability countermeasures themselves.
A vulnerability was found in Trend Micro Trend Vision One. It has been rated as critical. Affected by this issue is some unknown functionality of the component Status. The manipulation leads to improper privilege management.
This vulnerability is handled as CVE-2025-31284. The attack may be launched remotely. There is no exploit available.
This product is a managed service. It is not possible for users to maintain vulnerability countermeasures themselves.
A vulnerability was found in Trend Micro Trend Vision One. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component User Account. The manipulation leads to improper privilege management.
This vulnerability is known as CVE-2025-31282. The attack can be launched remotely. There is no exploit available.
This product is available as a managed service. Users are not able to maintain vulnerability countermeasures themselves.
A vulnerability was found in AMD Ryzen AI Software up to 1.2. It has been classified as problematic. Affected is an unknown function of the component NPU Driver. The manipulation leads to integer overflow.
This vulnerability is traded as CVE-2024-36337. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
While the House Committee on Government Reform was looking for retaliatory options, cybersecurity experts pointed them toward building better defenses.
Alexander Culafi, Senior News Writer, Dark Reading
A vulnerability was found in AMD Ryzen AI Software up to 1.2 and classified as problematic. This issue affects some unknown processing of the component NPU Driver. The manipulation leads to integer overflow.
The identification of this vulnerability is CVE-2024-36336. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Pexip Infinity up to 36.2 and classified as problematic. This vulnerability affects unknown code of the component Signalling Handler. The manipulation leads to denial of service.
This vulnerability was named CVE-2025-30080. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.