A vulnerability, which was classified as critical, has been found in Actionpoll 1.1.1. This affects an unknown part of the file helperfunction.php. The manipulation of the argument includedir leads to improper privilege management.
This vulnerability is traded as CVE-2001-1297. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Grant Horwood Webodex 1.0. This vulnerability affects unknown code. The manipulation of the argument includedir results in improper privilege management.
This vulnerability is known as CVE-2001-1298. It is possible to launch the attack remotely. No exploit is available.
Applying restrictive firewalling is recommended.
A vulnerability has been found in Zorbat Zorbstats 0.8 and classified as critical. This issue affects some unknown processing. This manipulation of the argument includedir causes improper privilege management.
This vulnerability is handled as CVE-2001-1299. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in xinetd. This issue affects some unknown processing of the component Umask Handler. Performing manipulation results in improper privilege management.
This vulnerability is reported as CVE-2001-1322. The attack requires a local approach. No exploit exists.
You should upgrade the affected component.
A vulnerability was found in Check Point Firewall-1 4.0/4.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the component SecuRemote. The manipulation results in information disclosure.
This vulnerability was named CVE-2001-1303. The attack may be performed from remote. In addition, an exploit is available. This vulnerability is historically impactful due to its background and the reception it garnered.
Applying restrictive firewalling is recommended.
A vulnerability classified as problematic has been found in Doubleflex Liesbeth base CMS. Affected by this vulnerability is an unknown functionality. The manipulation leads to information disclosure.
This vulnerability is documented as CVE-2007-3556. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability was found in Omnistar Lib2 Php Library 0.2. It has been classified as critical. Affected is an unknown function of the file adm/my_statistics.php. This manipulation of the argument DOCUMENT_ROOT causes file inclusion.
This vulnerability appears as CVE-2007-4341. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability was found in Liferay portal 4.1.0/4.1.1 and classified as problematic. This affects an unknown part. Executing manipulation of the argument Login can lead to cross site scripting.
This vulnerability appears as CVE-2007-6055. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability classified as critical was found in LANAI CMS. The impacted element is an unknown function. Such manipulation of the argument gid leads to sql injection.
This vulnerability is uniquely identified as CVE-2007-4210. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability classified as critical has been found in LANAI CMS. The affected element is an unknown function. This manipulation of the argument cid causes sql injection.
This vulnerability is handled as CVE-2007-4210. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability, which was classified as problematic, has been found in PyTorch up to 3.6.x. Affected by this issue is some unknown functionality of the file decompositions.py of the component bernoulli_p Decompose. The manipulation leads to insufficiently random values.
This vulnerability is referenced as CVE-2025-46153. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability labeled as problematic has been found in PyTorch up to 2.6.x. Affected is the function torch.compile. Such manipulation leads to an unknown weakness.
This vulnerability is traded as CVE-2025-46150. Access to the local network is required for this attack to succeed. There is no exploit available.
The affected component should be upgraded.
A vulnerability marked as problematic has been reported in PyTorch up to 2.6.x. Affected by this vulnerability is the function bitwise_right_shift. Performing manipulation results in out-of-bounds write.
This vulnerability is known as CVE-2025-46152. Access to the local network is required for this attack. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in PyTorch up to 2.6.0. This issue affects the function nn.PairwiseDistance. This manipulation causes an unknown weakness.
The identification of this vulnerability is CVE-2025-46148. The attack needs to be done within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Progress OpenEdge up to 12.2.17/12.8.7 and classified as critical. The affected element is an unknown function of the component Java RMI Interface. The manipulation leads to command injection.
This vulnerability is listed as CVE-2025-7388. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
A vulnerability labeled as critical has been found in Cisco IOS, IOS XR, ASA, IOS XE and Firepower Threat Defense. This affects an unknown part of the component Web Services. Executing manipulation can lead to heap-based buffer overflow.
This vulnerability appears as CVE-2025-20363. The attack may be performed from remote. There is no available exploit.
The affected component should be upgraded.
OpenAI, Apollo Research Find Models Hide Misalignment; Training Cuts Deception Frontier artificial intelligence models are learning to hide their true intentions to pursue hidden agendas, said OpenAI and Apollo Research. Researchers say the risk of deception needs to be tackled now, especially as AI systems take on more complex, real-world responsibilities.
MIND Act Asks FTC to Study Exploitation Risks for Neural Data Collected by Devices Are brain waves and similar neural data the next frontier in consumer privacy worries? A trio of U.S. senators have introduced federal legislation aiming to get ahead of risks that such brain-related data could be collected and misused by tech firms, data brokers, government agencies and others.
Cybersecurity Programs, Workforce Face Disruption If Congress Fails to Act A potential government shutdown threatens to gut federal cybersecurity operations, with key programs set to expire, agency cyber staff facing layoffs and no public contingency plans in place - leaving core defenses, threat sharing and incident response at risk.