A vulnerability was found in GNU Binutils 2.45. It has been classified as problematic. This issue affects the function dump_dwarf_section of the file binutils/objdump.c. Performing manipulation results in out-of-bounds read.
This vulnerability is identified as CVE-2025-11081. The attack is only possible with local access. Additionally, an exploit exists.
It is suggested to install a patch to address this issue.
A vulnerability marked as problematic has been reported in Discourse up to beta 3.4.0.beta3/stable 3.3.2/tests-passed 3.4.0.beta3. This issue affects some unknown processing of the component Setting Handler. The manipulation leads to resource consumption.
This vulnerability is listed as CVE-2024-53851. The attack may be initiated remotely. There is no available exploit.
To fix this issue, it is recommended to deploy a patch.
A vulnerability classified as problematic has been found in Discourse up to beta 3.4.0.beta3/stable 3.3.3/tests-passed 3.4.0.beta3. The affected element is an unknown function of the component Onebox Handler. This manipulation causes cross site scripting.
This vulnerability is registered as CVE-2024-56328. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Discourse up to beta 3.4.0.beta3/stable 3.3.3/tests-passed 3.4.0.beta3. This affects an unknown function of the component Video Placeholder. Performing manipulation results in cross site scripting.
This vulnerability is reported as CVE-2025-22602. The attack is possible to be carried out remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability classified as critical has been found in HubSpot jinjava up to 2.8.0. Affected by this issue is the function mapper.getTypeFactory.constructFromCanonical of the component Jinja Template Handler. The manipulation leads to improper neutralization of special elements used in a template engine.
This vulnerability is listed as CVE-2025-59340. The attack may be initiated remotely. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in Discourse up to 82d84af6b0efbd9fa2aeec3e91ce7be1a768511b. Affected by this issue is some unknown functionality. Such manipulation leads to information disclosure.
This vulnerability is referenced as CVE-2025-46813. It is possible to launch the attack remotely. No exploit is available.
It is best practice to apply a patch to resolve this issue.
A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as critical. The impacted element is the function formSysCmd. This manipulation of the argument submit-url causes buffer overflow.
This vulnerability appears as CVE-2025-55602. The attack may be initiated remotely. There is no available exploit.
A vulnerability identified as critical has been detected in Tenda AX3 16.03.12.10_CN. This affects the function fromAdvSetMacMtuWan. This manipulation of the argument serverName causes buffer overflow.
The identification of this vulnerability is CVE-2025-55606. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability marked as critical has been reported in D-Link DIR-619L 2.06B01. This issue affects the function formWlanSetup. Performing manipulation of the argument f_wds_wepKey results in buffer overflow.
This vulnerability is identified as CVE-2025-55599. The attack can be initiated remotely. There is not any exploit available.
A vulnerability classified as critical has been found in Tenda AX3 16.03.12.10_CN. The affected element is the function fromSetSysTime. The manipulation of the argument ntpServer leads to buffer overflow.
This vulnerability is listed as CVE-2025-55603. The attack may be initiated remotely. There is no available exploit.
A vulnerability categorized as critical has been discovered in Tenda AX3 16.03.12.10_CN. This issue affects the function saveParentControlInfo. Such manipulation of the argument deviceName leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2025-55605. The attack can be launched remotely. No exploit exists.
A vulnerability identified as critical has been detected in D-Link DIR-619L 2.06B01. Impacted is the function formLanguageChange. Performing manipulation of the argument nextPage results in buffer overflow.
This vulnerability was named CVE-2025-55611. The attack may be initiated remotely. There is no available exploit.
A vulnerability has been found in Discourse up to 3.4.3/3.5.0.beta4/3.5.0.beta5-dev and classified as problematic. This vulnerability affects the function topic_title of the component Email Body Handler. The manipulation leads to basic cross site scripting.
This vulnerability is traded as CVE-2025-48062. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.
The world's most-popular sports contest starts in June 2026 across 16 venues in three countries: Securing the event infrastructure from cyber threats will require massive collaboration.
Microsoft has released the final non-security preview update for Windows 10, version 22H2, which includes fixes for the out-of-box experience and SMBv1 protocol connectivity. [...]