Microsoft has removed a compatibility hold that prevented devices with integrated cameras from installing Windows 11 24H2 due to a face detection bug causing app freezes. [...]
Multikernel Technologies 公司的 Cong Wang 公布了代码递交了 RFC。代码为 Linux 内核加入多内核架构支持,让多个独立内核实例能在一台物理机器上共存并通信,每个内核实例能在专用 CPU 核心上运行,共享底层硬件资源。Multikernel Technologies 公司承诺将采用社区优先的开发方法。
A vulnerability was found in Blackmagic Web Presenter 3.3. It has been classified as critical. This affects an unknown part of the component Telnet Service. Performing manipulation results in improper authentication.
This vulnerability is cataloged as CVE-2025-57432. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Airship AI Acropolis up to 10.2.34/11.0.20/11.1.8 and classified as very critical. Affected by this issue is some unknown functionality. Such manipulation leads to use of default credentials.
This vulnerability is listed as CVE-2025-35042. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability has been found in Airship AI Acropolis up to 10.2.34/11.0.20/11.1.8 and classified as problematic. Affected by this vulnerability is an unknown functionality. This manipulation causes improper restriction of excessive authentication attempts.
This vulnerability is tracked as CVE-2025-35041. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in Creacast Creabox Manager 4.4.4. Affected is an unknown function of the file /get of the component Configuration Handler. The manipulation results in information disclosure.
This vulnerability is identified as CVE-2025-57430. The attack can only be performed from the local network. There is not any exploit available.
A vulnerability, which was classified as critical, has been found in Papermark up to 0.20.0. This impacts an unknown function of the file /api/file/s3/get-presigned-get-url-proxy of the component API. The manipulation leads to path traversal.
This vulnerability is referenced as CVE-2025-57682. The attack needs to be initiated within the local network. No exploit is available.
A vulnerability classified as critical was found in Aikaan IoT Platform. This affects an unknown function. Executing manipulation can lead to improper authorization.
The identification of this vulnerability is CVE-2025-57605. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in GE Vernova S1 Agile Configuration Software 3.1 on Windows. The impacted element is an unknown function. Performing manipulation results in improper privilege management.
This vulnerability was named CVE-2025-9038. The attack needs to be approached locally. There is no available exploit.
A vulnerability described as critical has been identified in Aikaan Remote Access. The affected element is an unknown function of the component Dashboard. Such manipulation leads to improper authentication.
This vulnerability is uniquely identified as CVE-2025-57601. The attack can be launched remotely. No exploit exists.
A vulnerability marked as problematic has been reported in Aikaan IoT Management Platform. Impacted is an unknown function of the component SSH Private Key Handler. This manipulation causes use of hard-coded cryptographic key
.
This vulnerability is handled as CVE-2025-57602. The attack can be initiated remotely. There is not any exploit available.
A vulnerability labeled as critical has been found in IBM webMethods Integration 10.15/11.1. This issue affects some unknown processing. The manipulation results in server-side request forgery.
This vulnerability is known as CVE-2025-36037. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in IBM webMethods Integration 10.15/11.1. This vulnerability affects unknown code. The manipulation leads to format string.
This vulnerability is traded as CVE-2025-36202. It is possible to initiate the attack remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in 2wcom IP-4c 2.15.5. This affects an unknown part of the file /cwi/ajax_request/get_data.php of the component POST Request Handler. Executing manipulation can lead to information disclosure.
This vulnerability appears as CVE-2025-57433. The attack may be performed from remote. There is no available exploit.
Experts at a Gartner event highlighted areas of focus in identity, processes and third-party risk management to tackle the novel tactics employed by Scattered Spider