A vulnerability was found in Microsoft Windows up to Server 2022 and classified as critical. This affects an unknown part of the component Authentication. Such manipulation leads to privilege escalation.
This vulnerability is uniquely identified as CVE-2023-21539. The attack can be launched remotely. No exploit exists.
A patch should be applied to remediate this issue.
A vulnerability was found in Microsoft Windows up to Server 2022. It has been classified as problematic. This vulnerability affects unknown code of the component Cryptographic. Performing manipulation results in information disclosure.
This vulnerability was named CVE-2023-21540. The attack may be initiated remotely. There is no available exploit.
To fix this issue, it is recommended to deploy a patch.
A vulnerability, which was classified as problematic, has been found in Microsoft Windows up to Server 2022. Affected is an unknown function of the component Event Tracing. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2023-21536. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, was found in Microsoft Windows. Affected by this vulnerability is an unknown functionality of the component Microsoft Message Queuing. The manipulation results in privilege escalation.
This vulnerability is known as CVE-2023-21537. It is possible to launch the attack remotely. No exploit is available.
Applying a patch is advised to resolve this issue.
A vulnerability classified as critical was found in Microsoft Windows. This impacts an unknown function of the component Secure Socket Tunneling Protocol. Executing manipulation can lead to race condition.
This vulnerability appears as CVE-2023-21535. The attack may be performed from remote. There is no available exploit.
It is best practice to apply a patch to resolve this issue.
Britain's foreign intelligence agency has a new darkweb site for foreigners to share "sensitive information on global instability, international terrorism or hostile state intelligence activity."
A vulnerability was found in SKTLab Mukbee App 1.01.196 on Android and classified as problematic. This affects an unknown function of the file AndroidManifest.xml of the component com.dw.android.mukbee. The manipulation results in improper export of android application components.
This vulnerability is cataloged as CVE-2025-10722. The attack must be initiated from a local position. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in Beyaz Computer CityPlus and classified as critical. The impacted element is an unknown function. The manipulation leads to path traversal.
This vulnerability is listed as CVE-2025-10468. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in grafana-zabbix-plugin up to 5.x on Grafana. The affected element is an unknown function. Executing manipulation can lead to incorrect regular expression.
This vulnerability is tracked as CVE-2025-10630. The attack can be launched remotely. No exploit exists.
You should upgrade the affected component.
A vulnerability classified as problematic was found in WisdomGarden Tronclass up to 1.74. This issue affects some unknown processing. Such manipulation leads to authorization bypass.
This vulnerability is referenced as CVE-2025-10719. It is possible to launch the attack remotely. No exploit is available.
A vulnerability classified as problematic has been found in Webull Investing & Trading App 11.2.5.63 on Android. This vulnerability affects unknown code of the file AndroidManifest.xml. This manipulation causes improper export of android application components.
The identification of this vulnerability is CVE-2025-10721. The attack can only be executed locally. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.