A vulnerability classified as problematic has been found in Google Go 1.23/1.24. Affected is an unknown function of the component net-http. The manipulation leads to http request smuggling.
This vulnerability is traded as CVE-2025-22871. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Fortinet FortiSIEM up to 6.5.1/6.6.3/6.7.2/7.0.0. It has been rated as very critical. This issue affects some unknown processing of the component GUI. The manipulation leads to relative path traversal.
The identification of this vulnerability is CVE-2023-40714. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in OSRF ROS Indigo Igloo/Kinetic Kame/Melodic Morenia. It has been declared as critical. This vulnerability affects the function yaml.load of the component dynparam. The manipulation leads to deserialization.
This vulnerability was named CVE-2024-39780. Local access is required to approach this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
Currently trending CVE - Hype Score: 26 - A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential.
This vulnerability is due to an undocumented static user credential for an administrative ...
Apple backports three critical vulnerabilities actively exploited in attacks against older iOS and macOS models. Apple has backported fixes for three actively exploited vulnerabilities to older devices and OS versions. The three vulnerabilities are: Apple released the following updates: that are available for the following devices: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, newsletter)
A vulnerability was found in Vasion Print Virtual Appliance Host and classified as problematic. Affected by this issue is some unknown functionality of the component Antivirus Protection. The manipulation leads to protection mechanism failure.
This vulnerability is handled as CVE-2025-27665. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Vasion Print Virtual Appliance Host. Affected is an unknown function. The manipulation leads to improper authorization.
This vulnerability is traded as CVE-2025-27666. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Vasion Print Virtual Appliance Host up to 22.0.842 and classified as critical. This issue affects some unknown processing. The manipulation leads to code injection.
The identification of this vulnerability is CVE-2025-27678. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Vasion Print Virtual Appliance Host up to 22.0.842. It has been classified as critical. Affected is an unknown function. The manipulation leads to resource consumption.
This vulnerability is traded as CVE-2025-27669. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Vasion Print Virtual Appliance Host. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component User Email Handler. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2025-27667. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Vasion Print Virtual Appliance Host. This affects an unknown part. The manipulation leads to improper verification of cryptographic signature.
This vulnerability is uniquely identified as CVE-2025-27670. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.