While Israel and Iranian proxies fight it out IRL, their conflict in cyberspace has developed in parallel. These days attacks have decelerated, but advanced in sophistication.
A vulnerability was found in Apache Traffic Server up to 9.2.9/10.0.4. It has been declared as critical. This vulnerability affects unknown code of the component Chunked Message Body Handler. The manipulation leads to http request smuggling.
This vulnerability was named CVE-2024-53868. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in LuckyWP Table of Contents Plugin up to 2.1.10 on WordPress. It has been classified as problematic. This affects the function ajaxEdit. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2025-2299. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Modula Image Gallery Plugin up to 2.10.1/5.0.36 on WordPress and classified as problematic. Affected by this issue is some unknown functionality of the component FancyBox JavaScript Library. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-9416. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Rarlab WinRAR up to 7.10 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Mark of the Web. The manipulation leads to product ui does not warn user of unsafe actions.
This vulnerability is known as CVE-2025-31334. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Concrete CMS up to 8.5.19/9.3.4RC1. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-3153. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Arduino IDE up to 2.3.4. This issue affects some unknown processing of the component Settings Section. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2025-27608. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in HCL DevOps Deploy and Launch. This vulnerability affects unknown code of the component Agent Relay Service. The manipulation leads to missing authentication.
This vulnerability was named CVE-2025-0257. The attack can only be done within the local network. There is no exploit available.
A vulnerability classified as critical has been found in Xpdf up to 4.05. This affects an unknown part. The manipulation of the argument VerticesPerRow leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2025-3154. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Drupal Obfuscate up to 2.0.0. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-3130. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Red Hat Enterprise Linux 6/7/8/9. It has been declared as critical. Affected by this vulnerability is the function skip_insight_whitespace of the component libsoup. The manipulation leads to out-of-bounds read.
This vulnerability is known as CVE-2025-2784. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Yubico YubiKey up to 5.7.3. It has been classified as problematic. Affected is an unknown function of the component CTAP PIN UV Auth Protocol One. The manipulation leads to weak authentication.
This vulnerability is traded as CVE-2025-29991. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in conda-forge infrastructure up to 2025-04-01 and classified as very critical. This issue affects some unknown processing of the component Azure Token Handler. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2025-31484. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in tauri-apps plugins-workspace up to 2.2.0 on Linux and classified as very critical. This vulnerability affects unknown code of the component Open Endpoint. The manipulation leads to improper input validation.
This vulnerability was named CVE-2025-31477. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in OpenVPN up to 2.6.13. This affects an unknown part of the component Server Mode. The manipulation leads to improper check for unusual conditions.
This vulnerability is uniquely identified as CVE-2025-2704. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Drupal Access code up to 2.0.3. Affected by this issue is some unknown functionality. The manipulation leads to improper restriction of excessive authentication attempts.
This vulnerability is handled as CVE-2025-3129. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Canonical get-workflow-version-action up to 1.0.0. Affected by this vulnerability is an unknown functionality. The manipulation leads to sensitive information in log files.
This vulnerability is known as CVE-2025-31479. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in vercel next.js 12.3.5/13.5.9/14.2.25/15.2.3. Affected is an unknown function. The manipulation of the argument x-middleware-subrequest-id leads to information disclosure.
This vulnerability is traded as CVE-2025-30218. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.