A vulnerability, which was classified as problematic, has been found in Alkacon OpenCMS 17.0. This issue affects some unknown processing of the component Article Handler. The manipulation of the argument image leads to cross site scripting.
The identification of this vulnerability is CVE-2024-41446. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in MCMS 5.4.3. Affected is an unknown function. The manipulation leads to unrestricted upload.
This vulnerability is traded as CVE-2025-29287. It is possible to launch the attack remotely. There is no exploit available.
Glitch has announced it is ending app hosting and user profiles on July 8, 2025, responding to changing market dynamics and extensive abuse problems that have raised operational costs. [...]
A vulnerability was found in erdogant pypickle up to 1.1.5. It has been classified as critical. This affects the function Save of the file pypickle/pypickle.py. The manipulation leads to improper authorization.
This vulnerability is uniquely identified as CVE-2025-5175. Attacking locally is a requirement. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in erdogant pypickle up to 1.1.5 and classified as problematic. Affected by this issue is the function load of the file pypickle/pypickle.py. The manipulation leads to deserialization.
This vulnerability is handled as CVE-2025-5174. Local access is required to approach this attack. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in HumanSignal label-studio-ml-backend up to 9fb7f4aa186612806af2becfb621f6ed8d9fdbaf and classified as problematic. Affected by this vulnerability is the function load of the file label-studio-ml-backend/label_studio_ml/examples/yolo/utils/neural_nets.py of the component PT File Handler. The manipulation of the argument path leads to deserialization.
This vulnerability is known as CVE-2025-5173. An attack has to be approached locally. There is no exploit available.
This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
A vulnerability, which was classified as critical, was found in Econtrata up to 20250516. Affected is an unknown function of the file /valida. The manipulation of the argument usuario leads to sql injection.
This vulnerability is traded as CVE-2025-5172. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang RVTools Bumblebee Malware Attack – How a Trusted IT Tool Became a Malware Delivery Vector Malicious ‘Checker’ Packages on PyPI Probe TikTok and Instagram for Valid Accounts […]
A vulnerability, which was classified as critical, has been found in llisoft MTA Maita Training System 4.5. This issue affects the function this.fileService.download of the file com\llisoft\controller\OpenController.java. The manipulation of the argument url leads to unrestricted upload.
The identification of this vulnerability is CVE-2025-5171. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as critical was found in llisoft MTA Maita Training System 4.5. This vulnerability affects the function AdminShitiListRequestVo of the file com\llisoft\controller\admin\shiti\AdminShitiController.java. The manipulation of the argument stTypeIds leads to sql injection.
This vulnerability was named CVE-2025-5170. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.