The North Korean threat actor known as UNC4899 is suspected to be behind a sophisticated cloud compromise campaign targeting a cryptocurrency organization in 2025 to steal millions of dollars in cryptocurrency.
The activity has been attributed with moderate confidence to the state-sponsored adversary, which is also tracked under the cryptonyms Jade Sleet, PUKCHONG, Slow Pisces, and
A vulnerability was found in VMware Workspace one UEM Console. It has been declared as critical. The affected element is an unknown function. Executing a manipulation can lead to server-side request forgery.
This vulnerability is handled as CVE-2021-22054. The attack can only be done within the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in WasmEdge up to 0.16.0-alpha.2. This affects the function checkAccessBound of the file WasmEdge/include/runtime/instance/memory.h. Such manipulation leads to integer overflow.
This vulnerability is referenced as CVE-2025-69261. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
A vulnerability was found in jvoisin snuffleupagus up to 0.12.x and classified as critical. Affected by this vulnerability is an unknown functionality of the component POST Request Handler. Executing a manipulation can lead to not failing securely.
This vulnerability is registered as CVE-2026-22034. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability has been found in TP-Link Systems Archer MR600 5.0 and classified as critical. Affected is an unknown function of the component Admin Interface. Performing a manipulation results in command injection.
This vulnerability is identified as CVE-2025-14756. The attack can only be performed from the local network. There is not any exploit available.
A vulnerability classified as problematic was found in Commerce Paybox up to 7.x-1.5 on Drupal. This affects an unknown function. Executing a manipulation can lead to improper verification of cryptographic signature.
This vulnerability is tracked as CVE-2026-0750. The attack can be launched remotely. No exploit exists.
A vulnerability described as critical has been identified in Netgear R6230, R6260, R7000, R8900, R9000, XR300, RBR20, RBR50, RBS20 and RBS50. This impacts an unknown function of the component FunJSQ. Executing a manipulation can lead to improper certificate validation.
The identification of this vulnerability is CVE-2022-40620. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Netgear R6230, R6260, R7000, R8900, R9000, XR300, RBR20, RBR50, RBS20 and RBS50. It has been rated as critical. Affected is an unknown function of the component LAN Interface. Performing a manipulation of the argument funjsq_access_token results in command injection.
This vulnerability is reported as CVE-2022-40619. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is advised.
A vulnerability, which was classified as problematic, has been found in Form Builder up to 7.x-1.22 on Drupal. The impacted element is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is referenced as CVE-2026-0749. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability, which was classified as critical, has been found in Dell PremierColor Panel Driver. Affected is an unknown function. This manipulation causes improper access controls.
The identification of this vulnerability is CVE-2025-46691. The attack can only be executed locally. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Tanium Asset up to 1.28.253/1.32.160/1.33.249. Affected by this issue is some unknown functionality. The manipulation results in sql injection.
This vulnerability is cataloged as CVE-2025-15344. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in assertj up to 3.27.6. The affected element is the function toXmlDocument of the component org.assertj.core.util.xml.XmlStringPrettyFormatter. This manipulation causes xml external entity reference.
This vulnerability is handled as CVE-2026-24400. It is possible to launch the attack on the local host. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability has been found in Bokeh up to 3.8.1 and classified as critical. Impacted is an unknown function of the component Websocket Connection Handler. Performing a manipulation results in missing origin validation in websockets.
This vulnerability was named CVE-2026-21883. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in rezmoss axios4go up to 0.6.3. Affected is an unknown function of the component Shared HTTP Client Configuration Handler. The manipulation results in race condition.
This vulnerability is known as CVE-2026-21697. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
A vulnerability was found in lemon8866 StreamVault 250822. It has been classified as critical. This affects an unknown part of the file YtDlpUtil.java. The manipulation of the argument yt-dlp leads to os command injection.
This vulnerability is listed as CVE-2025-66203. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability has been found in Django up to 4.2.28/5.2.11/6.0.2 on Windows and classified as problematic. Affected by this issue is the function urllib.parse.urlsplit of the component NFKC Normalization. This manipulation causes resource consumption.
This vulnerability is tracked as CVE-2026-25673. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.