A vulnerability was found in Levcgi.com MyGuestbook 0.6.1 and classified as critical. This impacts an unknown function of the file form.inc.php3. Such manipulation of the argument lang leads to file inclusion.
This vulnerability is traded as CVE-2005-2162. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in MySource 2.14.0/2.14.0rc2. This vulnerability affects unknown code in the library squizlib_path of the file new_upgrade_functions.php. Performing manipulation of the argument PEAR_PATH results in file inclusion.
This vulnerability is known as CVE-2005-3519. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in MySource 2.14.0/2.14.0rc2. This issue affects some unknown processing of the file upgrade_in_progress_backend.php. Executing manipulation of the argument bgcolor can lead to basic cross site scripting.
This vulnerability is handled as CVE-2005-3520. The attack can be executed remotely. Additionally, an exploit exists.
Upgrading the affected component is advised.
A vulnerability identified as critical has been detected in MyBB 1.00 Rc4 Security Patch. The affected element is an unknown function of the file index.php. The manipulation of the argument polloptions leads to sql injection.
This vulnerability is documented as CVE-2005-2580. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability categorized as critical has been discovered in MyBB. This affects an unknown part of the file reputation.php. The manipulation of the argument pid results in sql injection.
This vulnerability is cataloged as CVE-2005-1833. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability marked as problematic has been reported in Cisco SD-WAN vManage Software. The impacted element is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is listed as CVE-2023-20113. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability was found in Cross Referencer LXR 0.3/0.8/0.9/0.9.1/0.9.2. It has been rated as critical. Impacted is an unknown function. Performing manipulation of the argument v results in path traversal.
This vulnerability was named CVE-2003-0156. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability classified as problematic was found in Linux Kernel up to 6.16-rc4. The impacted element is the function xdp_linearize_page of the component virtio-net. Executing manipulation can lead to out-of-bounds read.
This vulnerability is tracked as CVE-2025-38375. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is advised.
A vulnerability categorized as problematic has been discovered in Linux Kernel up to 6.1.143/6.6.96/6.12.36/6.15.5/6.16-rc4. The impacted element is the function __inode_add_ref of the component btrfs. Such manipulation leads to improper initialization.
This vulnerability is traded as CVE-2025-38382. Access to the local network is required for this attack to succeed. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.142/6.6.95/6.12.35/6.15.4/6.16-rc3. It has been declared as critical. Affected is the function btrfs_unlink of the component btrfs. Such manipulation of the argument last_unlink_trans leads to race condition.
This vulnerability is traded as CVE-2025-38365. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.1.145/6.6.98/6.12.35/6.15.4/6.16-rc3. The affected element is the function mas_preallocate of the component maple_tree. Such manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2025-38364. The attack can only be initiated within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.6.98/6.12.38/6.15.6/6.16-rc5. This impacts an unknown function of the component eventpoll. Executing manipulation can lead to use after free.
The identification of this vulnerability is CVE-2025-38349. The attack needs to be done within the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.15.3. It has been declared as critical. This affects the function jbd2_journal_dirty_metadata of the component jbd2. The manipulation results in null pointer dereference.
This vulnerability is reported as CVE-2025-38337. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.1.141/6.6.94/6.12.34/6.15.3. Affected by this vulnerability is the function arch_memory_failure of the component SGX Page. Performing manipulation results in state issue.
This vulnerability is known as CVE-2025-38334. Access to the local network is required for this attack. No exploit is available.
You should upgrade the affected component.
A vulnerability labeled as problematic has been found in Linux Kernel up to 6.15.3. Affected by this issue is the function gpio_keys_irq_timer of the file kernel/locking/spinlock_rt.c. Executing manipulation can lead to privilege escalation.
This vulnerability is handled as CVE-2025-38335. The attack can only be done within the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability categorized as critical has been discovered in Sendmail. The affected element is the function prescan of the component NOCHAR Handler. Executing manipulation can lead to memory corruption.
This vulnerability is tracked as CVE-2003-0161. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability marked as very critical has been reported in Sendmail. This vulnerability affects unknown code. This manipulation causes memory corruption.
This vulnerability is registered as CVE-2003-0161. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
It is suggested to upgrade the affected component.
A vulnerability identified as critical has been detected in Apple QuickTime 5.x/6.0 on Windows. Affected by this issue is some unknown functionality. The manipulation with the input quicktime://www.example.invalid/[ax400] leads to memory corruption.
This vulnerability is listed as CVE-2003-0168. The attack may be initiated remotely. In addition, an exploit is available.
You should upgrade the affected component.
Imagine a malicious instruction hidden in plain sight, invisible to you but not to the AI. This is a vulnerability discovered in Windsurf Cascade, it follows invisible instructions. This means there can be instructions in a file or result of a tool call that the developer cannot see, but the LLM does.
Some LLMs interpret invisible Unicode Tag characters as instructions, which can lead to hidden prompt injection.
As far as I can tell the Windsurf SWE-1 model can also “see” these invisible characters, but the SWE-1 is not yet capable of interpreting them as instructions.