A vulnerability classified as problematic has been found in okta okta-sdk-java up to 20.0.0. This impacts the function ApiClient of the component Okta Management API. Performing manipulation results in race condition.
This vulnerability is reported as CVE-2025-67505. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in auth0 nextjs-auth0 up to 4.11.1/4.12.0. This affects the function TokenRequestCache. Such manipulation leads to incorrect authorization.
This vulnerability is documented as CVE-2025-67490. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in GitLab Community Edition and Enterprise Edition up to 18.4.5/18.5.3/18.6.1. The impacted element is an unknown function of the component API Handler. This manipulation causes allocation of resources.
This vulnerability is registered as CVE-2025-14157. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Qihang Media Web Digital Signage 3.0.9. This issue affects some unknown processing of the file QH.aspx. Executing manipulation of the argument data can lead to path traversal.
This vulnerability is tracked as CVE-2020-36898. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability was found in Aqara Camera Hub G3, Hub M2 and Hub M3. It has been rated as critical. This vulnerability affects unknown code. Performing manipulation results in improper certificate validation.
This vulnerability is identified as CVE-2025-65291. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in Aqara Camera Hub G3, Hub M2 and Hub M3. It has been declared as critical. This affects an unknown part of the component Firmware Update Handler. Such manipulation leads to improper certificate validation.
This vulnerability is referenced as CVE-2025-65290. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in Qihang QiHang Media Web Digital Signage 3.0.9.0. It has been classified as problematic. Affected by this issue is some unknown functionality of the file QH.aspx. This manipulation of the argument path/filename causes exposure of backup file to an unauthorized control sphere.
The identification of this vulnerability is CVE-2020-36899. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Qihang QiHang Media Web Digital Signage 3.0.9 and classified as critical. Affected by this vulnerability is an unknown functionality of the file QH.aspx. The manipulation of the argument remotePath/fileToUpload results in unrestricted upload.
This vulnerability was named CVE-2020-36897. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability has been found in GitLab Community Edition and Enterprise Edition up to 18.4.5/18.5.3/18.6.1 and classified as critical. Affected is an unknown function. The manipulation leads to allocation of resources.
This vulnerability is uniquely identified as CVE-2025-4097. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in GitLab Community Edition and Enterprise Edition up to 18.4.5/18.5.3/18.6.1. This impacts an unknown function of the component WebAuthn Two-Factor Authentication. Executing manipulation can lead to authentication bypass using alternate channel.
This vulnerability is handled as CVE-2025-11984. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in auth0 nextjs-auth0 up to 4.12.x. This affects an unknown function. Performing manipulation of the argument returnTo results in incomplete blacklist.
This vulnerability is known as CVE-2025-67716. Remote exploitation of the attack is possible. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in formio Form.io up to 3.5.6/4.4.2 on Serverless. The impacted element is an unknown function of the component API Endpoint. Such manipulation leads to improper handling of case sensitivity.
This vulnerability is traded as CVE-2025-67718. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Mayuri-Chan pyrofork up to 2.3.68. The affected element is an unknown function of the component Telegram Message Handler. This manipulation causes path traversal.
This vulnerability appears as CVE-2025-67720. The attack may be initiated remotely. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in ibexa user up to 5.0.3. Impacted is an unknown function. The manipulation results in unverified password change.
This vulnerability is reported as CVE-2025-67719. The attack requires a local approach. No exploit exists.
Upgrading the affected component is recommended.
英伟达开发出了一种地理位置验证技术去判断 AI 芯片运行时所处的区域位置。它已经在内部演示了该功能,但尚未正式发布。该功能将作为可选的软件工具提供给客户安装。该技术利用了英伟达 GPU 的机密计算能力,通过与英伟达服务器通信的时间延迟估算芯片的地理位置。该技术将首先应用于最新一代的基于 Blackwell 架构的 AI 芯片,英伟达还在考虑将其应用于上一代的 Hopper 架构和 Ampere 架构芯片。该技术有助于解决美国政府对先进 AI 芯片走私到中国的担忧。