As quantum quietly moves beyond lab experiment and into production workflows, here's what enterprise security leaders should be focused on, according to Lineswala.
A vulnerability, which was classified as critical, has been found in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this issue is the function zfilev2_api.OpenSafe of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation of the argument safe_dir causes command injection.
The identification of this vulnerability is CVE-2025-14108. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as critical was found in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this vulnerability is the function zfilev2_api.SafeStatus of the file /v2/file/safe/status of the component HTTP POST Request Handler. The manipulation of the argument safe_dir results in command injection.
This vulnerability was named CVE-2025-14107. The attack may be performed from remote. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as critical has been found in ZSPACE Q2C NAS up to 1.1.0210050. Affected is the function zfilev2_api.CloseSafe of the file /v2/file/safe/close of the component HTTP POST Request Handler. The manipulation of the argument safe_dir leads to command injection.
This vulnerability is uniquely identified as CVE-2025-14106. The attack is possible to be carried out remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in JCD Windu CMS 4.1 and classified as problematic. This issue affects some unknown processing of the file windu/admin/content/pages/edit/ of the component Page Editing Endpoint. Such manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2025-59117. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in vLLM up to 0.11.0. It has been rated as critical. The impacted element is an unknown function of the component Supported Models Page. This manipulation causes improper validation of array index.
The identification of this vulnerability is CVE-2025-62372. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability marked as critical has been reported in anthropics claude-code up to 2.0.30. Affected by this vulnerability is an unknown functionality of the component sed. The manipulation leads to os command injection.
This vulnerability is listed as CVE-2025-64755. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Craig Hewitt Seriously Simple Podcasting Plugin up to 3.13.0 on WordPress. This impacts an unknown function. Performing manipulation results in cross-site request forgery.
This vulnerability was named CVE-2025-66061. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in wolfSSL 5.8.4. It has been rated as critical. This affects the function wc_XChaCha20Poly1305_Decrypt. Performing manipulation results in integer underflow.
This vulnerability is identified as CVE-2025-11931. The attack can be initiated remotely. There is not any exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability was found in wolfSSL 5.8.4. It has been classified as problematic. This vulnerability affects unknown code of the component TLS 1.3 PSK Binder. Performing manipulation results in information exposure through discrepancy.
This vulnerability was named CVE-2025-11932. The attack may be initiated remotely. There is no available exploit.
It is recommended to apply a patch to fix this issue.