A vulnerability has been found in OctoPrint up to 1.11.3 and classified as problematic. The impacted element is an unknown function of the component File Handler. The manipulation leads to basic cross site scripting.
This vulnerability is documented as CVE-2025-64187. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability has been found in 1Panel-dev MaxKB up to 2.3.0 and classified as critical. This impacts an unknown function of the component Tool Module. The manipulation leads to server-side request forgery.
This vulnerability is listed as CVE-2025-64511. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in 1Panel-dev MaxKB up to 2.3.0. It has been classified as problematic. Affected by this vulnerability is an unknown functionality of the component Tool Module. This manipulation causes information disclosure.
This vulnerability is registered as CVE-2025-64703. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability labeled as critical has been found in Zitadel up to 2.71.18/3.4.3/4.6.5. Impacted is an unknown function. The manipulation results in improper authentication.
This vulnerability is known as CVE-2025-64717. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
A vulnerability described as problematic has been identified in JCD Windu CMS 4.1. This impacts an unknown function. Such manipulation leads to observable response discrepancy.
This vulnerability is uniquely identified as CVE-2025-59116. The attack can be launched remotely. No exploit exists.
A vulnerability marked as problematic has been reported in JCD Windu CMS 4.1. This affects an unknown function. This manipulation of the argument loginError causes improper restriction of excessive authentication attempts.
This vulnerability is handled as CVE-2025-59113. The attack can be initiated remotely. There is not any exploit available.
A vulnerability, which was classified as problematic, has been found in JCD Windu CMS 4.1. Affected by this issue is some unknown functionality. The manipulation leads to incorrect authorization.
This vulnerability is referenced as CVE-2025-59111. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability, which was classified as problematic, was found in JCD Windu CMS 4.1. This affects an unknown part of the component POST Request Handler. The manipulation results in cross-site request forgery.
This vulnerability is identified as CVE-2025-59112. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in JCD Windu CMS 4.1. It has been classified as problematic. Impacted is an unknown function. Performing manipulation results in cross-site request forgery.
This vulnerability is cataloged as CVE-2025-59110. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in JCD Windu CMS 4.1 and classified as problematic. This vulnerability affects unknown code. This manipulation causes cross-site request forgery.
This vulnerability is tracked as CVE-2025-59114. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in JCD Windu CMS 4.1. It has been declared as problematic. The affected element is an unknown function of the component Logon Page. Executing manipulation can lead to cross site scripting.
This vulnerability is registered as CVE-2025-59115. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in mruby up to 3.4.0. It has been declared as critical. This vulnerability affects the function sort_cmp of the file src/array.c. Such manipulation leads to use after free.
This vulnerability is traded as CVE-2025-13120. An attack has to be approached locally. Furthermore, there is an exploit available.
It is advisable to implement a patch to correct this issue.
Two hacking groups with ties to China have been observed weaponizing the newly disclosed security flaw in React Server Components (RSC) within hours of it becoming public knowledge.
The vulnerability in question is CVE-2025-55182 (CVSS score: 10.0), aka React2Shell, which allows unauthenticated remote code execution. It has been addressed in React versions 19.0.1, 19.1.2, and 19.2.1.
According
X's paid "blue checkmark" system for verifying users and other aspects of the platform violate the EU's Digital Services Act, the European Commission said in fining the company €120 million ($139 million).
Also, Microsoft Badly Patches LNK Flaw, Australian Sentenced for 'Evil Twin' Hack This week, the React flaw, a belated Windows fix, Defense Secretary Pete Hegseth's Signal group posed operational risk, more North Korean npm packages. An Australian jailed for Wi-Fi "evil twin" crimes. The US FTC will send $15.3 million to Avast users. A London council said attackers stole data.
Chinese-Linked Malware Campaign Targets Critical Environments With Weak Monitoring U.S. and Canadian cyber authorities say Chinese state-backed actors used a backdoor dubbed BRICKSTORM to maintain long-term access into critical infrastructure, exploiting VMware environments to exfiltrate credentials and evade detection through encrypted covert channels.