A new malware called ZionSiphon, specifically designed for operational technology, is targeting water treatment and desalination environments to sabotage their operations. [...]
A vulnerability classified as critical has been found in Cisco Identity Services Engine Software. Affected is an unknown function. Performing a manipulation results in path traversal.
This vulnerability is identified as CVE-2026-20180. The attack can be initiated remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Cisco Identity Services Engine Software. Affected by this vulnerability is an unknown functionality. Executing a manipulation can lead to command injection.
This vulnerability is tracked as CVE-2026-20186. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability described as critical has been identified in Cisco Identity Services Engine Software and ISE Passive Identity Connector. This impacts an unknown function. Such manipulation leads to command injection.
This vulnerability is referenced as CVE-2026-20147. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, has been found in Cisco Identity Services Engine Software and ISE Passive Identity Connector. Affected by this issue is some unknown functionality of the component HTTP Handler. The manipulation leads to path traversal.
This vulnerability is listed as CVE-2026-20148. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Cisco Identity Services Engine Software. This affects an unknown function of the component CLI. The manipulation results in command injection.
This vulnerability is known as CVE-2026-20136. Attacking locally is a requirement. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability identified as problematic has been detected in Cisco Identity Services Engine Software. This impacts an unknown function. This manipulation causes cross site scripting.
This vulnerability is handled as CVE-2026-20132. The attack can be initiated remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability was found in Cisco Unity Connection up to 15SU3. It has been classified as critical. Impacted is an unknown function of the component Web-based Management Interface. Performing a manipulation results in sql injection.
This vulnerability is reported as CVE-2026-20061. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in Cisco Unity Connection up to 15SU3 and classified as problematic. This issue affects some unknown processing of the component Web-based Management Interface. Such manipulation of the argument Request leads to open redirect.
This vulnerability is documented as CVE-2026-20060. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability marked as problematic has been reported in Cisco Unity Connection up to 15SU4. Affected by this vulnerability is an unknown functionality of the component Web-based Management Interface. Performing a manipulation results in cross site scripting.
This vulnerability was named CVE-2026-20059. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
The National Institute of Standards and Technology is carving a new path for vulnerability remediation by changing the way it prioritizes software flaws.
A vulnerability classified as critical has been found in Vim up to 9.1.2131. This affects the function get_tagfname of the file src/tag.c. The manipulation of the argument helpfile leads to heap-based buffer overflow.
This vulnerability is traded as CVE-2026-25749. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in vim up to 9.2.0077. This affects the function build_stl_str_hl. The manipulation leads to stack-based buffer overflow.
This vulnerability is documented as CVE-2026-28422. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability described as critical has been identified in Dell Storage Manager up to 8.0. Affected by this issue is some unknown functionality. Such manipulation leads to improper privilege management.
This vulnerability is listed as CVE-2026-23772. The attack must be carried out locally. There is no available exploit.
A vulnerability classified as critical has been found in vim up to 9.2.0075. Affected by this vulnerability is an unknown functionality. Performing a manipulation results in heap-based buffer overflow.
This vulnerability is cataloged as CVE-2026-28420. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in vim up to 9.2.0076. Affected by this issue is some unknown functionality. Executing a manipulation of the argument unvalidated can lead to memory corruption.
This vulnerability is registered as CVE-2026-28421. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is advised.
A vulnerability, which was classified as problematic, was found in Google Android 10.0/11.0/12.0/13.0. The impacted element is the function NotificationChannel of the file NotificationChannel.java. The manipulation results in resource consumption.
This vulnerability is cataloged as CVE-2022-20484. The attack must be initiated from a local position. There is no exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability labeled as problematic has been found in Google Android 10.0/11.0/12.0/13.0. Affected is an unknown function of the file avrc_pars_ct.cc of the component AVRC Response Parser. Such manipulation leads to out-of-bounds read.
This vulnerability is documented as CVE-2022-20483. The attack can be executed remotely. There is not any exploit available.
Applying a patch is advised to resolve this issue.
A vulnerability, which was classified as problematic, has been found in Google Android 12.0/13.0. The affected element is the function createNotificationChannel of the file NotificationManager.java. The manipulation leads to resource consumption.
This vulnerability is listed as CVE-2022-20482. The attack must be carried out locally. There is no available exploit.
Applying a patch is the recommended action to fix this issue.
A vulnerability was found in Google Android 10.0/11.0/12.0/13.0. It has been declared as problematic. The impacted element is an unknown function of the component WiFi Setting Handler. The manipulation results in information disclosure.
This vulnerability is identified as CVE-2022-20481. The attack is only possible with local access. There is not any exploit available.
Applying a patch is advised to resolve this issue.