Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to be created with the help of artificial intelligence – in other words, vibe-coded.
Secure Annex researcher John Tuckner, who flagged the extension "susvsex," said it does not attempt to hide its malicious functionality. The extension was uploaded on
A vulnerability was found in Google Chrome. It has been classified as critical. Affected by this issue is some unknown functionality of the component Omnibox. Performing manipulation results in Remote Code Execution.
This vulnerability is reported as CVE-2025-12729. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in Google Chrome and classified as critical. Affected by this vulnerability is an unknown functionality of the component Omnibox. Such manipulation leads to Remote Code Execution.
This vulnerability is documented as CVE-2025-12728. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Google Chrome and classified as critical. Affected is an unknown function of the component V8. This manipulation causes Remote Code Execution.
This vulnerability is registered as CVE-2025-12727. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in Google Chrome. This impacts an unknown function of the component Views. The manipulation results in Remote Code Execution.
This vulnerability is cataloged as CVE-2025-12726. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Google Chrome. This affects an unknown function of the component WebGPU. The manipulation leads to out-of-bounds write.
This vulnerability is listed as CVE-2025-12725. The attack may be initiated remotely. In addition, an exploit is available.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in MacWarrior clipbucket-v5 up to 5.5.2-#146. The impacted element is an unknown function of the component Manage Playlists Feature. Executing manipulation of the argument Name can lead to cross site scripting.
This vulnerability is tracked as CVE-2025-64339. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability classified as problematic has been found in MacWarrior clipbucket-v5 up to 5.5.2-#146. The affected element is an unknown function of the component Manage Photos. Performing manipulation results in cross site scripting.
This vulnerability is identified as CVE-2025-64336. The attack can be initiated remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Advantech DeviceOn and iEdge up to 2.0.2. Impacted is an unknown function of the component Dashboard Label. Such manipulation leads to cross site scripting. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is referenced as CVE-2025-64302. It is possible to launch the attack remotely. No exploit is available.
A vulnerability marked as problematic has been reported in MatiasDesuu ThinkDashboard up to 0.6.7. This issue affects some unknown processing of the component Dashboard. This manipulation causes cross site scripting.
The identification of this vulnerability is CVE-2025-64177. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in MatiasDesuu ThinkDashboard up to 0.6.7. This vulnerability affects unknown code of the file /api/ping. The manipulation of the argument url results in server-side request forgery.
This vulnerability was named CVE-2025-64327. The attack may be performed from remote. There is no available exploit.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in conda constructor up to 3.12.x. This affects an unknown part. The manipulation leads to authentication bypass by alternate name.
This vulnerability is uniquely identified as CVE-2025-64343. Local access is required to approach this attack. No exploit exists.
You should upgrade the affected component.