A vulnerability labeled as critical has been found in IBM Security Guardium 11.5. The affected element is an unknown function. Such manipulation leads to server-side request forgery.
This vulnerability is listed as CVE-2024-49336. The attack may be performed from remote. There is no available exploit.
The affected component should be upgraded.
A vulnerability has been found in IROAD Dash Cam FX2 up to 20250308 and classified as problematic. This affects an unknown function of the file /mnt/extsd/event/ of the component HTTP/RTSP. The manipulation leads to information disclosure.
This vulnerability is listed as CVE-2025-2348. The attack must be carried out from within the local network. In addition, an exploit is available.
It is recommended to apply restrictive firewalling.
A vulnerability was found in IROAD Dash Cam FX2 up to 20250308 and classified as problematic. This impacts an unknown function of the file /etc/passwd of the component Password Hash Handler. The manipulation results in password hash with insufficient computational effort.
This vulnerability is cataloged as CVE-2025-2349. The attack must originate from the local network. Furthermore, there is an exploit available.
Applying restrictive firewalling is recommended.
A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been classified as critical. Affected is an unknown function of the file /action/upload_file. This manipulation causes unrestricted upload.
This vulnerability is registered as CVE-2025-2350. The attack requires access to the local network. Furthermore, an exploit is available.
It is advisable to implement restrictive firewalling.
A vulnerability has been found in Dromara ujcms 9.7.5 and classified as problematic. This vulnerability affects the function uploadZip/upload of the file /main/java/com/ujcms/cms/ext/web/backendapi/WebFileUploadController.java of the component File Upload. This manipulation causes cross site scripting.
This vulnerability is registered as CVE-2025-2490. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability was found in Linux Kernel up to 6.12.22/6.13.10/6.14.1. It has been rated as problematic. This vulnerability affects unknown code of the component fsl-edma. The manipulation leads to state issue.
This vulnerability is uniquely identified as CVE-2025-38479. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is advised.
A vulnerability described as critical has been identified in Asterisk 22. Affected is the function action_createconfig. The manipulation results in permission issues.
This vulnerability is known as CVE-2024-57520. It is possible to launch the attack remotely. No exploit is available.
A vulnerability described as problematic has been identified in Linux Kernel up to 6.6.86/6.12.22/6.13.10/6.14.1. Impacted is the function mtk_dp_wait_hpd_asserted of the component mediatek. Such manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2025-38240. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability has been found in tj-actions changed-files up to 45.0.7 and classified as problematic. This affects an unknown part. This manipulation causes embedded malicious code.
This vulnerability is registered as CVE-2025-30066. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability marked as problematic has been reported in IBM Sterling File Gateway up to 6.1.2.5/6.2.0.3. This impacts an unknown function of the component Web UI. Performing manipulation results in cross site scripting.
This vulnerability is reported as CVE-2023-52292. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
Also: SBF Appeals Conviction, PHP Exploits Fuel Cryptomining Every week, Information Security Media Group rounds up cybersecurity incidents in digital assets. This week, Europol's 600 million euro fraud network bust, Sam Bankman-Fried conviction appeal, PHP exploits fueled cryptomining campaigns and sentencing set for Samourai Wallet founders.
Statewide Breach Hit 60 Agencies Before Ransomware Was Deployed A threat actor infiltrated Nevada’s statewide systems undetected for months, ultimately disrupting at least 60 agencies by deleting backups and launching ransomware that forced a full rebuild of core infrastructure and triggered a multimillion-dollar emergency response.
Also, Australian Police Arrest 55 in New Round of Anom App Sting This week: UPenn hit by email breach, Australian police arrested 55, 'SesameOp' backdoor hid C2 traffic, BEC scammers used AWS, hackers stole trucking cargo, Ukrainian national extradited to United States for role in Conti ransomware and a supply chain risk in advanced installer tool.
Central Jersey Medical Center Runs Health Centers for Schools in Newark Central Jersey Medical Center, a federally qualified health center that partners with public schools in Newark, New Jersey, is notifying an undisclosed number of people of a data breach related to an August ransomware attack. The incident is latest to hit a resourced-stretched healthcare provider.
A vulnerability was found in strongSwan 5.9.2/5.9.3/5.9.4/5.9.5. It has been declared as problematic. This impacts an unknown function of the component IKE/EAP. The manipulation results in authorization bypass.
This vulnerability is identified as CVE-2022-4967. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in DCN DCME-320-L up to 9.3.2.114. Impacted is an unknown function of the file log_u_umount.php. Executing manipulation can lead to command injection.
This vulnerability is registered as CVE-2024-48659. It is possible to launch the attack remotely. No exploit is available.