A vulnerability classified as critical has been found in PostHog. Affected is an unknown function of the component ClickHouse Table Function Handler. The manipulation leads to sql injection.
This vulnerability is traded as CVE-2025-1520. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
Meredith Whittaker, Signal's CEO, has threatened to pull the company out of Sweden if a proposed government bill requiring encryption backdoors becomes law
OpenAI's newest model, GPT-4.5, is coming sooner than we expected. A new reference has been spotted on ChatGPT's Android app that points to a model called "GPT-4.5 research preview," but it looks like it will initially be limited to those with a Pro subscription. [...]
A vulnerability was found in BeyondTrust Privilege Management for Windows up to 25.1 on Windows. It has been classified as problematic. This affects an unknown part. The manipulation leads to privilege chaining.
This vulnerability is uniquely identified as CVE-2025-0889. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mautic core up to 5.2.2 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to improper authorization.
This vulnerability is handled as CVE-2024-47053. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in quizorganizer Quiz Organizer Plugin up to 2.9.1 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-6810. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Delta Electronics CNCSoft-G2 up to 2.1.0.10. Affected is an unknown function. The manipulation leads to heap-based buffer overflow.
This vulnerability is traded as CVE-2025-22881. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Mautic mautic and core up to 5.2.2. This vulnerability affects unknown code. The manipulation leads to path traversal.
This vulnerability was named CVE-2022-25773. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 5.18.3. This affects the function r8712_read8(padapter/EE_9346CR). The manipulation of the argument tmpU1b leads to improper initialization.
This vulnerability is uniquely identified as CVE-2022-49298. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.17.0. It has been rated as problematic. Affected by this issue is the function vmalloc. The manipulation leads to allocation of resources.
This vulnerability is handled as CVE-2022-49292. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.