Currently trending CVE - Hype Score: 1 - React Router is a multi-strategy router for React bridging the gap from React 18 to React 19. There is a vulnerability in Remix/React Router that affects all Remix 2 and React Router 7 consumers using the Express adapter. Basically, this vulnerability allows anyone to spoof the ...
A vulnerability was found in LOCALSHOP WebService::Xero up to 0.11 on Perl. It has been classified as problematic. Affected is the function Data::random. The manipulation leads to cryptographically weak prng.
This vulnerability is traded as CVE-2024-52322. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in TANIGUCHI Amon2::Auth::Site::LINE up to 0.04 and classified as problematic. This issue affects the function String::random. The manipulation leads to cryptographically weak prng.
The identification of this vulnerability is CVE-2024-57835. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in Facebook WhatsApp Desktop 0.3.3793/0.3.4932/0.3.9309 on Windows and classified as critical. This vulnerability affects unknown code of the component Attachment Handler. The manipulation leads to deployment of wrong handler.
This vulnerability was named CVE-2025-30401. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in NORBU Net::Dropbox::API up to 1.9 on Perl. This affects the function Data::random. The manipulation leads to cryptographically weak prng.
This vulnerability is uniquely identified as CVE-2024-58036. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in LEV Web::API up to 2.8 on Perl. Affected by this issue is the function Data::random. The manipulation leads to cryptographically weak prng.
This vulnerability is handled as CVE-2024-57868. The attack may be launched remotely. There is no exploit available.
一名微软雇员为抗议 AI 而干扰了公司的五十周年庆。微软员工 Ibtihal Aboussad 对 Microsoft AI CEO Mustafa Suleyman 说,你应该感到羞耻,你是一名战争投机分子。停止使用 AI 进行种族灭绝。停止在我们地区使用 AI 进行种族灭绝。你手上沾满了鲜血。整个微软都沾满了鲜血。微软正在杀害儿童,你们怎么敢庆祝。你们都应该感到羞耻。在被带出微软庆祝活动之后,她还向数以千计的员工群发了邮件,阐述了她的动机。
A vulnerability was found in Oracle Complex Maintenance, Repair, and Overhaul up to 12.2.13. It has been classified as critical. This affects an unknown part of the component LOV. The manipulation leads to Remote Code Execution.
This vulnerability is uniquely identified as CVE-2024-21017. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Oracle Complex Maintenance, Repair, and Overhaul up to 12.2.13. It has been rated as critical. This issue affects some unknown processing of the component LOV. The manipulation leads to Remote Code Execution.
The identification of this vulnerability is CVE-2024-21018. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Oracle Complex Maintenance, Repair, and Overhaul up to 12.2.13. Affected is an unknown function of the component LOV. The manipulation leads to Remote Code Execution.
This vulnerability is traded as CVE-2024-21019. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Oracle Complex Maintenance, Repair, and Overhaul up to 12.2.13. Affected by this vulnerability is an unknown functionality of the component LOV. The manipulation leads to Remote Code Execution.
This vulnerability is known as CVE-2024-21020. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.