Microsoft is working to fix an ongoing issue causing some users' Windows devices to be offered Windows 11 upgrades despite Intune policies preventing them. [...]
Intro: Why hack in when you can log in?
SaaS applications are the backbone of modern organizations, powering productivity and operational efficiency. But every new app introduces critical security risks through app integrations and multiple users, creating easy access points for threat actors. As a result, SaaS breaches have increased, and according to a May 2024 XM Cyber report, identity and
A vulnerability, which was classified as problematic, was found in User Profile Builder Plugin up to 3.13.5/3.13.6/3.13.7 on WordPress. Affected is an unknown function of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-2314. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability has been found in Supsystic Contact Form Plugin up to 1.7.29 on WordPress and classified as problematic. Affected by this vulnerability is the function saveAsCopy of the component Setting Handler. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2024-13452. The attack can be launched remotely. There is no exploit available.
A vulnerability has been found in Contact Form 7 Plugin up to 6.0.5 on WordPress and classified as critical. Affected by this vulnerability is the function wpcf7_stripe_skip_spam_check of the component Order Handler. The manipulation leads to enforcement of behavioral workflow.
This vulnerability is known as CVE-2025-3247. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Delta Electronics COMMGR. This affects an unknown part of the component Session ID Handler. The manipulation leads to cryptographically weak prng.
This vulnerability is uniquely identified as CVE-2025-3495. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in TOTOLINK A3700R 9.1.2u.5822_B20200513. This issue affects the function setWiFiEasyCfg/setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi of the component Password Handler. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2025-3663. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. Affected is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2025-3664. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in TOTOLINK A3700R 9.1.2u.5822_B20200513 and classified as critical. Affected by this vulnerability is the function setSmartQosCfg of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2025-3665. The attack can be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in TOTOLINK A3700R 9.1.2u.5822_B20200513 and classified as critical. Affected by this issue is the function setDdnsCfg of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2025-3666. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. It has been classified as critical. This affects the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2025-3667. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. It has been declared as critical. This vulnerability affects the function setScheduleCfg of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls.
This vulnerability was named CVE-2025-3668. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. It has been declared as critical. Affected by this vulnerability is the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2025-3674. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. It has been rated as critical. Affected by this issue is the function setL2tpServerCfg of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2025-3675. The attack may be launched remotely. Furthermore, there is an exploit available.