It has been a few months since my colleague Tony and I published our paper on Logit Gap Steering. In that work, we demonstrated a practical method for steering LLM behavior—specifically bridging the gap between “Refusal” and “Compliance”—by optimizing token sequences.
A vulnerability, which was classified as critical, was found in itsourcecode School Management System 1.0. This impacts an unknown function of the file /ramonsys/user/controller.php. The manipulation of the argument ID results in sql injection.
This vulnerability is reported as CVE-2026-2190. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability has been found in Tenda AC9 15.03.06.42_multi and classified as critical. Affected is the function formGetDdosDefenceList. This manipulation of the argument security.ddos.map causes stack-based buffer overflow.
This vulnerability appears as CVE-2026-2191. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability was found in Tenda AC9 15.03.06.42_multi and classified as critical. Affected by this vulnerability is the function formGetRebootTimer. Such manipulation of the argument sys.schedulereboot.start_time/sys.schedulereboot.end_time leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2026-2192. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in D-Link DI-7100G C1 24.04.18D1. It has been classified as critical. Affected by this issue is the function set_jhttpd_info. Performing a manipulation of the argument usb_username results in command injection.
This vulnerability is known as CVE-2026-2193. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability has been found in Mapnik up to 4.2.0 and classified as problematic. This vulnerability affects the function mapnik::detail::mod<...>::operator of the file src/value.cpp. The manipulation leads to divide by zero.
This vulnerability is documented as CVE-2025-15564. The attack needs to be performed locally. Additionally, an exploit exists.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was found in GNU Binutils 2.45. It has been classified as problematic. This issue affects the function dump_dwarf_section of the file binutils/objdump.c. Performing a manipulation results in out-of-bounds read.
This vulnerability is identified as CVE-2025-11081. The attack is only possible with local access. Additionally, an exploit exists.
It is suggested to install a patch to address this issue.
A vulnerability was found in GNU Binutils 2.45. It has been declared as critical. Impacted is the function _bfd_elf_parse_eh_frame of the file bfd/elf-eh-frame.c of the component Linker. Executing a manipulation can lead to heap-based buffer overflow.
This vulnerability is tracked as CVE-2025-11082. The attack is restricted to local execution. Moreover, an exploit is present.
A patch should be applied to remediate this issue.
The code maintainer replied with "[f]ixed for 2.46".
A vulnerability was found in GNU Binutils 2.45. It has been rated as critical. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow.
This vulnerability is listed as CVE-2025-11083. The attack must be carried out locally. In addition, an exploit is available.
To fix this issue, it is recommended to deploy a patch.
The code maintainer replied with "[f]ixed for 2.46".
A vulnerability was found in Wireshark up to 4.2.13/4.4.9 and classified as problematic. The affected element is an unknown function of the component MONGO Dissector. Executing a manipulation can lead to infinite loop.
This vulnerability is tracked as CVE-2025-11626. The attack can be launched remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.16.10/6.17.0. Affected by this vulnerability is the function blk_mq_tag_update_depth of the component blk-mq. Performing a manipulation results in denial of service.
This vulnerability is reported as CVE-2025-39999. The attacker must have access to the local network to execute the attack. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.12.51/6.16.11/6.17.0 and classified as critical. The affected element is the function rtw89_core_tx_kick_off_and_wait of the file drivers/net/wireless/realtek/rtw89/core.c of the component wifi. Performing a manipulation results in use after free.
This vulnerability was named CVE-2025-40000. The attack needs to be approached within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.6.109/6.12.50/6.16.10/6.17.0. Affected is the function snprintf of the file /drivers/target/target_core_configfs.c of the component scsi. Such manipulation leads to unchecked return value.
This vulnerability is documented as CVE-2025-39998. The attack requires being on the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.16.10/6.17.0. This affects the function snd_usbmidi_free of the component ALSA. This manipulation causes use after free.
This vulnerability appears as CVE-2025-39997. The attacker needs to be present on the local network. There is no available exploit.
It is suggested to upgrade the affected component.