The sprawling Domain Awareness System violates New York City residents' constitutional rights, an advocacy group says in a lawsuit filed on behalf of people who have an NYPD camera pointed at their home.
A vulnerability described as critical has been identified in Wavlink QUANTUM D3G WL-WN530HG3 M30HG3_V240730. The affected element is an unknown function of the file login.cgi. Such manipulation of the argument referrer leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2025-61128. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability marked as critical has been reported in IBM Concert up to 2.0.0. Impacted is an unknown function. This manipulation causes server-side request forgery.
This vulnerability appears as CVE-2025-36085. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
Currently trending CVE - Hype Score: 5 - PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Cross-Site Scripting (XSS) vulnerability in the code which translates the XLSX file into a HTML representation and displays it in the response.
A vulnerability labeled as critical has been found in Krita. This issue affects some unknown processing of the component TGA File Parser. The manipulation results in heap-based buffer overflow.
This vulnerability is reported as CVE-2025-59820. The attack can be launched remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in IBM Concert Software up to 2.0.0. This vulnerability affects unknown code. The manipulation leads to improper clearing of heap memory before release.
This vulnerability is documented as CVE-2025-36083. The attack needs to be performed locally. There is not any exploit available.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in IBM Concert Software up to 2.0.0. This affects an unknown part. Executing manipulation can lead to improper output neutralization for logs.
This vulnerability is registered as CVE-2025-36081. It is possible to launch the attack remotely. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in IPFire up to 2.28. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /cgi-bin/urlfilter.cgi of the component Web Interface. Performing manipulation of the argument QUOTA_USERS results in cross site scripting.
This vulnerability is cataloged as CVE-2025-34313. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in IPFire up to 2.28. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/ids.cgi of the component Web Interface. Such manipulation of the argument IGNORE_ENTRY_REMARK leads to cross site scripting.
This vulnerability is listed as CVE-2025-34303. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in IPFire up to 2.28. It has been classified as problematic. Affected is an unknown function of the component Web Interface. This manipulation causes cross site scripting.
This vulnerability is tracked as CVE-2025-34302. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in IPFire up to 2.28 and classified as problematic. This impacts an unknown function of the file /cgi-bin/dns.cgi of the component Web Interface. The manipulation of the argument TLS_HOSTNAME/UPSTREAM_USER/UPSTREAM_PASSWORD/ADMIN_MAIL_ADDRESS/ADMIN_PASSWORD results in cross site scripting.
This vulnerability is identified as CVE-2025-34318. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in IPFire up to 2.28 and classified as problematic. This affects an unknown function of the file /cgi-bin/dns.cgi of the component Web Interface. The manipulation of the argument TLS_HOSTNAME leads to cross site scripting.
This vulnerability is referenced as CVE-2025-34317. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in IPFire up to 2.28. The impacted element is an unknown function of the file /cgi-bin/mail.cgi of the component Web Interface. Executing manipulation of the argument txt_mailuser/txt_mailpass can lead to cross site scripting.
The identification of this vulnerability is CVE-2025-34316. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in IPFire up to 2.28. The affected element is an unknown function of the file /cgi-bin/logs.cgi/config.dat of the component Web Interface. Performing manipulation of the argument REMOTELOG_ADDR results in cross site scripting.
This vulnerability was named CVE-2025-34315. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in IPFire up to 2.28. Impacted is an unknown function of the file /cgi-bin/urlfilter.cgi of the component Web Interface. Such manipulation of the argument SRC/DST/COMMENT leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-34314. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability classified as problematic has been found in FRRouting FRR up to 10.4.1. This issue affects the function show_vty_ext_pref_pref_sid of the file ospf_ext.c of the component LSA Handler. This manipulation causes null pointer dereference.
This vulnerability is handled as CVE-2025-61107. The attack can only be done within the local network. There is not any exploit available.