A new investigation of X and its Grok bot will determine whether the company "treated rights of European citizens — including those of women and children — as collateral damage of its service," EU officials said.
A vulnerability identified as problematic has been detected in GPAC up to 2.2.1. The affected element is an unknown function. Performing a manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2023-3012. The attack must be initiated from a local position. There is no exploit available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected is an unknown function of the component Speculative Execution. The manipulation leads to sensitive information in resource not removed before reuse.
This vulnerability is referenced as CVE-2023-3006. Remote exploitation of the attack is possible. No exploit is available.
Applying a patch is the recommended action to fix this issue.
A vulnerability was found in ImageMagick up to 6.9.12-90. It has been classified as problematic. Affected is the function Magick::Draw. Performing a manipulation results in uncontrolled memory allocation.
This vulnerability is reported as CVE-2023-39978. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability, which was classified as problematic, was found in Libbitcoin Explorer up to 3.6.0. This vulnerability affects unknown code. Executing a manipulation can lead to insufficient entropy.
This vulnerability is tracked as CVE-2023-39910. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability classified as problematic was found in Yubico YubiHSM 2 SDK up to 2023.01. Affected is an unknown function of the component PKCS11 Module. Such manipulation leads to uninitialized pointer.
This vulnerability is traded as CVE-2023-39908. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability was found in Clusterlabs libqb up to 2.0.7 and classified as critical. This impacts an unknown function of the file log_blackbox.c of the component Log Message Handler. Such manipulation leads to buffer overflow.
This vulnerability is documented as CVE-2023-39976. The attack requires being on the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Fujitsu Infrastructure Manager 2.8.0.060 and classified as critical. This vulnerability affects unknown code of the file /var/log/fujitsu/ServerViewSuite/ism/FirmwareManagement/FirmwareManagement.log of the component ismsnap. This manipulation causes improper authorization.
The identification of this vulnerability is CVE-2023-39903. The attack can only be executed locally. There is no exploit available.
The affected component should be upgraded.
A vulnerability has been found in NXP i.MX 8M, i.MX 8M Nano, i.MX 8M Mini and i.MX 8M Plus and classified as critical. This vulnerability affects unknown code of the component Flattened Image Tree Format Handler. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2023-39902. An attack has to be approached locally. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, has been found in Apache HDFS Native Client up to 3.4.1. This vulnerability affects unknown code of the component URI Parser. This manipulation causes out-of-bounds write.
This vulnerability appears as CVE-2025-27821. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability described as problematic has been identified in Apache Karaf up to 2.11.x. The affected element is an unknown function of the component Decanter log-socket Collector. Such manipulation leads to deserialization.
This vulnerability is listed as CVE-2026-24656. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
Microsoft warns of a multi-stage phishing and BEC campaign hitting energy firms, abusing SharePoint links and inbox rules to steal credentials. Microsoft reports an active multi-stage phishing campaign targeting energy sector organizations. The campaign misused SharePoint file-sharing to deliver phishing links and created inbox rules to hide malicious activity and maintain persistence. After the initial […]
A vulnerability described as critical has been identified in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5. Affected by this issue is the function skb_vlan_inet_prepare in the library include/net/inet_ecn.h of the component ip6_tunnel. The manipulation results in information disclosure.
This vulnerability is identified as CVE-2026-23003. The attack can only be performed from the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5. Impacted is the function octep_vf_request_irqs. Performing a manipulation results in use after free.
This vulnerability is identified as CVE-2026-23013. The attack can only be performed from the local network. There is not any exploit available.
It is recommended to upgrade the affected component.