Hackread.com exclusive: Scammers are using verified PayPal invoices to launch callback phishing attacks. Learn how the "Alexzander" invoice bypasses Google filters.
Hackers are actively exploiting a maximum severity flaw in the Modular DS WordPress plugin that allows them to bypass authentication remotely and access the vulnerable sites with admin-level privileges. [...]
A vulnerability has been found in xwikisas xwiki-pro-macros up to 1.26.x and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to missing authorization.
This vulnerability is listed as CVE-2025-65089. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
A vulnerability categorized as critical has been discovered in esm-dev esm.sh up to 135. The affected element is an unknown function of the component CDN Service. Executing a manipulation can lead to path traversal.
This vulnerability appears as CVE-2025-65025. The attack may be performed from remote. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in esm-dev esm.sh up to 135. The impacted element is an unknown function of the component CDN Service. The manipulation of the argument module leads to code injection.
This vulnerability is traded as CVE-2025-65026. It is possible to initiate the attack remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability categorized as very critical has been discovered in Entrust Instant Financial Issuance up to 5.x/6.10.4/6.11.0. The affected element is an unknown function of the component Legacy Remoting Service. Such manipulation leads to deserialization.
This vulnerability is uniquely identified as CVE-2025-34414. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability has been found in BullWall Ransomware Containment 4.6.0.0/4.6.0.6/4.6.0.7/4.6.1.4 and classified as problematic. The impacted element is an unknown function. The manipulation leads to security check for standard.
This vulnerability is uniquely identified as CVE-2025-62002. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability described as critical has been identified in Sharp Display Solutions Media Player MP-01. This impacts an unknown function of the component Web Interface. Executing a manipulation can lead to missing authentication. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is registered as CVE-2025-12049. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in OpenSMTPD 7.7.0. It has been rated as problematic. This vulnerability affects unknown code of the file smtpd.sock of the component Unix Domain Socket Handler. This manipulation causes memory leak.
This vulnerability appears as CVE-2025-62875. The attack requires local access. There is no available exploit.
To fix this issue, it is recommended to deploy a patch.
A vulnerability, which was classified as critical, was found in ajayrandhawa User-Management-PHP-MYSQL up to fedcf58797bf2791591606f7b61fdad99ad8bff1. This affects an unknown part of the file /admin/edit-user.php of the component User Management Interface. Such manipulation of the argument image leads to unrestricted upload.
This vulnerability is referenced as CVE-2025-12201. It is possible to launch the attack remotely. Furthermore, an exploit is available.
This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in Mozilla Firefox up to 146 and classified as problematic. Affected is an unknown function of the component Networking. Performing a manipulation results in information disclosure.
This vulnerability is identified as CVE-2026-0883. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability was found in Mozilla Firefox up to 146. It has been declared as critical. This affects an unknown part of the component JavaScript Engine. The manipulation results in use after free.
This vulnerability is cataloged as CVE-2026-0884. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mozilla Firefox up to 146. It has been rated as critical. This vulnerability affects unknown code of the component Javascript GC. This manipulation causes use after free.
This vulnerability is registered as CVE-2026-0885. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is advised.