While 34 countries worldwide already use some form of e-voting, the Philippines can serve as a model for what a secure online voting operation looks like.
A vulnerability described as problematic has been identified in GoGo protobuf up to 1.3.1. This impacts an unknown function of the file plugin/unmarshal/unmarshal.go. The manipulation results in improper validation of array index.
This vulnerability is known as CVE-2021-3121. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in cmake 4.1.20250725-gb5cce23. This affects the function cmForEachFunctionBlocker::ReplayItems of the file cmForEachCommand.cxx. This manipulation causes reachable assertion.
This vulnerability is registered as CVE-2025-9301. The attack needs to be launched locally. Furthermore, an exploit is available.
It is suggested to install a patch to address this issue.
A vulnerability, which was classified as critical, has been found in Citrix NetScaler ADC and NetScaler Gateway up to 37.240/47.47/55.329/59.21. This issue affects some unknown processing of the component Management Interface. The manipulation leads to improper validation of specified quantity in input.
This vulnerability is listed as CVE-2025-8424. The attack must be carried out from within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Cisco ASA and Firepower Threat Defense. This issue affects some unknown processing of the component NAT DNS Inspection. Performing manipulation results in infinite loop.
This vulnerability is identified as CVE-2025-20136. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Cisco ASA and Firepower Threat Defense Software. It has been classified as critical. This affects an unknown function of the component SSL VPN Service. This manipulation causes improper validation of specified type of input.
This vulnerability is registered as CVE-2025-20244. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is recommended.
ACI Worldwide's Signals Network Intelligence Technology Promises to Fight APP Scams Real-time payments are set to boost global GDP by $285.8 billion and bring 167 million people into the financial system by 2028. ACI Worldwide says real-time fraud prevention is key to protecting these gains.
Security Leaders Weighed AI's Promise, Perils and the Need for Transparency AI is actively reshaping the future enterprise operations today. At the Cybersecurity Implications of AI virtual summit, CISOs, tech leaders and AI innovators from across North America, EMEA and APAC examined both the promise and the peril of AI adoption in cybersecurity.
Researchers say the huge spike of coordinated scanning for Microsoft RDP services could indicate the existence of a new, as-yet-undisclosed vulnerability.
Whether you lead a small or medium business or are an employee, email configuration is a key component to ensuring that your organization is protected against various cyber threats
Citrix addressed three vulnerabilities in NetScaler ADC and NetScaler Gateway, including one that has been actively exploited in the wild. Citrix addressed three security flaws (CVE-2025-7775, CVE-2025-7776, CVE-2025-8424) in NetScaler ADC and NetScaler Gateway, including one (CVE-2025-7775) that it said has been actively exploited in the wild. “Exploits of CVE-2025-7775 on unmitigated appliances have been observed.” […]
A vulnerability marked as problematic has been reported in LibTIFF. This affects an unknown function of the component TIFF File Handler. The manipulation leads to improper resource management.
This vulnerability is traded as CVE-2015-7313. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to install a patch to address this issue.
A vulnerability, which was classified as problematic, has been found in BlackBerry QNX Software Development Platform up to 6.5.0 SP1/6.6.0. Impacted is an unknown function of the component QNX SDP. This manipulation as part of Environment Variable causes information disclosure (Memory).
This vulnerability is handled as CVE-2017-9369. The attack can be initiated remotely. There is not any exploit available.
A vulnerability has been found in NocoDB up to 0.83.8 and classified as problematic. This vulnerability affects unknown code of the component Password Reset Handler. Performing manipulation results in information exposure through discrepancy.
This vulnerability is known as CVE-2022-22120. Remote exploitation of the attack is possible. No exploit is available.
Applying a patch is the recommended action to fix this issue.
A vulnerability described as critical has been identified in NocoDB up to 0.83.8. Impacted is an unknown function. Executing manipulation can lead to csv injection.
The identification of this vulnerability is CVE-2022-22121. The attack may be launched remotely. There is no exploit available.
It is advisable to implement a patch to correct this issue.