A vulnerability was found in Linux Kernel up to 6.12.5 and classified as critical. This issue affects some unknown processing of the component netem. The manipulation of the argument qlen leads to improper update of reference count.
The identification of this vulnerability is CVE-2024-56770. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in keras up to 3.7.0 and classified as problematic. This vulnerability affects the function get_file of the component TAR File Handler. The manipulation leads to Privilege Escalation.
This vulnerability was named CVE-2024-55459. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as critical, was found in stonith404 pingvin-share up to 1.3.x. This affects an unknown part of the component HTTP POST Request Handler. The manipulation leads to improper authentication.
This vulnerability is uniquely identified as CVE-2025-22137. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Eugeny tabby up to 1.0.216. Affected by this issue is the function RunAsNode/EnableNodeCliInspectArguments/EnableNodeOptionsEnvironmentVariable of the component Electron Fuse Handler. The manipulation leads to code injection.
This vulnerability is handled as CVE-2025-22136. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Cisco Crosswork Network Change Automation. Affected is an unknown function of the component Web-based Management Interface. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-20123. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Cisco Common Services Platform Collector Software 2.11/2.11.0.1/2.11.0.2/2.11.0.3. It has been rated as problematic. This issue affects some unknown processing of the component Interface. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2025-20168. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Cisco Common Services Platform Collector Software 2.11/2.11.0.1/2.11.0.2/2.11.0.3. It has been declared as problematic. This vulnerability affects unknown code of the component Interface. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-20167. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Cisco ThousandEyes Endpoint Agent 1.200. It has been classified as problematic. This affects an unknown part. The manipulation leads to improper certificate validation.
This vulnerability is uniquely identified as CVE-2025-20126. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in charmbracelet soft-serve up to 0.8.1 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to path traversal.
This vulnerability is handled as CVE-2025-22130. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
This post first appeared on blog.netwrix.com and was written by Dirk Schrader. Credential stuffing is a type of cyberattack where attackers use stolen username and password combinations, often obtained from previous data breaches, to gain unauthorized access to multiple online accounts. The attacker automates the process of trying these combinations across various websites, hoping that users have reused the same login details. Credential Stuffing vs. Password Stuffing: … Continued
A vulnerability has been found in RedisBloom CMS up to 2.2.18/2.4.11/2.6.13/2.8.1 and classified as very critical. Affected by this vulnerability is the function CMS.INITBYDIM. The manipulation leads to integer overflow.
This vulnerability is known as CVE-2024-55656. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Polaris FT Intellect Core Banking up to 9.5. Affected is an unknown function of the component Interllect Core Search. The manipulation of the argument groupType leads to sql injection.
This vulnerability is traded as CVE-2024-55517. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in RedisSearch up to 2.0 on Redis. This issue affects the function FT.SEARCH/FT.AGGREGATE of the component Redis Module. The manipulation of the argument LIMIT/KNN leads to heap-based buffer overflow.
The identification of this vulnerability is CVE-2024-51737. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in TimeSeries up to 1.6.19/1.8.14/1.10.14/1.12.2 on Redis. This vulnerability affects the function TS.QUERYINDEX/TS.MGET/TS.MRAGE/TS.MREVRANGE. The manipulation leads to heap-based buffer overflow.
This vulnerability was named CVE-2024-51480. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.