Microsoft today unleashed updates to plug a whopping 161 security vulnerabilities in Windows and related software, including three "zero-day" weaknesses that are already under active attack. Redmond's inaugural Patch Tuesday of 2025 bundles more fixes than the company has shipped in one go since 2017.
A vulnerability has been found in GestiolP 3.5.7 and classified as problematic. Affected by this vulnerability is the function ip_do_job. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-50857. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in GestiolP 3.5.7. Affected is an unknown function of the file ip_mod_dns_key_form.cgi. The manipulation of the argument TSIG Key leads to cross site scripting.
This vulnerability is traded as CVE-2024-50861. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in GestiolP 3.5.7. This issue affects the function ip_import_acl_csv. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-50859. The attack may be initiated remotely. There is no exploit available.
Microsoft is warning that the January 2025 Windows 11 and Windows 10 cumulative updates may fail if Citrix Session Recording Agent (SRA) version 2411 is installed on the device. [...]
A vulnerability classified as problematic was found in vCita Event Registration Calendar Plugin up to 1.4.0 on WordPress. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-11870. The attack can be initiated remotely. There is no exploit available.