The Russian state-backed hacking group Gamaredon (aka "Shuckworm") has been targeting a military mission of a Western country in Ukraine in attacks likely deployed from removable drives. [...]
A vulnerability, which was classified as problematic, was found in PHP 5.2.4. This affects the function ngettext. The manipulation of the argument classname leads to improper input validation.
This vulnerability is uniquely identified as CVE-2007-6039. The attack needs to be approached locally. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, has been found in Majeed Raza Carousel Slider Plugin up to 2.2.2 on WordPress. This issue affects some unknown processing. The manipulation leads to missing authorization.
The identification of this vulnerability is CVE-2023-41848. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in Tenda i12 1.0.0.10(3805). This affects the function formSetCfm. The manipulation of the argument funcpara1 leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2025-25678. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in Tenda i12 1.0.0.10. This vulnerability affects the function formwrlSSIDset of the component Parameter Handler. The manipulation of the argument list leads to buffer overflow.
This vulnerability was named CVE-2025-25676. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in Tenda AC6 15.03.05.16. This affects the function formexeCommand. The manipulation of the argument cmdinput leads to code injection.
This vulnerability is uniquely identified as CVE-2025-25507. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Tenda AC6 15.03.05.16. This issue affects the function sub_452A4. The manipulation leads to buffer overflow.
The identification of this vulnerability is CVE-2025-25505. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as problematic was found in Carousel Slider Plugin up to 2.2.10 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-4372. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ultimate Classified Listings Plugin up to 1.3 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-6529. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Google Chrome. Affected is an unknown function of the component V8. The manipulation leads to use after free.
This vulnerability is traded as CVE-2025-0995. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Google Chrome 2025-01-23 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Browser UI. The manipulation leads to insufficient visual distinction of homoglyphs presented to user.
This vulnerability is known as CVE-2025-0996. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
Cybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk.
The original vulnerability CVE-2024-0132 (CVSS score: 9.0) is a Time-of-Check Time-of-Use (TOCTOU) vulnerability that could lead to a container escape attack and allow for
We re-architected Super Slurper from the ground up using our Developer Platform — leveraging Cloudflare Workers, Durable Objects, and Queues — and improved transfer speeds by up to 5x.
A vulnerability was found in Booking Activities Plugin up to 1.15.19 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-30449. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Creative Solutions Creative Image Slider Plugin up to 2.1.3 on WordPress. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-30447. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as problematic was found in PluginOps Landing Page Builder Plugin up to 1.5.1.7 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-30452. The attack can be launched remotely. There is no exploit available.