A threat actor called EncryptHub has compromised a game on Steam to distribute info-stealing malware to unsuspecting users downloading the title. [...]
Replit AI agent deleted data from 1,200+ executives and companies without permission, raising concerns about AI safety and control in live environments.
A vulnerability, which was classified as critical, has been found in Network Thermostat X-Series WiFi Thermostat. Affected by this issue is some unknown functionality of the component Embedded Web Interface. The manipulation leads to missing authentication.
This vulnerability is handled as CVE-2025-6260. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
Plankey pledged to ask Department of Homeland Security (DHS) Secretary Kristi Noem for more funding if he arrives at CISA and determines a larger budget is needed to effectively steer the agency.
A vulnerability classified as problematic was found in Adobe Experience Manager up to 6.5.22. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-47061. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Adobe Experience Manager up to 6.5.22. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-46996. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Adobe Experience Manager up to 6.5.22. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2025-46993. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in TOTOLINK A702R 4.0.0-B20230721.1521. It has been declared as critical. This vulnerability affects unknown code of the file /boafrm/formWlanMultipleAP of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow.
This vulnerability was named CVE-2025-8140. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in TOTOLINK A702R 4.0.0-B20230721.1521. It has been classified as critical. This affects an unknown part of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2025-8139. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in TOTOLINK A702R 4.0.0-B20230721.1521 and classified as critical. Affected by this issue is some unknown functionality of the file /boafrm/formOneKeyAccessButton of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow.
This vulnerability is handled as CVE-2025-8138. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability has been found in TOTOLINK A702R 4.0.0-B20230721.1521 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formIpQoS of the component HTTP POST Request Handler. The manipulation of the argument mac leads to buffer overflow.
This vulnerability is known as CVE-2025-8137. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in TOTOLINK A702R 4.0.0-B20230721.1521. Affected is an unknown function of the file /boafrm/formFilter of the component HTTP POST Request Handler. The manipulation of the argument ip6addr leads to buffer overflow.
This vulnerability is traded as CVE-2025-8136. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
Netherlands-based cybersecurity firm Eye Security told Reuters and Bloomberg that hackers have successfully breached at least 400 governments and businesses around the world.