A vulnerability was found in Devolutions Server up to 2025.1.11.0/2025.2.4.0 and classified as critical. This issue affects some unknown processing of the component Secure Message. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2025-6741. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability has been found in Devolutions Server up to 2025.1.11.0/2025.2.3.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to use of weak credentials.
This vulnerability was named CVE-2025-6523. The attack can only be done within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, was found in iputils up to 20240905. This affects an unknown part of the component ICMP Echo Reply Packet Handler. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2025-48964. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Bloomberg Comdb2 8.1. Affected by this issue is some unknown functionality of the component Distributed Transaction Component. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2025-48498. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in Bloomberg Comdb2 8.1. Affected by this vulnerability is an unknown functionality of the component net_connectmsg Protocol Buffer Message Handler. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2025-36520. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in Bloomberg Comdb2 8.1. Affected is an unknown function of the component Distributed Transaction Heartbeat Handler. The manipulation leads to reachable assertion.
This vulnerability is traded as CVE-2025-36512. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Bloomberg Comdb2 8.1. It has been rated as problematic. This issue affects some unknown processing of the component CDB2SQLQUERY Protocol Buffer Message Handler. The manipulation leads to null pointer dereference.
The identification of this vulnerability is CVE-2025-35966. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in onnx 1.17.0. It has been declared as critical. This vulnerability affects the function onnx.external_data_helper.save_external_data. The manipulation of the argument external_data.location leads to path traversal.
This vulnerability was named CVE-2025-51480. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Onyx Enterprise Edition 0.27.0. It has been classified as critical. This affects an unknown part of the file /api/manage/admin/user-group/id of the component PATCH Request Handler. The manipulation leads to authorization bypass.
This vulnerability is uniquely identified as CVE-2025-51479. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in aimhubio aim 3.28.0 and classified as problematic. Affected by this issue is the function pyodide.code.run_js of the file /api/reports. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-51464. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Ollama 0.6.7 and classified as critical. Affected by this vulnerability is the function server.auth.getAuthorizationToken of the file /api/pull. The manipulation of the argument realm leads to improper access controls.
This vulnerability is known as CVE-2025-51471. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, was found in Autodesk Revit up to 2026.1. Affected is an unknown function of the component RFA File Parser. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2025-5042. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in eosphoros-ai db-gpt 0.7.0. This issue affects the function editor_sql_run/query_ex of the file /v1/editor/sql/run. The manipulation leads to sql injection.
The identification of this vulnerability is CVE-2025-51458. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic was found in IBM Security QRadar Network Threat Analytics up to 1.3.1. This vulnerability affects unknown code. The manipulation leads to allocation of resources.
This vulnerability was named CVE-2024-38335. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in AlertEnterprise Guardian 4.1.14.2.2.1. This affects the function requestSubmit. The manipulation of the argument IsAdminApprover leads to privilege escalation.
This vulnerability is uniquely identified as CVE-2025-31513. The attack can only be initiated within the local network. There is no exploit available.
But Hacking Groups of All Stripes Now Have Access to Exploit Code, Researchers Warn Microsoft said an attack campaign targeting zero-day vulnerabilities in on-premises SharePoint servers appears to have begun by July 7, tied to three Chinese hack groups. With proof-of-concept exploit code now in the wild, security experts said hackers of all stripes have joined the fray.