CISA warns of a critical flaw in PTC Windchill and FlexPLM (CVE-2026-4681), with no patch yet and potential for imminent exploitation. CISA issued an advisory about a critical vulnerability, tracked as CVE-2026-4681 (CVSS score of 10.0), in PTC’s Windchill and FlexPLM software. At this time, no patches are available, and no active attacks have been […]
A vulnerability described as problematic has been identified in Restajet Online Food Delivery System up to 19122025. The impacted element is an unknown function. The manipulation results in improper restriction of excessive authentication attempts.
This vulnerability was named CVE-2025-1928. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in Trane Tracer SC, Tracer SC+ and Tracer Concierge. It has been rated as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to use of hard-coded, security-relevant constants.
This vulnerability is referenced as CVE-2026-28256. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in Terrapack TKServerCGI and TpkWebGIS Client and classified as critical. This affects an unknown part. Executing a manipulation can lead to unrestricted upload.
This vulnerability is registered as CVE-2025-67260. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in Bitcoin Core up to 29.0. It has been declared as problematic. This issue affects some unknown processing of the component Transaction Handler. The manipulation results in denial of service.
This vulnerability is reported as CVE-2025-46598. The attack can be launched remotely. No exploit exists.
A vulnerability was found in Bitcoin Core up to 0.13.0. It has been rated as critical. Impacted is an unknown function. This manipulation causes integer overflow.
This vulnerability appears as CVE-2025-46597. The attack may be initiated remotely. There is no available exploit.
A vulnerability identified as critical has been detected in QNAP Media Streaming Add-on up to 500.1.0. The impacted element is an unknown function. Performing a manipulation results in stack-based buffer overflow.
This vulnerability is known as CVE-2025-59383. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
A vulnerability classified as critical was found in QNAP QuRouter up to 2.5.1.060. Affected by this issue is some unknown functionality of the component Endpoint. Such manipulation leads to improper restriction of communication channel to intended endpoints.
This vulnerability is referenced as CVE-2025-62843. The attack can be executed directly on the physical device. No exploit is available.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in QNAP QuRouter up to 2.5.1.060. This affects an unknown part. Performing a manipulation results in weak authentication.
This vulnerability is identified as CVE-2025-62844. The attack may be carried out on the physical device. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in QNAP Systems QuRouter 2.4.5.032/2.4.6.028. This vulnerability affects unknown code. Executing a manipulation can lead to improper neutralization of escape, meta, or control sequences.
This vulnerability is tracked as CVE-2025-62845. The attack is restricted to local execution. No exploit exists.
You should upgrade the affected component.
A vulnerability was found in TP-Link AX53. It has been classified as critical. The affected element is an unknown function. This manipulation causes stack-based buffer overflow.
This vulnerability is registered as CVE-2025-15608. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability categorized as critical has been discovered in TP-Link AX53. This impacts an unknown function. Executing a manipulation can lead to command injection.
This vulnerability appears as CVE-2025-15607. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in Grafana up to 11.6.13/12.1.9/12.2.7/12.3.5/12.4.1 and classified as problematic. This affects an unknown part of the component Resample Query Handler. Executing a manipulation can lead to denial of service.
This vulnerability appears as CVE-2026-27879. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability has been found in Grafana up to 11.6.13/12.1.9/12.2.7/12.3.5/12.4.1 and classified as problematic. Affected by this issue is some unknown functionality of the component testdata data-source Handler. Performing a manipulation results in denial of service.
This vulnerability is reported as CVE-2026-28375. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in DSpace JSPUI 6.5. Affected by this vulnerability is an unknown functionality of the component Parameter Handler. Such manipulation of the argument filter_type_1 leads to cross site scripting.
This vulnerability is documented as CVE-2025-61190. The attack can be executed remotely. There is not any exploit available.
A vulnerability, which was classified as problematic, has been found in kovidgoyal calibre up to 9.5.x. Affected is an unknown function. This manipulation causes relative path traversal.
This vulnerability is registered as CVE-2026-33206. The attack needs to be launched locally. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in BS Producten Petcam 33.1.0.0818. This impacts an unknown function of the component Network Interface Handler. The manipulation results in improper access controls.
This vulnerability is cataloged as CVE-2025-69988. An attack on the physical device is feasible. There is no exploit available.
A vulnerability classified as problematic has been found in OpenBao up to 2.5.1. This affects the function callback_mode of the component OIDC/JWT. The manipulation of the argument error_description leads to cross site scripting.
This vulnerability is listed as CVE-2026-33758. The attack may be initiated remotely. There is no available exploit.
It is recommended to upgrade the affected component.