Currently trending CVE - Hype Score: 1 - Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
A vulnerability was found in Hide Links Plugin up to 1.4.2 on WordPress and classified as critical. This issue affects some unknown processing of the component Shortcode Handler. The manipulation leads to missing authorization.
The identification of this vulnerability is CVE-2024-9578. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in wpxpo Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX up to 4.1.16 on WordPress. It has been declared as critical. Affected by this vulnerability is the function install_required_plugin_callback of the component Plugin Installation Handler. The manipulation leads to missing authorization.
This vulnerability is known as CVE-2024-10728. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Email Subscription Popup Plugin up to 1.2.22 on WordPress. It has been declared as problematic. This vulnerability affects the function print_email_subscribe_form of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-11195. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Product Input Fields for WooCommerce Plugin up to 1.9 on WordPress. This affects an unknown part. The manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2024-10857. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in InPost Gallery Plugin up to 2.1.4.2 on WordPress and classified as critical. This vulnerability affects the function inpost_gallery_get_shortcode_template of the component Shortcode Handler. The manipulation leads to code injection.
This vulnerability was named CVE-2024-11002. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Microsoft Windows up to Server 2025. Affected by this issue is some unknown functionality of the component Subsystem for Linux. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2025-26675. The attack needs to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in Microsoft Windows. This affects an unknown part of the component Routing/Remote Access Service. The manipulation leads to buffer over-read.
This vulnerability is uniquely identified as CVE-2025-26676. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Microsoft Windows and classified as critical. This vulnerability affects unknown code of the component Defender Application Control. The manipulation leads to improper access controls.
This vulnerability was named CVE-2025-26678. Local access is required to approach this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Windows and classified as critical. This issue affects some unknown processing of the component RPC Endpoint Mapper Service. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2025-26679. Attacking locally is a requirement. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Windows Server 2012 R2/Server 2016/Server 2019/Server 2022/Server 2025. It has been classified as critical. Affected is an unknown function of the component Standards-Based Storage Management Service. The manipulation leads to resource consumption.
This vulnerability is traded as CVE-2025-26680. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in smub Sugar Calendar Plugin up to 3.3.0 on WordPress and classified as problematic. Affected by this issue is the function add_query_arg/remove_query_arg. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-10878. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Pdfcrowd Save as PDF Plugin up to 4.2.1 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-10891. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in BuddyPress Builder for Elementor Plugin up to 1.7.4 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Post Handler. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2024-10778. The attack can be launched remotely. There is no exploit available.
A vulnerability has been found in LayerBB up to 1.1.2 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file admin/new_user.php. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2018-17996. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Discourse up to 3.3.1/3.4.0.beta1 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument DISCOURSE_DISABLE_ANON_CACHE leads to externally controlled reference.
This vulnerability is known as CVE-2024-47773. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
In the realm of cybersecurity, distributed denial-of-service (DDoS) attacks pose a significant threat to the stability and availability of online services. Among the various forms of DDoS attacks, carpet-bombing stands out due to its ability to overwhelm networks by targeting multiple IP addresses within a specific...