A vulnerability, which was classified as critical, was found in macrozheng mall-swarm and mall up to 1.0.3. Affected is the function cancelUserOrder of the file /order/cancelUserOrder. Executing manipulation of the argument orderId can lead to improper authorization.
This vulnerability is registered as CVE-2025-13116. It is possible to launch the attack remotely. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in macrozheng mall-swarm and mall up to 1.0.3 and classified as critical. Affected by this vulnerability is the function cancelOrder of the file /order/cancelOrder. The manipulation of the argument orderId leads to improper authorization.
This vulnerability is documented as CVE-2025-13117. The attack can be initiated remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in macrozheng mall-swarm and mall up to 1.0.3 and classified as critical. Affected by this issue is the function paySuccess of the file /order/paySuccess. The manipulation of the argument orderID results in improper authorization.
This vulnerability is reported as CVE-2025-13118. The attack can be launched remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, has been found in gristlabs grist-core up to 1.7.6. Affected by this vulnerability is an unknown functionality. This manipulation causes server-side request forgery.
This vulnerability is handled as CVE-2025-64752. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in withastro astro up to 5.15.5 and classified as problematic. The affected element is an unknown function of the component URL Handler. The manipulation results in cross site scripting.
This vulnerability was named CVE-2025-64745. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability classified as critical was found in usememos memos up to 0.18.1. Affected by this vulnerability is an unknown functionality. Such manipulation leads to improper authentication.
This vulnerability is documented as CVE-2024-21635. The attack can be executed remotely. There is not any exploit available.
A vulnerability described as critical has been identified in lsfusion platform up to 6.1. Affected by this vulnerability is the function UploadFileRequestHandler of the file platform/web-client/src/main/java/lsfusion/http/controller/file/UploadFileRequestHandler.java. Executing manipulation of the argument sid can lead to path traversal.
This vulnerability is handled as CVE-2025-13262. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability, which was classified as critical, has been found in lsfusion platform up to 6.1. This vulnerability affects the function unpackFile of the file server/src/main/java/lsfusion/server/physics/dev/integration/external/to/file/ZipUtils.java. This manipulation causes path traversal.
The identification of this vulnerability is CVE-2025-13265. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as problematic has been found in getkirby Kirby up to 5.1.3. Affected by this issue is some unknown functionality. This manipulation causes cross site scripting.
This vulnerability is registered as CVE-2025-65012. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Piwigo 15.6.0. This affects an unknown part of the component Password Reset Handler. Such manipulation leads to weak password recovery.
This vulnerability is documented as CVE-2025-62406. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in KubeVirt up to 1.6.0. It has been rated as critical. This impacts an unknown function of the component hostDisk. Performing manipulation results in improper access controls.
This vulnerability was named CVE-2025-64324. The attack needs to be approached locally. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability described as problematic has been identified in GiveWP Plugin up to 4.13.0 on WordPress. This vulnerability affects unknown code. Such manipulation of the argument Name leads to cross site scripting.
This vulnerability is listed as CVE-2025-13206. The attack may be performed from remote. There is no available exploit.
SEO 公司 Graphite 上个月发表了一份报告,称互联网上逾半数内容是 AI 生成的。Graphite 分析了 2020 年 1 月至 2025 年 5 月间发表的 65,000 篇英文文章的随机样本,使用了 AI 检测工具 Surfer 进行评估,如果一篇文章的内容有五成或更多部分被认为是大模型撰写的,那么这篇文章就被视为是 AI 生成。对 AI 撰写文章的分析显示大部分属于大众兴趣类文章:新闻更新、指南、生活方式、评论和产品介绍。此类文章主要是说服读者或为读者提供信息,不涉及表达原创。也就是说 AI 擅长处理低级别的模式化的写作,如周末游清单、求职信和商业文案等。此类工作过去由自由职业者操手,现在大模型的普及使得这些工作急剧减少。由人类创作的原创类文章可能比以前更富有价值。即使互联网上的大部分内容不再由人类撰写,作家、记者和知识分子的工作并不会变得多余。
Currently trending CVE - Hype Score: 10 - Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
A vulnerability was found in Apache CloudStack up to 4.20.1/4.21.x. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Javascript Engine. The manipulation results in stack-based buffer overflow.
This vulnerability is identified as CVE-2025-59302. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apache CloudStack up to 4.20.1/4.21.x. It has been classified as critical. Affected is the function createNetworkACL/listNetworkACLs/listResourceDetails/listVirtualMachinesUsageHistory/listVolumesUsageHistory of the component API. The manipulation leads to permission issues.
This vulnerability is referenced as CVE-2025-59454. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is recommended.
Gainsight has disclosed that the recent suspicious activity targeting its applications has affected more customers than previously thought.
The company said Salesforce initially provided a list of 3 impacted customers and that it has "expanded to a larger list" as of November 21, 2025. It did not reveal the exact number of customers who were impacted, but its CEO, Chuck Ganapathi, said "we