A CVSS score 6.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H severity vulnerability discovered by 'CrisprXiang With FDU and Hao Huang with FDU' was reported to the affected vendor on: 2025-02-13, 34 days ago. The vendor is given until 2025-06-13 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'CrisprXiang With FDU' was reported to the affected vendor on: 2025-02-13, 34 days ago. The vendor is given until 2025-06-13 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.2 AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N severity vulnerability discovered by 'Trend Micro (SHU-HAO, TUNG) (123ojp)' was reported to the affected vendor on: 2025-02-13, 34 days ago. The vendor is given until 2025-06-13 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 6.4 AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:L severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-02-13, 34 days ago. The vendor is given until 2025-06-13 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 8.8 AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'dungnm from vcslab of Viettel Cyber Security' was reported to the affected vendor on: 2025-02-13, 34 days ago. The vendor is given until 2025-06-13 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.3 AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-02-13, 34 days ago. The vendor is given until 2025-06-13 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 8.8 AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Michael DePlante (@izobashi) and Lucas Leong (@_wmliang_) of Trend Micro's Zero Day Initiative' was reported to the affected vendor on: 2025-02-13, 34 days ago. The vendor is given until 2025-06-13 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 6.1 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L severity vulnerability discovered by 'volticks, @movx64 on twitter' was reported to the affected vendor on: 2025-02-13, 7 days ago. The vendor is given until 2025-06-13 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.4. Affected is the function inet6_create. The manipulation leads to use after free.
This vulnerability is traded as CVE-2024-56600. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Xe x. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to reliance on untrusted inputs in a security decision.
This vulnerability is handled as CVE-2025-24369. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in compose-spec compose-go up to 2.4.0. This issue affects some unknown processing of the component YAML Handler. The manipulation leads to improper input validation.
The identification of this vulnerability is CVE-2024-10846. The attack may be initiated remotely. There is no exploit available.