A vulnerability was found in OpenHarmony up to 4.1.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to integer overflow.
This vulnerability is known as CVE-2025-0302. Local access is required to approach this attack. There is no exploit available.
A vulnerability was found in OpenHarmony up to 4.1.2 and classified as critical. This issue affects some unknown processing. The manipulation leads to buffer overflow.
The identification of this vulnerability is CVE-2025-0303. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in OpenHarmony up to 4.1.2. It has been classified as critical. Affected is an unknown function. The manipulation leads to use after free.
This vulnerability is traded as CVE-2025-0304. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in D-Link DHP-W310AV 1.04 and classified as critical. This vulnerability affects unknown code. The manipulation leads to authentication bypass by spoofing.
This vulnerability was named CVE-2025-1104. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability, which was classified as problematic, was found in D-Link DIR-823X 240126/240802. This affects the function set_wifi_blacklists of the file /goform/set_wifi_blacklists of the component HTTP POST Request Handler. The manipulation of the argument macList leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2025-1103. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
Microsoft researchers warn that threat actors are delivering the Godzilla framework using a static ASP.NET machine. In December 2024, Microsoft Threat Intelligence researchers spotted a threat actor using a public ASP.NET machine key to deploy Godzilla malware, exploiting insecure key usage in code. Microsoft has since found over 3,000 public keys that could be used […]
Sophos has observed cybercriminals ramping up their use of graphics files as part of email phishing attacks to bypass conventional security protections
A vulnerability, which was classified as critical, was found in Mozilla Firefox up to 134. This affects an unknown part. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2025-1020. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.