Currently trending CVE - Hype Score: 9 - Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions which have reached End of ...
A vulnerability, which was classified as critical, has been found in Samsung Processor and Wearable Processor Exynos up to 2400. The affected element is an unknown function of the component Log File Handler. This manipulation causes improper access controls.
This vulnerability is handled as CVE-2025-48025. The attack can only be done within the local network. There is not any exploit available.
A vulnerability categorized as critical has been discovered in Microchip Time Provider 4100 up to 2.4. This affects an unknown part. Such manipulation leads to os command injection.
This vulnerability is listed as CVE-2025-47900. The attack may be performed from remote. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in Microchip Time Provider 4100 up to 2.4. This vulnerability affects unknown code. Performing manipulation results in os command injection.
This vulnerability is cataloged as CVE-2025-47901. It is possible to initiate the attack remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability labeled as critical has been found in Microchip Time Provider 4100 up to 2.4. This issue affects some unknown processing. Executing manipulation can lead to sql injection.
This vulnerability is registered as CVE-2025-47902. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
A vulnerability was found in QuickJS 0.9.0/3b45d15. It has been declared as critical. Affected by this issue is some unknown functionality. The manipulation results in integer overflow.
This vulnerability is cataloged as CVE-2025-62496. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Microsoft Exchange Server. Impacted is an unknown function. Such manipulation leads to information disclosure.
This vulnerability is traded as CVE-2025-59248. The attack may be launched remotely. There is no exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability, which was classified as problematic, has been found in Red Hat Enterprise Linux and OpenShift Container Platform. Affected by this vulnerability is an unknown functionality of the component netavark. Performing manipulation results in external control of system or configuration setting.
This vulnerability is known as CVE-2025-8283. Remote exploitation of the attack is possible. No exploit is available.
Aisuru, the botnet responsible for a series of record-smashing distributed denial-of-service (DDoS) attacks this year, recently was overhauled to support a more low-key, lucrative and sustainable business: Renting hundreds of thousands of infected Internet of Things (IoT) devices to proxy services that help cybercriminals anonymize their traffic. Experts says a glut of proxies from Aisuru and other sources is fueling large-scale data harvesting efforts tied to various artificial intelligence (AI) projects, helping content scrapers evade detection by routing their traffic through residential connections that appear to be regular Internet users.