A vulnerability was found in PostgreSQL up to 13.21/14.18/15.13/16.9/17.5. It has been classified as critical. Affected is an unknown function of the component pg_dumpall/pg_restore. The manipulation leads to inclusion of functionality from untrusted control sphere.
This vulnerability is traded as CVE-2025-8714. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in PostgreSQL up to 13.21/14.18/15.13/16.9/17.5 and classified as problematic. This issue affects some unknown processing. The manipulation leads to exposure of sensitive information through metadata.
The identification of this vulnerability is CVE-2025-8713. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
Threat actors are leveraging a Unicode character to make phishing links appear like legitimate Booking.com links in a new campaign distributing malware. The attack makes use of the Japanese hiragana character, ん, which can, on some systems, appear as a forward slash and make a phishing URL appear realistic to a person at first. [...]
A vulnerability, which was classified as critical, has been found in Gnuplot 5.2.rc1. This issue affects the function load_tic_series of the file set.c. The manipulation leads to uninitialized pointer.
The identification of this vulnerability is CVE-2017-9670. Local access is required to approach this attack. There is no exploit available.
A vulnerability classified as critical has been found in Mescius ActiveReports.NET. This affects the function ReadValue. The manipulation leads to deserialization.
This vulnerability is uniquely identified as CVE-2025-6810. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in GStreamer and classified as critical. Affected by this vulnerability is an unknown functionality of the component H266 Codec Parser. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2025-6663. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in Netis WF2780 2.2.35445. This vulnerability affects the function FUN_0048a728 of the file cgitest.cgi. The manipulation of the argument CONTENT_LENGTH leads to null pointer dereference.
This vulnerability was named CVE-2025-50635. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Netis WF2880 2.1.40207. This issue affects the function FUN_00471994 of the file cgitest.cgi. The manipulation of the argument wl_base_set leads to denial of service.
The identification of this vulnerability is CVE-2025-50608. The attack can only be done within the local network. There is no exploit available.
A vulnerability has been found in Netis WF2880 2.1.40207 and classified as problematic. Affected by this vulnerability is the function FUN_00476598 of the file cgitest.cgi. The manipulation of the argument wl_base_set_5g leads to denial of service.
This vulnerability is known as CVE-2025-50610. The attack needs to be done within the local network. There is no exploit available.
A vulnerability classified as problematic was found in Netis WF2880 2.1.40207. Affected by this vulnerability is the function FUN_004743f8 of the file cgitest.cgi. The manipulation of the argument wl_sec_set leads to denial of service.
This vulnerability is known as CVE-2025-50612. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as critical, was found in Netis WF2880 2.1.40207. This affects the function FUN_00475e1c of the file cgitest.cgi. The manipulation of the argument wds_key_wep leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2025-50613. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability has been found in Netis WF2880 2.1.40207 and classified as critical. This vulnerability affects the function FUN_00473154 of the file cgitest.cgi. The manipulation of the argument wl_sec_set_5g/wl_sec_rp_set_5g leads to buffer overflow.
This vulnerability was named CVE-2025-50611. Access to the local network is required for this attack. There is no exploit available.
A vulnerability was found in Netis WF2880 2.1.40207. It has been classified as critical. Affected is the function FUN_0047151c of the file cgitest.cgi. The manipulation of the argument wds_set leads to buffer overflow.
This vulnerability is traded as CVE-2025-50614. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Jirafeau up to 4.6.2. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-7066. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in AresIT WP Compress Plugin up to 6.30.30 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to weak authentication.
The identification of this vulnerability is CVE-2025-47479. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Gnuplot 5.5. It has been declared as critical. This vulnerability affects the function print_set_output. The manipulation leads to double free.
This vulnerability was named CVE-2020-25559. An attack has to be approached locally. There is no exploit available.
A vulnerability was found in gnuplot 5.5. It has been classified as critical. Affected is the function plotrequest. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2020-25969. The attack needs to be approached within the local network. There is no exploit available.