Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.15.152/6.1.82/6.6.22/6.7.10/6.8.1. Affected by this issue is the function ntb_register_device. Such manipulation leads to memory leak.
This vulnerability is referenced as CVE-2023-52652. The attack needs to be initiated within the local network. No exploit is available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.7.10/6.8.1 and classified as problematic. Affected by this issue is the function dpll_xa_ref_*_del of the file drivers/dpll/dpll_core.c of the component dpll. Executing manipulation can lead to privilege escalation.
The identification of this vulnerability is CVE-2024-27027. The attack needs to be done within the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.7.10 and classified as problematic. The impacted element is an unknown function of the component wifi. Such manipulation leads to allocation of resources.
This vulnerability is uniquely identified as CVE-2024-27056. The attack can only be initiated within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.79/6.6.18/6.7.6. It has been declared as critical. Affected by this vulnerability is the function mddev_suspend of the component md. Executing manipulation can lead to allocation of resources.
This vulnerability is tracked as CVE-2024-27023. The attack is only possible within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.0.2. The affected element is the function cpu_max_bits_warn of the component UM. The manipulation results in stack-based buffer overflow.
This vulnerability is known as CVE-2022-50296. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability classified as problematic has been found in Bootstrap. This affects an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-1647. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Autodesk Revit 9.0.7/2023.1.4/2024/2024.2.1/2025. It has been rated as critical. The impacted element is an unknown function of the component PDF File Handler. This manipulation causes heap-based buffer overflow.
This vulnerability is tracked as CVE-2025-1656. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability classified as problematic has been found in Smartvista BackOffice SmartVista Suite 2.2.22. Affected is an unknown function of the component GET Request Handler. Performing manipulation results in cross-site request forgery.
This vulnerability is cataloged as CVE-2025-50255. The attack must be initiated from a local position. There is no exploit available.
A vulnerability was found in Google Go up to 1.22.10/1.23.4 and classified as problematic. This affects an unknown function of the component net-http. Such manipulation leads to permissive cross-domain policy with untrusted domains.
This vulnerability is referenced as CVE-2024-45336. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
Radware discovered a server-side data theft attack, dubbed ShadowLeak, targeting ChatGPT. OpenAI patched the zero-click vulnerability. Researchers at Radware uncovered a server-side data theft attack targeting ChatGPT, called ShadowLeak. The experts discovered a zero-click vulnerability in ChatGPT’s Deep Research agent when connected to Gmail and browsing. The researchers explained that using a crafted email could trigger the agent to […]
A vulnerability classified as critical has been found in F5 BIG-IP up to 13.1.5/14.1.5/15.1.8/16.1.3. This affects an unknown function of the component TCP Verified Accept Handler. The manipulation leads to resource consumption.
This vulnerability is uniquely identified as CVE-2023-40542. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Nvidia CUDA Toolkit up to 12.3. This affects an unknown function of the component cuobjdump/nvdisasm. Such manipulation leads to out-of-bounds read.
This vulnerability is referenced as CVE-2024-0076. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
A vulnerability has been found in Nvidia CUDA Toolkit up to 12.3 and classified as problematic. This impacts an unknown function of the component ELF File Handler. Performing manipulation results in null pointer dereference.
This vulnerability is identified as CVE-2024-0072. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability was found in Nvidia ChatRTX up to 0.2 on Windows. It has been classified as critical. Affected is an unknown function of the component UI. The manipulation leads to improper privilege management.
This vulnerability is referenced as CVE-2024-0082. The attack can only be performed from a local environment. No exploit is available.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.6.23/6.7.11/6.8.2 on Dahlia. The impacted element is the function btnxpuart_close of the component Bluetooth. This manipulation causes denial of service.
This vulnerability is handled as CVE-2024-26959. The attack can only be done within the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability labeled as problematic has been found in Linux Kernel up to 6.1.83/6.6.23/6.7.11/6.8.2. This affects an unknown function of the component dwc3-am62. Such manipulation leads to privilege escalation.
This vulnerability is uniquely identified as CVE-2024-26963. The attack can only be initiated within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability has been found in Linux Kernel up to 6.1.87/6.6.28/6.8.7/6.9-rc4 and classified as problematic. This vulnerability affects the function fixed_ctrl_field of the component KVM. This manipulation causes information disclosure.
This vulnerability appears as CVE-2024-26992. The attacker needs to be present on the local network. There is no available exploit.
The affected component should be upgraded.