Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.15.152/6.1.82/6.6.22/6.7.10/6.8.1. Affected by this issue is the function ntb_register_device. Such manipulation leads to memory leak.
This vulnerability is referenced as CVE-2023-52652. The attack needs to be initiated within the local network. No exploit is available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.7.10/6.8.1 and classified as problematic. Affected by this issue is the function dpll_xa_ref_*_del of the file drivers/dpll/dpll_core.c of the component dpll. Executing manipulation can lead to privilege escalation.
The identification of this vulnerability is CVE-2024-27027. The attack needs to be done within the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.7.10 and classified as problematic. The impacted element is an unknown function of the component wifi. Such manipulation leads to allocation of resources.
This vulnerability is uniquely identified as CVE-2024-27056. The attack can only be initiated within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.79/6.6.18/6.7.6. It has been declared as critical. Affected by this vulnerability is the function mddev_suspend of the component md. Executing manipulation can lead to allocation of resources.
This vulnerability is tracked as CVE-2024-27023. The attack is only possible within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.0.2. The affected element is the function cpu_max_bits_warn of the component UM. The manipulation results in stack-based buffer overflow.
This vulnerability is known as CVE-2022-50296. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability classified as problematic has been found in Bootstrap. This affects an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-1647. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Autodesk Revit 9.0.7/2023.1.4/2024/2024.2.1/2025. It has been rated as critical. The impacted element is an unknown function of the component PDF File Handler. This manipulation causes heap-based buffer overflow.
This vulnerability is tracked as CVE-2025-1656. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.