A relatively new ransomware operation named 'Sarcoma' has claimed responsibility for an attack against the Unimicron printed circuit boards (PCB) maker in Taiwan. [...]
North Korean state actor 'Kimsuky' (aka 'Emerald Sleet' or 'Velvet Chollima') has been observed using a new tactic inspired from the now widespread ClickFix campaigns. [...]
A vulnerability was found in Car Demon Plugin up to 1.8.1 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-13334. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Wikimedia OpenBadges Extension up to 1.39.10/1.41.2/1.42.1 on Mediawiki. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-23080. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Ivanti Endpoint Manager and classified as very critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to deserialization.
This vulnerability is known as CVE-2024-13163. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Microsoft Visual Studio and .NET. This affects an unknown part. The manipulation leads to heap-based buffer overflow.
This vulnerability is uniquely identified as CVE-2025-21171. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Microsoft Visual Studio and .NET and classified as critical. This vulnerability affects unknown code. The manipulation leads to integer overflow.
This vulnerability was named CVE-2025-21172. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Visual Studio and .NET and classified as critical. This issue affects some unknown processing. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2025-21173. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft .NET, .NET Framework and Visual Studio. It has been classified as critical. Affected is an unknown function. The manipulation leads to buffer over-read.
This vulnerability is traded as CVE-2025-21176. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Visual Studio. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to heap-based buffer overflow.
This vulnerability is known as CVE-2025-21178. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Office, Access and 365 Apps for Enterprise. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to heap-based buffer overflow.
This vulnerability is handled as CVE-2025-21186. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical has been found in Microsoft Power Automate for Desktop. This affects an unknown part. The manipulation leads to code injection.
This vulnerability is uniquely identified as CVE-2025-21187. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic was found in Microsoft Windows. This vulnerability affects unknown code of the component MapUrlToZone. The manipulation leads to improper resolution of path equivalence.
This vulnerability was named CVE-2025-21189. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, has been found in Microsoft Windows Server 2016/Server 2019/Server 2022/Server 2022 23H2/Server 2025. This issue affects some unknown processing of the component Active Directory Federation Server. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2025-21193. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic was found in Microsoft Windows. Affected by this vulnerability is an unknown functionality of the component NTLM. The manipulation leads to protection mechanism failure.
This vulnerability is known as CVE-2025-21217. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, was found in gdk-pixbuf up to 2.41.x. Affected is an unknown function of the component GIF Image Handler. The manipulation leads to out-of-bounds write.
This vulnerability is traded as CVE-2021-20240. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Certifi 2022.12.07. It has been classified as problematic. This affects an unknown part of the component Root Certificate Handler. The manipulation leads to insufficient verification of data authenticity.
This vulnerability is uniquely identified as CVE-2022-23491. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as very critical, was found in Atos Unify OpenScape 4000 Platform and OpenScape 4000 Manager Platform 10 R1. This affects an unknown part of the component Webservice. The manipulation leads to command injection.
This vulnerability is uniquely identified as CVE-2023-29473. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.