The China-linked APT group UNC6384 targeted diplomats by hijacking web traffic to redirect it to a website that delivered malware. China-linked cyberespionage group UNC6384 targeted diplomats by hijacking web traffic to redirect to a website used to deliver malware, Google’s Threat Intelligence Group (GTIG) warns. Cyberspies hijacked a network’s captive portal using an advanced adversary-in-the-middle […]
A vulnerability categorized as critical has been discovered in GitLab Community and Enterprise up to 11.6.9/11.7.5/11.8.0. This issue affects some unknown processing of the component Access Control. Executing manipulation can lead to improper access controls.
This vulnerability is handled as CVE-2019-9170. The attack can be executed remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability labeled as critical has been found in VideoLAN VLC Media Player 3.0.7.1. Affected is the function xiph_SplitHeaders of the file modules/demux/xiph.h of the component OGG File Handler. Such manipulation leads to use after free.
This vulnerability is traded as CVE-2019-14437. The attack may be launched remotely. There is no exploit available.
A patch should be applied to remediate this issue.
A vulnerability was found in IMP Horde Groupware and Horde Groupware Webmail Edition up to 5.2.15 and classified as problematic. Impacted is an unknown function of the component data:text/html Handler. Such manipulation of the argument action/xlink leads to HTML injection.
This vulnerability is documented as CVE-2016-5303. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in openSUSE Open Build Service up to 2.9.2. Affected by this vulnerability is an unknown functionality. The manipulation results in permission issues.
This vulnerability is reported as CVE-2018-7688. The attack can be launched remotely. No exploit exists.
The affected component should be upgraded.
Currently trending CVE - Hype Score: 8 - Directus is a real-time API and App dashboard for managing SQL database content. From 10.8.0 to before 11.9.3, a vulnerability exists in the file update mechanism which allows an unauthenticated actor to modify existing files with arbitrary contents (without changes being ...
A vulnerability classified as problematic was found in TYPO3 up to 10.4.47/11.5.41/12.4.24/13.4.2. This affects an unknown function of the component Extension Manager Module. The manipulation results in cross-site request forgery.
This vulnerability is identified as CVE-2024-55921. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in TYPO3 up to 10.4.47/11.5.41/12.4.24/13.4.2. It has been classified as problematic. This affects an unknown part of the component Form Framework Module. The manipulation leads to cross-site request forgery.
This vulnerability is documented as CVE-2024-55922. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in TYPO3 up to 10.4.47/11.5.41/12.4.24/13.4.2. It has been declared as problematic. This vulnerability affects unknown code of the component Indexed Search Module. The manipulation results in cross-site request forgery.
This vulnerability is reported as CVE-2024-55923. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in TYPO3 up to 11.5.41. It has been rated as problematic. This issue affects some unknown processing of the component Scheduler Module. This manipulation causes cross-site request forgery.
This vulnerability appears as CVE-2024-55924. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability labeled as problematic has been found in TYPO3 up to 11.5.41. The impacted element is an unknown function of the component Check Module. Executing manipulation can lead to cross-site request forgery.
This vulnerability is handled as CVE-2024-55945. The attack can be executed remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability categorized as problematic has been discovered in Zulip Server up to 9.3. Affected by this vulnerability is an unknown functionality of the component Email Address Handler. Such manipulation leads to information disclosure.
This vulnerability is referenced as CVE-2024-56136. It is possible to launch the attack remotely. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in opf openproject up to 15.2.0. It has been classified as problematic. This vulnerability affects unknown code of the component Group Management Section. This manipulation causes cross site scripting.
This vulnerability is handled as CVE-2025-24892. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Quanxun School Affairs System and classified as problematic. The affected element is an unknown function. Executing manipulation can lead to exposure of sensitive system information to an unauthorized control sphere.
This vulnerability is registered as CVE-2025-1144. It is possible to launch the attack remotely. No exploit is available.
A vulnerability marked as problematic has been reported in Brocade SANnav. Affected is an unknown function of the component Encryption Key Handler. This manipulation causes debug messages revealing unnecessary information.
The identification of this vulnerability is CVE-2025-1053. The attack can only be executed locally. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in neocturne fastd up to 22 and classified as problematic. The impacted element is an unknown function of the component Ethernet Frame Handler. The manipulation leads to asymmetric resource consumption.
This vulnerability is uniquely identified as CVE-2025-24356. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.