A May 2025 cyberattack on ApolloMD exposed the personal data of over 626,000 patients linked to affiliated physicians and practices. ApolloMD is a US-based healthcare services company that partners with hospitals, health systems, and physician practices. It provides practice management, staffing, revenue cycle, and administrative support services. The company works with affiliated physicians across specialties […]
Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as various hacking groups continue to weaponize the tool for accelerating various phases of the cyber attack life cycle, enabling information operations, and even conducting model extraction attacks.
"The
A vulnerability identified as problematic has been detected in Traefik up to 3.6.7. Affected is the function readTimeout. Performing a manipulation results in resource consumption.
This vulnerability is known as CVE-2026-25949. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in AMD Radeon PRO VII and Radeon VII. This impacts an unknown function of the component RAS TA Driver. Such manipulation leads to improper validation of array index.
This vulnerability is traded as CVE-2023-20601. An attack has to be approached locally. There is no exploit available.
A vulnerability was found in filosoft Comerc.32 Commercial Invoicing 16.0.0.3. It has been rated as problematic. This affects an unknown function of the file comeinst.exe. This manipulation causes code injection.
This vulnerability appears as CVE-2025-63421. The attack requires local access. There is no available exploit.
A vulnerability was found in CordysCRM 1.4.1. It has been declared as critical. The impacted element is an unknown function of the file /user/list of the component Employee List Query Interface. The manipulation of the argument departmentIds results in sql injection.
This vulnerability is reported as CVE-2025-70981. The attack can be launched remotely. No exploit exists.
A vulnerability was found in Infoblox NIOS up to 9.0.7 and classified as problematic. Impacted is an unknown function of the component Account Creation. Executing a manipulation can lead to file inclusion.
This vulnerability is registered as CVE-2025-61879. It is possible to launch the attack remotely. No exploit is available.
A vulnerability has been found in halo-dev Halo up to 2.22.4 and classified as problematic. This issue affects some unknown processing of the component Public Comment Submission Endpoint. Performing a manipulation results in denial of service.
This vulnerability is cataloged as CVE-2025-70886. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in p2r3 bareiron 8e4d4020d. This vulnerability affects unknown code. Such manipulation leads to denial of service.
This vulnerability is listed as CVE-2025-69807. The attack may be performed from remote. There is no available exploit.
A vulnerability, which was classified as problematic, has been found in p2r3 bareiron 8e4d4020d. This affects an unknown part. This manipulation causes out-of-bounds read.
This vulnerability is tracked as CVE-2025-69806. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability classified as critical has been found in Infoblox NIOS up to 9.0.7. Affected by this vulnerability is an unknown functionality. The manipulation leads to deserialization.
This vulnerability is referenced as CVE-2025-61880. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability described as critical has been identified in unclecode Crawl4AI up to 0.7.x. Affected is an unknown function of the file /execute_js of the component Docker API Deployment. Executing a manipulation can lead to path traversal.
The identification of this vulnerability is CVE-2026-26217. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in BrightSign OS 4 Player and OS 5 Player. This impacts an unknown function. Performing a manipulation results in use of default credentials.
This vulnerability was named CVE-2025-54756. The attack needs to be approached locally. There is no available exploit.
It is suggested to upgrade the affected component.