In the past, the vulnerability was exploited to drop Mirai botnet malware. Today, it's being used once more for another botnet campaign with its own malware.
微软官方宣布从 2025 年 5 月 27 日起,Microsoft Store 中的 Remote Desktop app 不再支持或提供下载。要继续访问 Windows 365、Azure Virtual Desktop 和 Microsoft Dev Box 的用户需要过渡到 Windows App。微软称 Windows App 相比 Remote Desktop app 有诸多改进,包括通过单一界面访问多项服务如 Cloud PC 和虚拟桌面;支持自定义主屏幕、多显示器和动态显示分辨率。微软称,5 月 27 日之后,通过 Microsoft Store 中的 Remote Desktop app 访问 Windows 365、Azure Virtual Desktop 和 Microsoft Dev Box 将被阻止。这一限制不适用于通过 MSI 安装的 Remote Desktop 客户端。
A vulnerability was found in Koha up to 21.11. It has been classified as critical. Affected is an unknown function of the file /serials/lateissues-export.pl. The manipulation of the argument supplierid leads to sql injection.
This vulnerability is traded as CVE-2025-22954. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in XPixelGroup BasicSR up to 1.4.2 and classified as problematic. This issue affects some unknown processing of the component Environment Variable Handler. The manipulation of the argument SLURM_NODELIST leads to Local Privilege Escalation.
The identification of this vulnerability is CVE-2024-27763. An attack has to be approached locally. There is no exploit available.
A vulnerability has been found in Apache Camel up to 3.22.3/4.8.4/4.10.1 and classified as problematic. This vulnerability affects unknown code of the component Header Handler. The manipulation leads to improper neutralization of internal special elements.
This vulnerability was named CVE-2025-29891. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
Private 5G networks were once heralded as the future of enterprise connectivity, offering unprecedented flexibility, faster speeds, and freedom from the limitations of wired networks. Yet, despite optimistic forecasts, the widespread adoption of private 5G has encountered significant roadblocks. This begs the burning...
Mozilla is warning Firefox users to update their browsers to the latest version to avoid facing disruption and security risks caused by the upcoming expiration of one of the company's root certificates. [...]
A vulnerability, which was classified as critical, has been found in Conversios.io Plugin up to 4.6.1 on WordPress. Affected by this issue is the function tvcajax_product_sync_bantch_wise of the component SQL Statement Handler. The manipulation of the argument sync_progressive_data leads to sql injection.
This vulnerability is handled as CVE-2021-24952. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Apple iOS and iPadOS up to 15.3.1. This issue affects some unknown processing of the component Wi-Fi. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2022-22668. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Apple macOS. This vulnerability affects unknown code of the component Wi-Fi. The manipulation leads to information disclosure.
This vulnerability was named CVE-2022-22668. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Apple macOS up to 12.5.1 and classified as problematic. This vulnerability affects unknown code of the component iMovie. The manipulation leads to information disclosure.
This vulnerability was named CVE-2022-32896. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple iOS and iPadOS up to 16.2 and classified as problematic. This issue affects some unknown processing of the component Kernel. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2023-23502. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple iOS and iPadOS up to 16.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Maps. The manipulation leads to state issue.
This vulnerability is handled as CVE-2023-23503. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Apple watchOS up to 9.2. Affected is an unknown function of the component Kernel. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2023-23502. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Apple watchOS up to 9.2. Affected by this issue is some unknown functionality of the component Maps. The manipulation leads to state issue.
This vulnerability is handled as CVE-2023-23503. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Apple macOS and classified as problematic. This vulnerability affects unknown code of the component Kernel. The manipulation leads to information disclosure.
This vulnerability was named CVE-2023-23502. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple tvOS up to 16.2. It has been declared as problematic. This vulnerability affects unknown code of the component Kernel. The manipulation leads to information disclosure.
This vulnerability was named CVE-2023-23502. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.