Ubuntu Linux Kernel Multiple Vulnerabilities
Multiple vulnerabilities were identified in Ubuntu Linux Kernel. An attacker could exploit some of these vulnerabilities to trigger security restriction bypass, denial...
Multiple vulnerabilities were identified in Ubuntu Linux Kernel. An attacker could exploit some of these vulnerabilities to trigger security restriction bypass, denial...
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger data manipulation...
A vulnerability was identified in Google Chrome. A remote attacker could exploit this vulnerability to trigger data manipulation and sensitive information...
Vulnerability Summary: CVE-2025-53107 @cyanheads/git-mcp-server is an MCP server designed to interact with Git repositories. Prior to version 2.1.5, there is...
Vulnerability Summary: CVE-2025-52294 Insufficient validation of the screen lock mechanism in Trust Wallet v8.45 allows physically proximate attackers to bypass...
Vulnerability Summary: CVE-2025-45081 Misconfigured settings in IITB SSO v1.1.0 allow attackers to access sensitive application data. Affected Endpoints: No affected...
Vulnerability Summary: CVE-2025-53103 JUnit is a testing framework for Java and the JVM. From version 5.12.0 to 5.13.1, JUnit's support...
Vulnerability Summary: CVE-2025-45083 Incorrect access control in Ullu (Android version v2.9.929 and IOS version v2.8.0) allows attackers to bypass parental...
Vulnerability Summary: CVE-2025-48379 Pillow is a Python imaging library. In versions 11.2.0 to before 11.3.0, there is a heap buffer...
Vulnerability Summary: CVE-2025-53104 gluestack-ui is a library of copy-pasteable components & patterns crafted with Tailwind CSS (NativeWind). Prior to commit...
Vulnerability Summary: CVE-2025-46259 Missing Authorization vulnerability in POSIMYTH Innovation The Plus Addons for Elementor Pro allows Exploiting Incorrectly Configured Access...
Vulnerability Summary: CVE-2025-27153 Escalade GLPI plugin is a ticket escalation process helper for GLPI. Prior to version 2.9.11, there is...
Vulnerability Summary: CVE-2025-49741 No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to disclose information over...
Microsoft's latest attempts to ease the transition to Windows 11 for Windows 10 users "don't go far enough," according to...
China’s Northwestern Polytechnical University last week flew a hypersonic craft and claimed the test achieved some world-first feats.The University named...
Firewalls are a cornerstone of cybersecurity, acting as the first line of defense against cyber threats. They monitor and filter...
Vulnerability Summary: CVE-2025-6900 A vulnerability has been found in code-projects Library System 1.0 and classified as critical. This vulnerability affects...
Vulnerability Summary: CVE-2025-6898 A vulnerability, which was classified as critical, has been found in D-Link DI-7300G+ 19.12.25A1. Affected by this...
Vulnerability Summary: CVE-2025-6899 A vulnerability, which was classified as critical, was found in D-Link DI-7300G+ and DI-8200G 17.12.20A1/19.12.25A1. This affects...
Vulnerability Summary: CVE-2025-53415 Delta Electronics DTM Soft Project File Parsing Deserialization of Untrusted Data Remote Code Execution Affected Endpoints: No...
Vulnerability Summary: CVE-2025-6897 A vulnerability classified as critical was found in D-Link DI-7300G+ 19.12.25A1. Affected by this vulnerability is an...
Vulnerability Summary: CVE-2025-41439 A reflected cross-site scripting vulnerability via a specific parameter exists in SLNX Help Documentation of RICOH Streamline...
Vulnerability Summary: CVE-2024-8419 The endpoint hosts a script that allows an unauthorized remote attacker to put the system in a...
Vulnerability Summary: CVE-2025-6902 A vulnerability was found in code-projects Inventory Management System 1.0. It has been classified as critical. Affected...