Security
Headlines
HeadlinesLatestCVEs

Tag

#web

GHSA-6xfj-hhwh-r3c2: Ouch Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability

A vulnerability was found in ouch-org ouch up to 0.3.1. It has been classified as critical. This affects the function ouch::archive::zip::convert_zip_date_time of the file zip.rs. The manipulation of the argument month leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 0.4.0 is able to address this issue. It is recommended to upgrade the affected component.

ghsa
#vulnerability#web#auth
GHSA-q8jq-4rm5-4hm5: @alizeait/unflatto Prototype Pollution

### Impact alizeait unflatto <= 1.0.2 was discovered to contain a prototype pollution via the method exports.unflatto at /dist/index.js. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. ### Patches The problem has been patched in 1.0.3 ### References https://github.com/advisories/GHSA-799q-f2px-wx8c

Rockwell Automation Lifecycle Services with Veeam Backup and Replication

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.4 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: Lifecycle Services with Veeam Backup and Replication Vulnerability: Deserialization of Untrusted Data 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker with administrative privileges to execute code on the target system. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Rockwell Automation reports the following Lifecycle Services with Veeam Backup and Replication are affected: Industrial Data Center (IDC) with Veeam: Generations 1 – 5 VersaVirtual Appliance (VVA) with Veeam: Series A - C 3.2 VULNERABILITY OVERVIEW 3.2.1 DESERIALIZATION OF UNTRUSTED DATA CWE-502 A remote code execution vulnerability exists in Veeam Backup and Replication, which the affected products use. Exploitation of the vulnerability can allow a threat actor to execute code on the target system. CVE-2025-23120 has been assigned to this vulnerability. ...

Intimate images from kink and LGBTQ+ dating apps left exposed online

A number of specialized dating apps leaked the--not so--secret storage location of 1.5 Million more or less explicit images

Cryptocurrency in 2025: Exploring Bitcoin Growth, AI, and the Next Wave of Tools

The cryptocurrency world feels like a wild ride full of risks, twists, and big dreams of building wealth.…

GHSA-wqcc-mfhw-53pc: Apache Answer User Using External Images Potentially Discloses User Information

Private Data Structure Returned From A Public Method vulnerability in Apache Answer. This issue affects Apache Answer: through 1.4.2. If a user uses an externally referenced image, when a user accesses this image, the provider of the image may obtain private information about the ip address of that accessing user. Users are recommended to upgrade to version 1.4.5, which fixes the issue. In the new version, administrators can set whether external content can be displayed.

GHSA-2c59-37c4-qrx5: Apache Parquet Avro Module Vulnerable to Arbitrary Code Execution

Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code Users are recommended to upgrade to version 1.15.1, which fixes the issue.

GHSA-3w85-5p9g-h334: Apache ActiveMQ Artemis User Without Create Address Permissions can Modify Address Routing-Type

A vulnerability exists in Apache ActiveMQ Artemis whereby a user with the createDurableQueue or createNonDurableQueue permission on an address can augment the routing-type supported by that address even if said user doesn't have the createAddress permission for that particular address. When combined with the send permission and automatic queue creation a user could successfully send a message with a routing-type not supported by the address when that message should actually be rejected on the basis that the user doesn't have permission to change the routing-type of the address. This issue affects Apache ActiveMQ Artemis from 2.0.0 through 2.39.0. Users are recommended to upgrade to version 2.40.0 which fixes the issue.

&#8220;Urgent reminder&#8221; tax scam wants to phish your Microsoft credentials

With tax season in full swing, we're seeing scammers flexing their social engineering muscles. Be prepared.

GHSA-39g6-x4x8-5jcm: Drupal Core Potential Cross-Site Scripting (XSS) via Error Messages

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Drupal core allows Cross-Site Scripting (XSS).This issue affects Drupal core: from 8.0.0 before 10.3.13, from 10.4.0 before 10.4.3, from 11.0.0 before 11.0.12, from 11.1.0 before 11.1.3.