Little CMS Color Engine (lcms2) is a small-footprint color management engine, with special focus on accuracy and performance. The post…

“CitrixBleed 2” Vulnerability PoC Released – Warns of Potential Widespread Exploitation

Critical flaw in Citrix NetScaler devices echoes infamous 2023 security breach that crippled major organizations worldwide.
The new critical vulnerability in Citrix NetScaler devices has security expe …
Read more

Published Date:
Jul 05, 2025 (2 hours, 23 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-5777

CVE-2024-4577

CVE-2023-4966

Hashrat is a hash-generation utility that supports the md5, sha1, sha256, sha512, whirlpool, jh-22, and more. The post Hashrat –…

Google Chrome Now Scans Your PC for Windows 11 Upgrade Eligibility as Windows 10 Nears EOL

Official support for the Windows 10 operating system will conclude in October 2025. However, given the vast number of devices still running Windows 10—many of which fail to meet the hardware requireme …
Read more

Published Date:
Jul 05, 2025 (4 hours, 11 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-3619

CVE-2024-10488

CVE-2024-10487

CVE ID : CVE-2025-7074

Published : July 5, 2025, 9:15 a.m. | 47 minutes ago

Description : A vulnerability classified as problematic has been found in vercel hyper up to 3.4.1. This affects the function expand/braceExpand/ignoreMap of the file hyper/bin/rimraf-standalone.js. The manipulation leads to inefficient regular expression complexity. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Severity: 4.3 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2023-50786

Published : July 5, 2025, 4:15 a.m. | 3 hours, 42 minutes ago

Description : Dradis through 4.16.0 allows referencing external images (resources) over HTTPS, instead of forcing the use of embedded (uploaded) images. This can be leveraged by an authorized author to attempt to steal the Net-NTLM hashes of other authors on a Windows domain network.

Severity: 4.1 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…