Citrix NetScaler ADC and Gateway Vulnerability Actively Exploited in the Wild

Cloud Software Group has issued an urgent security advisory warning customers about a critical memory overflow vulnerability in NetScaler ADC and Gateway products, which could enable denial-of-service …
Read more

Published Date:
Jun 25, 2025 (1 hour ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-6543

CVE-2023-4966

CVE-2023-3519

CVE ID : CVE-2025-6603

Published : June 25, 2025, 11:15 a.m. | 2 hours, 40 minutes ago

Description : A vulnerability was found in coldfunction qCUDA up to db0085400c2f2011eed46fbc04fdc0873141688e. It has been rated as problematic. Affected by this issue is the function qcow_make_empty of the file qCUDA/qcu-device/block/qcow.c. The manipulation of the argument s->l1_size leads to integer overflow. The attack needs to be approached locally. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.

Severity: 5.3 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-25012

Published : June 25, 2025, 12:15 p.m. | 1 hour, 40 minutes ago

Description : URL redirection to an untrusted site (‘Open Redirect’) in Kibana can lead to sending a user to an arbitrary site and server-side request forgery via a specially crafted URL.

Severity: 4.3 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-6543

Published : June 25, 2025, 1:15 p.m. | 40 minutes ago

Description : Memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway when configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-6604

Published : June 25, 2025, 1:15 p.m. | 40 minutes ago

Description : A vulnerability classified as critical has been found in SourceCodester Best Salon Management System 1.0. This affects an unknown part of the file /panel/add-staff.php. The manipulation of the argument Name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Severity: 6.3 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-48954

Published : June 25, 2025, 2:15 p.m. | 14 minutes ago

Description : Discourse is an open-source discussion platform. Versions prior to 3.5.0.beta6 are vulnerable to cross-site scripting when the content security policy isn’t enabled when using social logins. Version 3.5.0.beta6 patches the issue. As a workaround, have the content security policy enabled.

Severity: 8.1 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

This is a bit of a general question. I’m trying to practice my testing skills and perhaps get some better experience with manual testing mature applications. In particular, I’m interested in desktop applications. One good place to do this is with open source projects, particularly those in need of dedicated/semi-dedicated testers. While I know every open source project has its own culture around it, with differing levels of maturity, are there any general tips for OSS testing?