Development

CVE ID : CVE-2024-47081

Published : June 9, 2025, 6:15 p.m. | 2 hours, 12 minutes ago

Description : Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one’s Requests Session.

Severity: 5.3 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-49652

Published : June 9, 2025, 6:15 p.m. | 2 hours, 12 minutes ago

Description : Missing Authentication in the registration feature of Lablup’s BackendAI allows arbitrary users to create user accounts that can access private data even when registration is disabled.

Severity: 9.8 | CRITICAL

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-49651

Published : June 9, 2025, 6:15 p.m. | 3 hours, 14 minutes ago

Description : Missing Authorization in Lablup’s BackendAI allows attackers to takeover all active sessions; Accessing, stealing, or altering any data accessible in the session. This vulnerability exists in all current versions of BackendAI.

Severity: 8.1 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-49653

Published : June 9, 2025, 6:15 p.m. | 3 hours, 14 minutes ago

Description : Exposure of sensitive data in active sessions in Lablup’s BackendAI allows attackers to retrieve credentials for users on the management platform.

Severity: 8.0 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5888

Published : June 9, 2025, 6:15 p.m. | 2 hours, 12 minutes ago

Description : A vulnerability was found in jsnjfz WebStack-Guns 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Severity: 4.3 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5889

Published : June 9, 2025, 7:15 p.m. | 1 hour, 12 minutes ago

Description : A vulnerability was found in juliangruber brace-expansion up to 1.1.11. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to apply a patch to fix this issue.

Severity: 3.1 | LOW

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5891

Published : June 9, 2025, 7:15 p.m. | 1 hour, 12 minutes ago

Description : A vulnerability classified as problematic was found in Unitech pm2 up to 6.0.6. This vulnerability affects unknown code of the file /lib/tools/Config.js. The manipulation leads to inefficient regular expression complexity. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Severity: 4.3 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5890

Published : June 9, 2025, 7:15 p.m. | 1 hour, 12 minutes ago

Description : A vulnerability classified as problematic has been found in actions toolkit 0.5.0. This affects the function globEscape of the file toolkit/packages/glob/src/internal-pattern.ts of the component glob. The manipulation leads to inefficient regular expression complexity. It is possible to initiate the attack remotely.

Severity: 4.3 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection

A critical cross-site scripting (XSS) vulnerability in the popular Jenkins Gatling Plugin allows attackers to bypass Content-Security-Policy (CSP) protections.
The vulnerability, tracked as CVE-2025-5 …
Read more

Published Date:
Jun 09, 2025 (5 hours, 49 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-5806

China-Backed Hackers Target SentinelOne in ‘PurpleHaze’ Attack Spree

Source: Shane Stickley via Alamy Stock PhotoThreat actors from China targeted a security vendor as part of a spree of attacks against various organizations that occurred in an eight-month period start …
Read more

Published Date:
Jun 09, 2025 (5 hours, 44 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2024-8963

CVE-2024-8190

Multiple QNAP Vulnerabilities Let Remote Attacker Gains Access to a User Account

Two significant QNAP security vulnerabilities affecting Qsync Central 4.5.x that could allow remote attackers to exploit user accounts and gain unauthorized access to sensitive data.
The vulnerabiliti …
Read more

Published Date:
Jun 09, 2025 (5 hours, 39 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-29892

CVE-2025-22482

Roundcube RCE: Dark web activity signals imminent attacks (CVE-2025-49113)

With an exploit for a critical Roundcube vulnerability (CVE-2025-49113) being offered for sale on underground forums and a PoC exploit having been made public, attacks exploiting the flaw are incoming …
Read more

Published Date:
Jun 09, 2025 (5 hours, 25 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-49113

CVE-2024-42009

CVE-2024-42008

CVE-2024-37383

CVE-2023-5631

CVE-2023-43770

Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware

A new wave of cyberattacks has emerged targeting critical infrastructure through the exploitation of Fortigate security appliance vulnerabilities, with threat actors successfully deploying the notorio …
Read more

Published Date:
Jun 09, 2025 (4 hours, 46 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2024-55591

CVE-2024-21762

Apple’s “Liquid Glass” Vision: iPhone 2027 & Unified OS 26

As Apple is expected to unveil its next-generation operating systems at WWDC 2025—with speculation suggesting a unified version number “26” symbolizing the year 2026—Bloomberg journalist Mark Gurman h …
Read more

Published Date:
Jun 09, 2025 (3 hours, 46 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2024-23222

Critical Wazuh RCE (CVE-2025-24016) Actively Exploited by Mirai Botnets

Akamai’s Security Intelligence and Response Team (SIRT) has uncovered active exploitation of CVE-2025-24016, a critical remote code execution (RCE) vulnerability in Wazuh servers, by multiple Mirai-ba …
Read more

Published Date:
Jun 09, 2025 (2 hours, 24 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-1316

CVE-2025-24016

CVE-2023-1389

CVE-2017-18368

CVE-2017-17215

Critical Wazuh Server RCE Vulnerability Exploited to Deploy Mirai Variants

Security researchers at Akamai have discovered active exploitation of a critical remote code execution vulnerability in Wazuh servers, marking the first reported in-the-wild attacks against the open-s …
Read more

Published Date:
Jun 09, 2025 (1 hour, 57 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-24016

CVE-2023-1389

CVE-2017-18368

CVE-2017-17215

Chinese-Linked Hackers Targeted 70+ Global Organizations, SentinelLABS

SentinelLABS uncovers widespread China-linked cyber espionage targeting over 70 global organizations and cybersecurity firms between July 2024 and March 2025. Learn about the “PurpleHaze (aka Vixen Pa …
Read more

Published Date:
Jun 09, 2025 (1 hour, 19 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2024-8963

CVE-2024-8190

CVE ID : CVE-2025-48126

Published : June 9, 2025, 4:15 p.m. | 25 minutes ago

Description : Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’) vulnerability in g5theme Essential Real Estate allows PHP Local File Inclusion. This issue affects Essential Real Estate: from n/a through 5.2.1.

Severity: 8.1 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-48129

Published : June 9, 2025, 4:15 p.m. | 25 minutes ago

Description : Incorrect Privilege Assignment vulnerability in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light allows Privilege Escalation. This issue affects Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light: from n/a through 2.4.37.

Severity: 9.8 | CRITICAL

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-48130

Published : June 9, 2025, 4:15 p.m. | 25 minutes ago

Description : Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in spicethemes Spice Blocks allows Path Traversal. This issue affects Spice Blocks: from n/a through 2.0.7.2.

Severity: 7.5 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…