Cloudflare has alerted users of a security vulnerability—tracked as CVE-2025-4366—in the widely used Pingora OSS framework. This vulnerability, a request…
Development
From zero-day exploits to large-scale bot attacks — the demand for a powerful, self-hosted, and user-friendly web application security solution…
As part of the latest “season” of Operation Endgame, a coalition of law enforcement agencies have taken down about 300…
Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTrap has compromised nearly 5,300 unique network edge devices across 84…
Nation-state threat actors targeting Commvault applications hosted in Microsoft Azure may be part of a broader campaign targeting Software-as-a-Service (SaaS)…
The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix as a…
Versa Networks has patched three vulnerabilities in its Concerto network security and SD-WAN orchestration platform, including one that scored a…
At MongoDB we believe in fair competition, open collaboration, and innovation that empowers developers. Our work has popularized the document…
Migrating SQL Server databases to Amazon Elastic Compute Cloud (Amazon EC2) using AWS Application Migration Service (AWS MGN) is a…
Generative artificial intelligence (AI) applications and relational databases are increasingly being used together to create new solutions across industries. The…
In this post, we describe some of the openCypher features that have been released as part of the 1.4.2.0 engine…
Recent advances in long-context (LC) modeling have unlocked new capabilities for LLMs and large vision-language models (LVLMs). Long-context vision–language models…
This post was cowritten by Mulay Ahmed, Assistant Director of Engineering, and Ruby Donald, Assistant Director of Engineering at Principal…
In the fast-evolving world of software testing, automation tools like Playwright are pushing boundaries. But as these tools become more sophisticated, so do the challenges in making them flexible and connected. Enter Playwright MCP (Model Context Protocol) a revolutionary approach that lets your automation tools interact directly with local data, remote APIs, and third-party applications,
The post Playwright MCP: Expert Strategies for Success appeared first on Codoid.
CVE ID : CVE-2025-5119
Published : May 23, 2025, 9:15 p.m. | 3 hours, 39 minutes ago
Description : A vulnerability has been found in Emlog Pro 2.5.11 and classified as critical. This vulnerability affects unknown code of the file /include/controller/api_controller.php. The manipulation of the argument tag leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure and confirmed the existence of the vulnerability.
Severity: 7.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-44998
Published : May 23, 2025, 7:15 p.m. | 1 hour, 38 minutes ago
Description : A stored cross-site scripting (XSS) vulnerability in the component /tinyfilemanager.php of TinyFileManager v2.4.7 allows attackers to execute arbitrary JavaScript or HTML via injecting a crafted payload into the js-theme-3 parameter.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-46176
Published : May 23, 2025, 7:15 p.m. | 1 hour, 38 minutes ago
Description : Hardcoded credentials in the Telnet service in D-Link DIR-605L v2.13B01 and DIR-816L v2.06B01 allow attackers to remotely execute arbitrary commands via firmware analysis.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-48735
Published : May 23, 2025, 8:15 p.m. | 37 minutes ago
Description : A SQL Injection issue in the request body processing in BOS IPCs with firmware 21.45.8.2.2_220219 before 21.45.8.2.3_230220 allows remote attackers to obtain sensitive information from the database via crafted input in the request body.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-48738
Published : May 23, 2025, 8:15 p.m. | 37 minutes ago
Description : An e-mail flooding vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, 5.4.0 before 5.4.10, and 5.5.0 before 5.5.1 allows unauthenticated remote attackers to use the password reset feature without limits. This can lead to several consequences, including mailbox storage exhaustion for targeted users, reputation damage to the SMTP server, potentially causing it to be blacklisted, and overload of the SMTP server’s outbound mail queue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2025-48739
Published : May 23, 2025, 8:15 p.m. | 37 minutes ago
Description : A Server-Side Request Forgery (SSRF) vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, 5.4.0 before 5.4.10, and 5.5.0 before 5.5.1 allows remote authenticated attackers with admin permissions (allowing them to access specific API endpoints) to manipulate URLs to direct requests to unexpected hosts or ports. This allows the attacker to use a TheHive server as a proxy to reach internal or otherwise restricted resources. This could be exploited to access other servers on the internal network.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more…