Security

CVE ID : CVE-2025-5484

Published : June 12, 2025, 8:15 p.m. | 1 hour, 14 minutes ago

Description : A username and password are required to authenticate to the central
SinoTrack device management interface. The username for all devices is
an identifier printed on the receiver. The default password is
well-known and common to all devices. Modification of the default
password is not enforced during device setup. A malicious actor can
retrieve device identifiers with either physical access or by capturing
identifiers from pictures of the devices posted on publicly accessible
websites such as eBay.

Severity: 8.3 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5485

Published : June 12, 2025, 8:15 p.m. | 1 hour, 14 minutes ago

Description : User names used to access the web management interface are limited to
the device identifier, which is a numerical identifier no more than 10
digits. A malicious actor can enumerate potential targets by
incrementing or decrementing from known identifiers or through
enumerating random digit sequences.

Severity: 8.6 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-6031

Published : June 12, 2025, 8:15 p.m. | 1 hour, 46 minutes ago

Description : Amazon Cloud Cam is a home security camera that was deprecated on December 2, 2022, is end of life, and is no longer actively supported.

When a user powers on the Amazon Cloud Cam, the device attempts to connect to a remote service infrastructure that has been deprecated due to end-of-life status. The device defaults to a pairing status in which an arbitrary user can bypass SSL pinning to associate the device to an arbitrary network, allowing for network traffic interception and modification.

We recommend customers discontinue usage of any remaining Amazon Cloud Cams.

Severity: 7.5 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-27689

Published : June 12, 2025, 9:15 p.m. | 46 minutes ago

Description : Dell iDRAC Tools, version(s) prior to 11.3.0.0, contain(s) an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

Severity: 7.8 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-49589

Published : June 12, 2025, 9:15 p.m. | 46 minutes ago

Description : PCSX2 is a free and open-source PlayStation 2 (PS2) emulator. A stack-based buffer overflow exists in the Kprintf_HLE function of PCSX2 versions up to 2.3.414. Opening a disc image that logs a specially crafted message may allow a remote attacker to execute arbitrary code if the user enabled IOP Console Logging. This vulnerability is fixed in 2.3.414.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-44091

Published : June 12, 2025, 9:15 p.m. | 46 minutes ago

Description : yangyouwang crud v1.0.0 is vulnerable to Cross Site Scripting (XSS) via the role management function.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

EchoLeak Zero-Click AI Attack in Microsoft Copilot Exposes Company Data

Cybersecurity firm Aim Labs has uncovered a serious new security problem, named EchoLeak, affecting Microsoft 365 (M365) Copilot, a popular AI assistant. This flaw is a zero-click vulnerability, meani …
Read more

Published Date:
Jun 12, 2025 (5 hours, 14 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2023-24955

CVE-2025-41234: Spring Framework Vulnerability Enables Reflected File Download Attacks

The Spring project has released a security advisory disclosing a vulnerability in the popular Spring Framework, which could allow attackers to launch Reflected File Download (RFD) attacks under certai …
Read more

Published Date:
Jun 12, 2025 (3 hours, 54 minutes ago)

Vulnerabilities has been mentioned in this article.

Multiple GitLab Vulnerabilities Allow Attackers to Achieve Complete Account Takeover

A series of critical security vulnerabilities across GitLab Community Edition (CE) and Enterprise Edition (EE) platforms that could enable attackers to achieve complete account takeover and compromise …
Read more

Published Date:
Jun 12, 2025 (3 hours, 40 minutes ago)

Vulnerabilities has been mentioned in this article.

Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions

A critical command injection vulnerability in Palo Alto Networks PAN-OS operating system enables authenticated administrative users to escalate privileges and execute commands as the root user.
Design …
Read more

Published Date:
Jun 12, 2025 (3 hours, 29 minutes ago)

Vulnerabilities has been mentioned in this article.

OpenPGP.js Vulnerability Let Attackers Spoof Message Signature Verification

A critical vulnerability in the widely-used OpenPGP.js library has been discovered that allows attackers to forge digital signatures and deceive users into believing malicious content was legitimately …
Read more

Published Date:
Jun 12, 2025 (3 hours, 25 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-47934

IPhones Europese journalisten via iOS zero click-lek besmet met spyware

De iPhones van in ieder geval twee Europese journalisten zijn via een zero-click kwetsbaarheid in iOS besmet geraakt met de Graphite-spyware van Paragon Solutions. Het bestaan van het beveiligingslek, …
Read more

Published Date:
Jun 12, 2025 (2 hours, 29 minutes ago)

Vulnerabilities has been mentioned in this article.

137 Key Cybersecurity Statistics for 2025 and Beyond

Top cybersecurity facts
Staying ahead in cybersecurity means getting the lay of the land—what’s working, what’s not, and what’s changing. This cybersecurity data isn’t just numbers; it’s deep insights …
Read more

Published Date:
Jun 13, 2025 (0 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2024-1709

CVE-2024-1708

CVE ID : CVE-2024-44905

Published : June 12, 2025, 4:15 p.m. | 1 hour, 50 minutes ago

Description : go-pg pg v10.13.0 was discovered to contain a SQL injection vulnerability via the component /types/append_value.go.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2024-44906

Published : June 12, 2025, 4:15 p.m. | 1 hour, 50 minutes ago

Description : uptrace pgdriver v1.2.1 was discovered to contain a SQL injection vulnerability via the appendArg function in /pgdriver/format.go.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2024-7562

Published : June 12, 2025, 4:15 p.m. | 1 hour, 50 minutes ago

Description : A potential elevated privilege issue has been reported with InstallShield built Standalone MSI setups having multiple InstallScript custom actions configured. All supported versions (InstallShield 2023 R2, InstallShield 2022 R2 and InstallShield 2021 R2) are affected by this issue.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-29744

Published : June 12, 2025, 4:15 p.m. | 1 hour, 50 minutes ago

Description : pg-promise before 11.5.5 is vulnerable to SQL Injection due to improper handling of negative numbers.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-36573

Published : June 12, 2025, 4:15 p.m. | 1 hour, 50 minutes ago

Description : Dell Smart Dock Firmware, versions prior to 01.00.08.01, contain an Insertion of Sensitive Information into Log File vulnerability. A user with local access could potentially exploit this vulnerability, leading to Information disclosure.

Severity: 7.1 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-46035

Published : June 12, 2025, 4:15 p.m. | 1 hour, 50 minutes ago

Description : Buffer Overflow vulnerability in Tenda AC6 v.15.03.05.16 allows a remote attacker to cause a denial of service via the oversized schedStartTime and schedEndTime parameters in an unauthenticated HTTP GET request to the /goform/openSchedWifi endpoint

Severity: 7.5 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-49467

Published : June 12, 2025, 4:15 p.m. | 1 hour, 50 minutes ago

Description : A SQL injection vulnerability in JEvents component before 3.6.88 and 3.6.82.1 for Joomla was discovered. The extension is vulnerable to SQL injection via publicly accessible actions to list events by date ranges.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…