Security

CVE ID : CVE-2025-5745

Published : June 5, 2025, 8:15 p.m. | 1 hour, 52 minutes ago

Description : The strncmp implementation optimized for the Power10 processor in the GNU C Library version 2.40 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.

Severity: 5.6 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-48133

Published : June 5, 2025, 9:15 p.m. | 52 minutes ago

Description : Missing Authorization vulnerability in Uncanny Owl Uncanny Automator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Uncanny Automator: from n/a through 6.4.0.2.

Severity: 6.5 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-47966

Published : June 5, 2025, 9:15 p.m. | 52 minutes ago

Description : Exposure of sensitive information to an unauthorized actor in Power Automate allows an unauthorized attacker to elevate privileges over a network.

Severity: 9.8 | CRITICAL

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5694

Published : June 5, 2025, 9:15 p.m. | 52 minutes ago

Description : A vulnerability was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /search-report-result.php. The manipulation of the argument serachdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Severity: 6.3 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5695

Published : June 5, 2025, 9:15 p.m. | 52 minutes ago

Description : A vulnerability classified as critical has been found in FLIR AX8 up to 1.46.16. This affects the function subscribe_to_spot/subscribe_to_delta/subscribe_to_alarm of the file /usr/www/application/models/subscriptions.php of the component Backend. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.55.16 is able to address this issue. It is recommended to upgrade the affected component.

Severity: 4.7 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

️ Inside the 160-Comment Fight to Fix SnakeYAML’s RCE Default

How a 5-year-old deserialization flaw, a vacation phone call, and some persistence led to a safer Java ecosystem“I’ve Seen This Before”: Rediscovering an Old Vulnerability in New CodeThis whole story …
Read more

Published Date:
Jun 05, 2025 (5 hours, 7 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-20286 Credential Reuse Vulnerability in Cisco ISE

CVE-2025-20286 is a critical security vulnerability identified in Cisco Identity Services Engine (ISE) when deployed on certain cloud platforms, including:Amazon Web Services (AWS)Microsoft AzureOracl …
Read more

Published Date:
Jun 05, 2025 (2 hours, 55 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-20286

CVE-2025-5419

CVE-2025-20156

Hacker selling critical Roundcube webmail exploit as tech info disclosed

Hackers are likely starting to exploit CVE-2025-49113, a critical vulnerability in the widely used Roundcube open-source webmail application that allows remote execution.
The security issue has been p …
Read more

Published Date:
Jun 05, 2025 (2 hours, 52 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-48745

CVE-2025-49113

Cisco IMC Vulnerability Attackers to Access Internal Services with Elevated Privileges

A significant vulnerability in Cisco’s Integrated Management Controller (IMC) that allows malicious actors to gain elevated privileges and access internal services without proper authorization.
This v …
Read more

Published Date:
Jun 05, 2025 (2 hours, 33 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-20261

Cisco Nexus Dashboard Vulnerability Lets Attackers Impersonate as Managed Devices

A high-severity vulnerability has been discovered in Cisco’s Nexus Dashboard Fabric Controller (NDFC) that could allow unauthenticated attackers to impersonate managed network devices through compromi …
Read more

Published Date:
Jun 05, 2025 (2 hours, 27 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-20163

VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code

Multiple Cross-Site Scripting (XSS) vulnerabilities in the VMware NSX network virtualization platform could allow malicious actors to inject and execute harmful code.
The security bulletin published o …
Read more

Published Date:
Jun 05, 2025 (2 hours, 15 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-22245

CVE-2025-22244

CVE-2025-22243

CVE ID : CVE-2025-5665

Published : June 5, 2025, 3:15 p.m. | 3 hours, 13 minutes ago

Description : A vulnerability was found in FreeFloat FTP Server 1.0. It has been classified as critical. Affected is an unknown function of the component XCWD Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Severity: 7.3 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5664

Published : June 5, 2025, 3:15 p.m. | 3 hours, 13 minutes ago

Description : A vulnerability was found in FreeFloat FTP Server 1.0 and classified as critical. This issue affects some unknown processing of the component RESTART Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Severity: 7.3 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5667

Published : June 5, 2025, 4:15 p.m. | 2 hours, 13 minutes ago

Description : A vulnerability was found in FreeFloat FTP Server 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the component REIN Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Severity: 7.3 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5666

Published : June 5, 2025, 4:15 p.m. | 2 hours, 13 minutes ago

Description : A vulnerability was found in FreeFloat FTP Server 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component XMKD Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Severity: 7.3 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5669

Published : June 5, 2025, 5:15 p.m. | 1 hour, 13 minutes ago

Description : A vulnerability classified as critical was found in PHPGurukul Medical Card Generation System 1.0. This vulnerability affects unknown code of the file /admin/unreadenq.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Severity: 6.3 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5668

Published : June 5, 2025, 5:15 p.m. | 1 hour, 13 minutes ago

Description : A vulnerability classified as critical has been found in PHPGurukul Medical Card Generation System 1.0. This affects an unknown part of the file /admin/readenq.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Severity: 6.3 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-49009

Published : June 5, 2025, 5:15 p.m. | 1 hour, 13 minutes ago

Description : Para is a multitenant backend server/framework for object persistence and retrieval. A vulnerability that exists in versions prior to 1.50.8 in `FacebookAuthFilter.java` results in a full request URL being logged during a failed request to a Facebook user profile. The log includes the user’s access token in plain text. Since WARN-level logs are often retained in production and accessible to operators or log aggregation systems, this poses a risk of token exposure. Version 1.50.8 fixes the issue.

Severity: 6.2 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-48493

Published : June 5, 2025, 5:15 p.m. | 1 hour, 13 minutes ago

Description : The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5670

Published : June 5, 2025, 5:15 p.m. | 1 hour, 13 minutes ago

Description : A vulnerability, which was classified as critical, has been found in PHPGurukul Medical Card Generation System 1.0. This issue affects some unknown processing of the file /admin/manage-card.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Severity: 6.3 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…