Security

CVE ID : CVE-2025-5660

Published : June 5, 2025, 1:15 p.m. | 1 hour, 9 minutes ago

Description : A vulnerability, which was classified as critical, has been found in PHPGurukul Complaint Management System 2.0. Affected by this issue is some unknown functionality of the file /user/register-complaint.php. The manipulation of the argument noc leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Severity: 6.3 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

Amazon’s $10 Billion AI Boost: North Carolina Lands Major Tech Expansion!

Amazon has announced a $10 billion investment in North Carolina to expand its artificial intelligence infrastructure. This initiative aims to create 500 new high-skilled jobs and generate thousands of …
Read more

Published Date:
Jun 05, 2025 (4 hours, 45 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2022-2385

Google Proposes New Browser Security: Your Local Network, Your Permission!

A Google engineer recently published a proposal on GitHub recommending that websites be restricted from accessing devices on a local network through browsers such as Chrome—except in cases where the u …
Read more

Published Date:
Jun 05, 2025 (4 hours, 27 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2022-3075

Apple vs. EU: AirDrop, AirPlay & Seamless Pairing at Risk in Europe!

Following the European Union’s mandate requiring Apple to open its software ecosystem to enable interoperability with Android devices, tensions appear to have escalated—potentially leading to the susp …
Read more

Published Date:
Jun 05, 2025 (4 hours, 22 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2022-32898

Cisco waarschuwt voor kritiek ISE-beveiligingslek door statisch wachtwoord

Cisco waarschuwt organisaties voor een kritieke kwetsbaarheid in de Identity Services Engine (ISE) die wordt veroorzaakt door een statisch wachtwoord. Een ongeauthenticeerde aanvaller kan met dit wach …
Read more

Published Date:
Jun 05, 2025 (4 hours, 17 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-20286

Wireshark Vulnerability Enables DoS Attack Through Malicious Packet Injection

A critical vulnerability in the popular network protocol analyzer Wireshark has been discovered, allowing attackers to trigger denial-of-service (DoS) attacks through packet injection or the use of ma …
Read more

Published Date:
Jun 05, 2025 (2 hours, 29 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-5601

CVE-2025-1492

Cisco ISE Vulnerability Allows Remote to Access Sensitive Data – PoC Exploit Available

A critical vulnerability affecting its Identity Services Engine (ISE) when deployed on major cloud platforms, warning that proof-of-concept exploit code is now publicly available.
The flaw, tracked as …
Read more

Published Date:
Jun 05, 2025 (1 hour, 56 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-20286

IT threat evolution in Q1 2025. Non-mobile statistics

IT threat evolution in Q1 2025. Non-mobile statistics
IT threat evolution in Q1 2025. Mobile statistics
The statistics in this report are based on detection verdicts returned by Kaspersky products unl …
Read more

Published Date:
Jun 05, 2025 (1 hour, 45 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-0289

CVE-2025-0288

CVE-2025-0287

CVE-2025-0286

CVE-2025-0285

Play Ransomware Hacked 900 Organizations, CISA Released TTPs & IOCs

Federal authorities have revealed that the notorious Play ransomware group has successfully breached approximately 900 organizations worldwide as of May 2025, marking a dramatic escalation in cybercri …
Read more

Published Date:
Jun 05, 2025 (1 hour, 22 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2024-57727

Vulnerability in 2ClickPortal software

CVE ID
CVE-2025-4568
Publication date
05 June 2025
Vendor
Trol InterMedia
Product
2ClickPortal
Vulnerable versions
All before 7.14.3
Vulnerability type (CWE)
Improper Neutralization of Special Element …
Read more

Published Date:
Jun 05, 2025 (46 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-4568

CVE ID : CVE-2025-5642

Published : June 5, 2025, 7:15 a.m. | 4 hours, 25 minutes ago

Description : A vulnerability classified as problematic has been found in Radare2 5.9.9. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation leads to memory corruption. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is identified as 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and “crashy”. Further analysis has shown “the race is not a real problem unless you use asan”. A new warning has been added.

Severity: 2.5 | LOW

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5643

Published : June 5, 2025, 7:15 a.m. | 4 hours, 25 minutes ago

Description : A vulnerability classified as problematic was found in Radare2 5.9.9. Affected by this vulnerability is the function cons_stack_load in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is named 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and “crashy”. Further analysis has shown “the race is not a real problem unless you use asan”. A new warning has been added.

Severity: 2.5 | LOW

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5641

Published : June 5, 2025, 7:15 a.m. | 4 hours, 25 minutes ago

Description : A vulnerability was found in Radare2 5.9.9. It has been rated as problematic. This issue affects the function r_cons_is_breaked in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and “crashy”. Further analysis has shown “the race is not a real problem unless you use asan”. An additional warning regarding threading support has been added.

Severity: 2.5 | LOW

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5644

Published : June 5, 2025, 7:15 a.m. | 4 hours, 25 minutes ago

Description : A vulnerability, which was classified as problematic, has been found in Radare2 5.9.9. Affected by this issue is the function r_cons_flush in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to use after free. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and “crashy”. Further analysis has shown “the race is not a real problem unless you use asan”. A new warning has been added.

Severity: 2.5 | LOW

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5645

Published : June 5, 2025, 8:15 a.m. | 3 hours, 25 minutes ago

Description : A vulnerability, which was classified as problematic, was found in Radare2 5.9.9. This affects the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and “crashy”. Further analysis has shown “the race is not a real problem unless you use asan”. A new warning has been added.

Severity: 2.5 | LOW

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-5646

Published : June 5, 2025, 8:15 a.m. | 3 hours, 25 minutes ago

Description : A vulnerability has been found in Radare2 5.9.9 and classified as problematic. This vulnerability affects the function r_cons_rainbow_free in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is identified as 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and “crashy”. Further analysis has shown “the race is not a real problem unless you use asan”. A new warning has been added.

Severity: 2.5 | LOW

Visit the link for more details, such as CVSS details, affected products, timeline, and more…