Apple addressed a vulnerability impacting iOS, iPadOS, and macOS that it is under active exploitation in the wild. Apple addressed an actively exploited zero-day, tracked as CVE-2025-43300, in iOS, iPadOS, and macOS. The vulnerability is zero-day out-of-bounds write issue that resides in the ImageIO framework, an attacker could exploit it to cause memory corruption when processing […]
A vulnerability identified as critical has been detected in Ruijie RG-UAC up to 20240428. This affects an unknown part of the file /view/IPV6/ipv6StaticRoute/static_route_edit_ipv6.php. The manipulation of the argument oldipmask/oldgateway/olddevname leads to os command injection.
This vulnerability is documented as CVE-2024-4508. The attack can be initiated remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability labeled as critical has been found in Ruijie RG-UAC up to 20240428. This vulnerability affects unknown code of the file /view/IPV6/naborTable/add_commit.php. The manipulation of the argument ip_addr/mac_addr results in os command injection.
This vulnerability is reported as CVE-2024-4509. The attack can be launched remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, was found in Zoom Workplace VDI App on Windows. This impacts an unknown function of the component Installer. Executing manipulation can lead to insufficient verification of data authenticity.
This vulnerability is handled as CVE-2024-27244. It is possible to launch the attack on the local host. There is not any exploit available.
You should upgrade the affected component.
A vulnerability was found in lakernote EasyAdmin up to 20240324. It has been declared as problematic. Affected by this issue is some unknown functionality of the file /sys/file/upload. Such manipulation of the argument File leads to cross site scripting.
This vulnerability is referenced as CVE-2024-5383. It is possible to launch the attack remotely. Furthermore, an exploit is available.
This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. It is advisable to implement a patch to correct this issue.
A vulnerability was found in PHPGurukul Beauty Parlour Management System 1.1. It has been declared as critical. Affected is an unknown function of the file /book-appointment.php. The manipulation of the argument Message results in sql injection.
This vulnerability was named CVE-2025-9024. The attack may be performed from a remote location. In addition, an exploit is available.
A vulnerability was found in code-projects Simple Cafe Ordering System 1.0. It has been rated as critical. Affected by this vulnerability is an unknown functionality of the file /portal.php. This manipulation of the argument ID causes sql injection.
The identification of this vulnerability is CVE-2025-9025. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability identified as critical has been detected in code-projects Online Medicine Guide 1.0. This affects an unknown part of the file /addelivery.php. Performing manipulation of the argument deName results in sql injection.
This vulnerability is identified as CVE-2025-9027. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability labeled as critical has been found in code-projects Online Medicine Guide 1.0. This vulnerability affects unknown code of the file /adphar.php. Executing manipulation of the argument phuname can lead to sql injection.
This vulnerability is tracked as CVE-2025-9028. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability has been found in SourceCodester Online Bank Management System up to 1.0 and classified as critical. The impacted element is an unknown function of the file /bank/transfer.php. Performing manipulation of the argument email results in sql injection.
This vulnerability is known as CVE-2025-9021. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability was found in SourceCodester Online Bank Management System up to 1.0 and classified as critical. This affects an unknown function of the file /bank/statements.php. Executing manipulation of the argument email can lead to sql injection.
This vulnerability is handled as CVE-2025-9022. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability was found in FFmpeg and classified as problematic. This vulnerability affects unknown code of the component HLS EXT-X-MAP. Executing manipulation can lead to null pointer dereference.
The identification of this vulnerability is CVE-2023-6603. The attack may be launched remotely. There is no exploit available.
Commvault has released updates to address four security gaps that could be exploited to achieve remote code execution on susceptible instances.
The list of vulnerabilities, identified in Commvault versions before 11.36.60, is as follows -
CVE-2025-57788 (CVSS score: 6.9) - A vulnerability in a known login mechanism allows unauthenticated attackers to execute API calls without requiring user
Hackers exploit Apache ActiveMQ flaw to install DripDropper on Linux, then patch it to block rivals and hide their tracks. Red Canary researchers observed attackers exploit a 2-year-old Apache ActiveMQ vulnerability, tracked as CVE-2023-46604 (CVSS score of 10.0), to gain persistence on cloud Linux systems and deploy DripDropper malware. Uniquely, they patch the flaw post-exploit […]
Europol has confirmed that a Telegram channel impersonating the agency and offering a $50,000 reward for information on two Qilin ransomware administrators is fake. The impostor later admitted it was created to troll researchers and journalists. [...]
Threat actors have been observed leveraging the deceptive social engineering tactic known as ClickFix to deploy a versatile backdoor codenamed CORNFLAKE.V3.
Google-owned Mandiant described the activity, which it tracks as UNC5518, as part of an access-as-a-service scheme that employs fake CAPTCHA pages as lures to trick users into providing initial access to their systems, which is then