From Australia's new ransomware payment disclosure rules to another record-breaking DDoS attack, June 2025 saw no shortage of interesting cybersecurity news
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.15.103/6.1.20/6.2.7. Affected is the function ether_setup of the file net/core/dev.c. The manipulation leads to state issue.
This vulnerability is traded as CVE-2023-53103. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.2.8. It has been classified as critical. This affects an unknown part of the component qed/qed_sriov. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2023-53066. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Adrian Ladó PlatiOnline Payments Plugin up to 6.3.2 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to missing authorization.
This vulnerability is known as CVE-2025-53288. The attack can be launched remotely. There is no exploit available.
A vulnerability has been found in iCount Payment Gateway Plugin up to 2.0.6 on WordPress and classified as problematic. This vulnerability affects unknown code. The manipulation leads to missing authorization.
This vulnerability was named CVE-2025-53295. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in ESP32Async ESPAsyncWebServer up to 3.7.8 on ESP32/ESP8266/RP2040/RP2350. Affected by this issue is some unknown functionality of the file AsyncWebHeader.cpp of the component HTTP Header Handler. The manipulation leads to crlf injection.
This vulnerability is handled as CVE-2025-53094. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical has been found in xiaoyunjie openvpn-cms-flask up to 1.2.7. This affects the function create_user of the file /app/api/v1/openvpn.py of the component User Creation Endpoint. The manipulation of the argument Username leads to command injection.
This vulnerability is uniquely identified as CVE-2025-6775. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in xiaoyunjie openvpn-cms-flask up to 1.2.7. This vulnerability affects the function Upload of the file app/plugins/oss/app/controller.py of the component File Upload. The manipulation of the argument image leads to path traversal.
This vulnerability was named CVE-2025-6776. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in code-projects Food Distributor Site 1.0. This issue affects some unknown processing of the file /admin/process_login.php. The manipulation of the argument username/password leads to sql injection.
The identification of this vulnerability is CVE-2025-6777. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in code-projects Food Distributor Site 1.0. Affected is an unknown function of the file /admin/save_settings.php. The manipulation of the argument site_phone/site_email/address leads to cross site scripting.
This vulnerability is traded as CVE-2025-6778. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in BeeTeam368 Extensions Pro Plugin up to 2.3.4 on WordPress. Affected by this vulnerability is the function handle_live_fn. The manipulation leads to path traversal.
This vulnerability is known as CVE-2025-6379. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in BeeTeam368 Extensions Plugin up to 2.3.4 on WordPress. Affected by this issue is the function handle_remove_temp_file. The manipulation leads to path traversal.
This vulnerability is handled as CVE-2025-6381. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in WP VR Plugin up to 8.5.32 on WordPress. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-6350. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in gooaclok819 sublinkX up to 1.8. It has been rated as critical. Affected by this issue is the function AddTemp of the file api/template.go. The manipulation of the argument filename leads to path traversal.
This vulnerability is handled as CVE-2025-6774. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in NetEase NeacSafe64 Driver and classified as problematic. Affected by this vulnerability is an unknown functionality in the library NeacSafe64.sys of the component IOCTL Handler. The manipulation leads to improper privilege management.
This vulnerability is known as CVE-2025-45737. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in ESAPI esapi-java-legacy and classified as problematic. This issue affects the function Encoder.encodeForSQL of the component SQL Injection Defense. The manipulation leads to improper neutralization of special elements.
The identification of this vulnerability is CVE-2025-5878. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
The project was contacted early about this issue and handled it with an exceptional level of professionalism. In the new release the feature was disabled by default and any attempt to use it will trigger a warning. Furthermore, the misleading Java class documentation was updated to warn about the risks.
Facebook, the social network platform owned by Meta, is asking for users to upload pictures from their phones to suggest collages, recaps, and other ideas using artificial intelligence (AI), including those that have not been directly uploaded to the service.
According to TechCrunch, which first reported the feature, users are being served a new pop-up message asking for permission to "allow
A vulnerability was found in Oracle Financial Services Price Creation and Discovery 8.0.4/8.0.5/8.0.6/8.0.7. It has been rated as critical. This issue affects some unknown processing of the component Spring Framework. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2019-11358. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.