-
CVE-2025-5868 – RT-Thread Array Index Validation Vulnerability
CVE ID : CVE-2025-5868 Published : June 9, 2025, 8:15 a.m. | 6 hours, 43 minutes ago Description : A vulnerability, which was classified as critical, has been found in RT-Thread 5.1.0. This issue affects the function sys_thread_sigprocmask of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument how leads to improper validation of array index. Severity: 8.0…
-
CVE-2025-5867 – RT-Thread Null Pointer Dereference Vulnerability
CVE ID : CVE-2025-5867 Published : June 9, 2025, 8:15 a.m. | 6 hours, 43 minutes ago Description : A vulnerability classified as critical was found in RT-Thread 5.1.0. This vulnerability affects the function csys_sendto of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument to leads to null pointer dereference. Severity: 8.0 | HIGH Visit the link…
-
CVE-2025-5893 – Honding Technology Smart Parking Management System Sensitive Information Exposure
CVE ID : CVE-2025-5893 Published : June 9, 2025, 7:15 a.m. | 7 hours, 43 minutes ago Description : Smart Parking Management System from Honding Technology has an Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to access a specific page and obtain plaintext administrator credentials. Severity: 9.8 | CRITICAL Visit the link for more details,…
-
CVE-2025-5866 – RT-Thread Array Index Validation Vulnerability
CVE ID : CVE-2025-5866 Published : June 9, 2025, 7:15 a.m. | 7 hours, 43 minutes ago Description : A vulnerability classified as critical has been found in RT-Thread 5.1.0. This affects the function sys_sigprocmask of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument how leads to improper validation of array index. Severity: 8.0 | HIGH Visit…
-
CVE-2025-5865 – RT-Thread Parameter Handler Memory Corruption Vulnerability
CVE ID : CVE-2025-5865 Published : June 9, 2025, 7:15 a.m. | 7 hours, 43 minutes ago Description : A vulnerability was found in RT-Thread 5.1.0. It has been rated as critical. Affected by this issue is the function sys_select of the file rt-thread/components/lwp/lwp_syscall.c of the component Parameter Handler. The manipulation of the argument timeout leads to…
-
CVE-2025-5863 – Tenda AC5 Stack-Based Buffer Overflow Vulnerability
CVE ID : CVE-2025-5863 Published : June 9, 2025, 6:15 a.m. | 8 hours, 43 minutes ago Description : A vulnerability was found in Tenda AC5 15.03.06.47. It has been classified as critical. Affected is the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument rebootTime leads to stack-based buffer overflow. It is possible to…
-
CVE-2025-5862 – Tenda AC7 PPTP Form Set Buffer Overflow Vulnerability
CVE ID : CVE-2025-5862 Published : June 9, 2025, 5:15 a.m. | 9 hours, 43 minutes ago Description : A vulnerability was found in Tenda AC7 15.03.06.44 and classified as critical. This issue affects the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. The attack may be initiated remotely.…
-
How Falcon Next-Gen SIEM Protects Enterprises from VMware vCenter Attacks
How Falcon Next-Gen SIEM Protects Enterprises from VMware vCenter Attacks Internet-facing assets are targeted for many reasons, such as to establish persistence, evade defensive capabilities, and access sensitive networks. According to the search engine Shodan, approximatel … Read more Published Date: Jun 09, 2025 (25 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2023-34048 Go…
-
Apple’s “Liquid Glass” Vision: iPhone 2027 & Unified OS 26
Apple’s “Liquid Glass” Vision: iPhone 2027 & Unified OS 26 As Apple is expected to unveil its next-generation operating systems at WWDC 2025—with speculation suggesting a unified version number “26” symbolizing the year 2026—Bloomberg journalist Mark Gurman h … Read more Published Date: Jun 09, 2025 (1 hour, 17 minutes ago) Vulnerabilities has been mentioned in this…
-
Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware
Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware A new wave of cyberattacks has emerged targeting critical infrastructure through the exploitation of Fortigate security appliance vulnerabilities, with threat actors successfully deploying the notorio … Read more Published Date: Jun 09, 2025 (2 hours, 18 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-55591 CVE-2024-21762 Go…