A vulnerability, which was classified as problematic, has been found in code-projects Traffic Offense Reporting System 1.0. This issue affects some unknown processing of the file saveuser.php. The manipulation of the argument user_id/username/email/name/position leads to cross site scripting.
The identification of this vulnerability is CVE-2025-5651. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in 1000projects Online Notice Board 1.0. This vulnerability affects unknown code of the file /register.php. The manipulation of the argument fname leads to sql injection.
This vulnerability was named CVE-2025-5650. The attack can be initiated remotely. Furthermore, there is an exploit available.
Other parameters might be affected as well.
A vulnerability classified as critical has been found in SourceCodester Student Result Management System 1.0. This affects an unknown part of the file /admin/core/new_user of the component Register Interface. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2025-5649. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Acronis Cyber Protect Cloud Agent up to 40076 on Windows. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to incorrect default permissions.
This vulnerability is handled as CVE-2025-48959. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Acronis Cyber Protect Cloud Agent up to 40076. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improper validation of syntactic correctness of input.
This vulnerability is known as CVE-2025-30415. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Radare2 5.9.9. It has been classified as problematic. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption.
This vulnerability is traded as CVE-2025-5648. An attack has to be approached locally. Furthermore, there is an exploit available.
The real existence of this vulnerability is still doubted at the moment.
It is recommended to apply a patch to fix this issue.
The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added.
Success in the cloud depends less on adoption and more on agility. Recent industry trends point to emerging data management challenges across cloud service providers and legacy infrastructure, often all at once. This requires a shift in how organizations approach cloud strategies—strategically and proactively. Modern...