Aggregator
CVE-2025-12208 | SourceCodester Best House Rental Management System 1.0 /admin_class.php login2 Username sql injection
CVE-2025-12207 | Kamailio 5.5 Grammar Rule src/core/cfg.y yyerror_at null pointer dereference
CVE-2025-12206 | Kamailio 5.5 src/core/rvalue.c rve_is_constant null pointer dereference
CVE-2025-12205 | Kamailio 5.5 Configuration File src/core/cfg.lex sr_push_yy_state use after free
CVE-2025-12204 | Kamailio 5.5 Configuration File src/core/rvalue.c rve_destroy heap-based overflow
Submit #673226: SourceCodester Best house rental management system 1.0 SQL Injection [Accepted]
Submit #673241: Kamailio Project Kamailio SIP Server 5.5 NULL Pointer Dereference [Accepted]
Submit #673240: Kamailio Project Kamailio SIP Server 5.5 NULL Pointer Dereference [Accepted]
Submit #673225: Kamailio Project Kamailio SIP Server 5.5 Use After Free [Accepted]
Submit #673224: Kamailio Project Kamailio SIP Server 5.5 Heap-based Buffer Overflow [Accepted]
CVE-2025-53043 | Oracle Product Hub up to 12.2.14 Item Catalog improper authorization (Nessus ID 271365)
CVE-2025-61753 | Oracle Scripting up to 12.2.14 Miscellaneous redirect (Nessus ID 271365)
CVE-2025-11731 | Red Hat Enterprise Linux/OpenShift Container Platform XML Document exsltFuncResultComp type confusion (EUVD-2025-34140 / Nessus ID 271411)
CVE-2025-39963 | Linux Kernel up to 6.12.48/6.16.8 io_uring io_link_skb comparison (EUVD-2025-33335 / Nessus ID 271415)
CVE-2025-3988 | TOTOLINK N150RT 3.4.0-B20190525 /boafrm/formPortFw service_type buffer overflow (Nessus ID 271415)
Top 10 Best Cloud Access Security Brokers (CASB) in 2025
The year 2025 marks a new era in enterprise cloud adoption, characterized by a complex tapestry of Software-as-a-Service (SaaS) applications, Infrastructure-as-a-Service (IaaS) platforms, and Platform-as-a-Service (PaaS) offerings. While cloud services deliver unparalleled agility and scalability, they also introduce significant security blind spots and compliance challenges for organizations. Employees are leveraging an ever-increasing number of cloud […]
The post Top 10 Best Cloud Access Security Brokers (CASB) in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
How AI & LLMs Are Improving Authentication Flows
AI & LLMs are reshaping authentication. Learn how they enable adaptive security, fraud detection, and personalized login experiences in identity verification.
The post How AI & LLMs Are Improving Authentication Flows appeared first on Security Boulevard.
The Hidden Infrastructure of Internet Privacy: How Modern Networks Shape Digital Freedom
Explore how modern network infrastructure impacts internet privacy, surveillance, and digital freedom — and what tech protects your data.
The post The Hidden Infrastructure of Internet Privacy: How Modern Networks Shape Digital Freedom appeared first on Security Boulevard.