A vulnerability classified as critical was found in 1000projects Online Notice Board 1.0. This vulnerability affects unknown code of the file /register.php. The manipulation of the argument fname leads to sql injection.
This vulnerability was named CVE-2025-5650. The attack can be initiated remotely. Furthermore, there is an exploit available.
Other parameters might be affected as well.
A vulnerability classified as critical has been found in SourceCodester Student Result Management System 1.0. This affects an unknown part of the file /admin/core/new_user of the component Register Interface. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2025-5649. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Acronis Cyber Protect Cloud Agent up to 40076 on Windows. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to incorrect default permissions.
This vulnerability is handled as CVE-2025-48959. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Acronis Cyber Protect Cloud Agent up to 40076. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improper validation of syntactic correctness of input.
This vulnerability is known as CVE-2025-30415. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Radare2 5.9.9. It has been classified as problematic. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption.
This vulnerability is traded as CVE-2025-5648. An attack has to be approached locally. Furthermore, there is an exploit available.
The real existence of this vulnerability is still doubted at the moment.
It is recommended to apply a patch to fix this issue.
The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added.
Success in the cloud depends less on adoption and more on agility. Recent industry trends point to emerging data management challenges across cloud service providers and legacy infrastructure, often all at once. This requires a shift in how organizations approach cloud strategies—strategically and proactively. Modern...
A vulnerability was found in Radare2 5.9.9 and classified as problematic. This issue affects the function r_cons_context_break_pop in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption.
The identification of this vulnerability is CVE-2025-5647. The attack needs to be approached locally. Furthermore, there is an exploit available.
The real existence of this vulnerability is still doubted at the moment.
It is recommended to apply a patch to fix this issue.
The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added.
A vulnerability has been found in Radare2 5.9.9 and classified as problematic. This vulnerability affects the function r_cons_rainbow_free in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption.
This vulnerability was named CVE-2025-5646. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
The real existence of this vulnerability is still doubted at the moment.
It is recommended to apply a patch to fix this issue.
The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added.