CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Cybersecurity researchers have shed light on a new campaign targeting Brazilian users since the start of 2025 to infect users with a malicious extension for Chromium-based web browsers and siphon user authentication data. "Some of the phishing emails were sent from the servers of compromised companies, increasing the chances of a successful attack," Positive Technologies security researcher
Source: TheHackerNews
June 8th, 2025 (about 1 month ago)
Description: Two malicious packages have been discovered in the npm JavaScript package index, which masquerades as useful utilities but, in reality, are destructive data wipers that delete entire application directories. [...]
Source: BleepingComputer
June 7th, 2025 (about 1 month ago)
Description: A significant supply chain attack hit NPM after 15 popular Gluestack packages with over 950,000 weekly downloads were compromised to include malicious code that acts as a remote access trojan (RAT). [...]
Source: BleepingComputer
June 7th, 2025 (about 1 month ago)

CVE-2025-5840

Description: A vulnerability, which was classified as critical, was found in SourceCodester Client Database Management System 1.0. This affects an unknown part of the file /user_update_customer_order.php. The manipulation of the argument uploaded_file leads to unrestricted upload. It is possible to initiate the attack remotely. Es wurde eine kritische Schwachstelle in SourceCodester Client Database Management System 1.0 gefunden. Dabei betrifft es einen unbekannter Codeteil der Datei /user_update_customer_order.php. Durch Manipulieren des Arguments uploaded_file mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen.

CVSS: MEDIUM (6.9)

EPSS Score: 0.04%

Source: CVE
June 7th, 2025 (about 1 month ago)

CVE-2024-55585

Description: moPS App Engine 1.8.618 has incorrect access control.

EPSS Score: 0.17%

Source: CVE
June 7th, 2025 (about 1 month ago)
Description: [AI generated] Triangle Heating & Cooling is a heating and cooling service provider, renowned for their commitment to high-quality work and customer satisfaction. The company operates throughout Randolph County, WV, offering various HVAC services, including installations, repairs, and maintenance of cooling, heating, and indoor air quality systems. They are dedicated to providing comfortable living environments for their clients.
Source: Ransomware.live
June 7th, 2025 (about 1 month ago)
Description: [AI generated] Mercer Capital is a business valuation and financial advisory services firm. With expertise in providing business valuation services, this US-based company also offers financial reporting, tax compliance, corporate advisory services, and litigation support. Other services include portfolio valuation and investment banking. Their clientele is diverse, including public and private businesses, financial institutions, and high-net-worth individuals.
Source: Ransomware.live
June 7th, 2025 (about 1 month ago)
Description: [AI generated] N/A
Source: Ransomware.live
June 7th, 2025 (about 1 month ago)

CVE-2025-5839

Description: A vulnerability, which was classified as critical, has been found in Tenda AC9 15.03.02.13. Affected by this issue is the function fromadvsetlanip of the file /goform/AdvSetLanip of the component POST Request Handler. The manipulation of the argument lanMask leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Eine kritische Schwachstelle wurde in Tenda AC9 15.03.02.13 entdeckt. Dies betrifft die Funktion fromadvsetlanip der Datei /goform/AdvSetLanip der Komponente POST Request Handler. Durch das Manipulieren des Arguments lanMask mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.

CVSS: HIGH (8.8)

EPSS Score: 0.08%

Source: CVE
June 7th, 2025 (about 1 month ago)

CVE-2025-5838

Description: A vulnerability classified as critical was found in PHPGurukul Employee Record Management System 1.3. Affected by this vulnerability is an unknown functionality of the file /admin/adminprofile.php. The manipulation of the argument AdminName leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. In PHPGurukul Employee Record Management System 1.3 wurde eine kritische Schwachstelle entdeckt. Das betrifft eine unbekannte Funktionalität der Datei /admin/adminprofile.php. Mittels Manipulieren des Arguments AdminName mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.

CVSS: MEDIUM (5.3)

EPSS Score: 0.03%

Source: CVE
June 7th, 2025 (about 1 month ago)