Aggregator
互联网协议第 8 版(IPv8)
1 day 4 hours ago
互联网协议第 8 版(IPv8)是一套可管理的网络协议套件,彻底改变了从家庭网络到全球互联网的所有规模网络的运
CVE-2025-38102 | Linux Kernel up to 6.15.2 VMCI mm/gup.c vmci_host_setup_notify race condition (EUVD-2025-19840 / Nessus ID 249177)
1 day 4 hours ago
A vulnerability was found in Linux Kernel up to 5.15.185/6.1.141/6.6.93/6.12.33/6.15.2. It has been rated as problematic. Affected by this vulnerability is the function vmci_host_setup_notify of the file mm/gup.c of the component VMCI. The manipulation leads to race condition.
This vulnerability is traded as CVE-2025-38102. Access to the local network is required for this attack to succeed. There is no exploit available.
Upgrading the affected component is advised.
vuldb.com
CVE-2025-38100 | Linux Kernel up to 6.15.2 io_bitmap_exit null pointer dereference (Nessus ID 243421 / WID-SEC-2025-1452)
1 day 4 hours ago
A vulnerability labeled as critical has been found in Linux Kernel up to 6.15.2. This affects the function io_bitmap_exit. Executing a manipulation can lead to null pointer dereference.
The identification of this vulnerability is CVE-2025-38100. The attack needs to be done within the local network. There is no exploit available.
The affected component should be upgraded.
vuldb.com
CVE-2025-38101 | Linux Kernel up to 6.12.33/6.15.2 ring_buffer_subbuf_order_set buffer overflow (Nessus ID 246934 / WID-SEC-2025-1452)
1 day 4 hours ago
A vulnerability labeled as critical has been found in Linux Kernel up to 6.12.33/6.15.2. Affected by this vulnerability is the function ring_buffer_subbuf_order_set. The manipulation results in buffer overflow.
This vulnerability was named CVE-2025-38101. The attack needs to be approached within the local network. There is no available exploit.
The affected component should be upgraded.
vuldb.com
CVE-2025-38099 | Linux Kernel up to 6.12.30/6.14.8 Bluetooth denial of service (EUVD-2025-19764 / Nessus ID 246387)
1 day 4 hours ago
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.12.30/6.14.8. Affected is an unknown function of the component Bluetooth. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2025-38099. The attack can only be initiated within the local network. No exploit exists.
You should upgrade the affected component.
vuldb.com
CVE-2025-38097 | Linux Kernel up to 6.1.140/6.6.92/6.12.30/6.14.8 espintcp xfrm_state state issue (EUVD-2025-19766 / Nessus ID 247122)
1 day 4 hours ago
A vulnerability was found in Linux Kernel up to 6.1.140/6.6.92/6.12.30/6.14.8 and classified as problematic. Impacted is the function xfrm_state of the component espintcp. The manipulation results in state issue.
This vulnerability is reported as CVE-2025-38097. The attacker must have access to the local network to execute the attack. No exploit exists.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2025-38098 | Linux Kernel up to 6.12.30/6.14.8 create_validate_stream_for_sink null pointer dereference (EUVD-2025-19765 / Nessus ID 253428)
1 day 4 hours ago
A vulnerability was found in Linux Kernel up to 6.12.30/6.14.8 and classified as critical. This affects the function create_validate_stream_for_sink. Such manipulation leads to null pointer dereference.
This vulnerability is documented as CVE-2025-38098. The attack requires being on the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2025-38096 | Linux Kernel up to 6.12.30/6.14.8 wifi iwl_trans_reclaim denial of service (EUVD-2025-19767 / Nessus ID 265934)
1 day 4 hours ago
A vulnerability was found in Linux Kernel up to 6.12.30/6.14.8. It has been declared as critical. The impacted element is the function iwl_trans_reclaim of the component wifi. Such manipulation leads to denial of service.
This vulnerability is traded as CVE-2025-38096. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-38095 | Linux Kernel up to 6.1.139/6.6.91/6.12.29/6.14.7 dma-buf smp_store_mb null pointer dereference (EUVD-2025-19768 / Nessus ID 249178)
1 day 4 hours ago
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.139/6.6.91/6.12.29/6.14.7. This affects the function smp_store_mb of the component dma-buf. Performing a manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2025-38095. The attack must originate from the local network. There is no exploit available.
It is advisable to upgrade the affected component.
vuldb.com
乌克兰军方开始大规模使用地面武装机器人
1 day 4 hours ago
当人们还在争论是否应该武装机器人时,乌克兰已经开始将此类地面机器人大规模投入战场。乌克兰总统泽连斯基(Volodymyr Zelenskyy)称该国的地面机器人和无人机成功演示了独自突破俄军阵地并迫使俄军士兵投降。他的说法尚未得到独立验证,但他发布了一则宣传视频,称乌克兰军用机器人过去三个月完成了逾 22000 次任务。他的声明可能指的是去年乌克兰第三独立突击旅的一次任务:无人机配合自杀性地面机器人攻击了俄军阵地,在防御工事被摧毁后,俄军士兵向该部队的机器人投降。乌克兰部署了越来越多的配备机枪和榴弹发射器的地面机器人,有时机器人还被改装成了移动炸弹。乌克兰公司 DevDroid 研发的 Droid TW 12.7 就是一辆配备 M2 勃朗宁机枪的履带式机器人,其最高速度与成人行进速度相当,最远能达到 25 公里,能通过 Starlink 进行卫星通信。
Samsung удалила российский госмессенджер из инструкций по безопасности после внимания СМИ
1 day 4 hours ago
Зачем прятать мессенджер Max в защищенную папку?
Firefox 加入了对 Web Serial API 的支持
1 day 4 hours ago
Firefox Nightly 版加入了对 Web Serial API 的支持,而六年前 Mozilla 以不安全为由反对支持该 API。Web Serial API 允许浏览器与通过串行端口通信的设备交互,此类设备包括 3D 打印机,微控制器如 Arduino 和 ESP32,智能家居面板如 ESPHome,以及通过 USB 或蓝牙模拟串行端口的设备通信。Google Chrome 自 2021 年起加入了对 Web Serial API 的支持,基于 Chromium 的浏览器如 Edge、Opera 和 Vivaldi 也都支持该 API。Mozilla 杰出工程师 Martin Thomso 在 2020 年表示,对于如此强大的功能,无法为用户提供充分的保护,即使用户同意。串行端口是物理连接赋予高度信任的时代的遗物,许多设备允许通过该接口连接的设备在没有任何身份验证的情况下获得管理权限,这一权限甚至超过了 root。两年后 Mozilla 被要求重新考虑其立场,Firefox CTO Bobby Holley 表示 Mozilla 愿意采用和 WebMIDI 相同的附加组件守门机制(add-on-gating mechanism)支持 WebSerial API。Mozilla 目前仍然反对 WebUSB 和 WebHID,而苹果 WebKit 团队仍然对 WebSerial、WebUSB 和 WebHID 持反对态度。
Fake Zoom SDK Update Delivers Sapphire Sleet Malware in New macOS Intrusion Chain
1 day 5 hours ago
A North Korean threat actor known as Sapphire Sleet has launched a new campaign against macOS users, using a fake Zoom SDK update to trick victims into running malicious files that steal passwords, cryptocurrency assets, and personal data. Unlike attacks that exploit software flaws, this campaign relies entirely on social engineering, manipulating people rather than […]
The post Fake Zoom SDK Update Delivers Sapphire Sleet Malware in New macOS Intrusion Chain appeared first on Cyber Security News.
Tushar Subhra Dutta
Cyber Centre launches new initiative to help Canada’s critical infrastructure prepare for severe cyber threats
1 day 5 hours ago
Canadian Centre for Cyber Security
CVE-2026-37749 | CodeAstro Simple Attendance Management System 1.0 index.php Username sql injection
1 day 5 hours ago
A vulnerability has been found in CodeAstro Simple Attendance Management System 1.0 and classified as critical. This impacts an unknown function of the file index.php. This manipulation of the argument Username causes sql injection.
This vulnerability is handled as CVE-2026-37749. The attack can be initiated remotely. There is not any exploit available.
vuldb.com
CVE-2026-6507 | dnsmasq Bootstrap Protocol Reply out-of-bounds write (Nessus ID 307348)
1 day 5 hours ago
A vulnerability, which was classified as critical, was found in dnsmasq. This affects an unknown function of the component Bootstrap Protocol Reply Handler. The manipulation results in out-of-bounds write.
This vulnerability is known as CVE-2026-6507. It is possible to launch the attack remotely. No exploit is available.
vuldb.com
CVE-2026-41153 | JetBrains Junie up to 252.284.66 Project File command injection (EUVD-2026-23430)
1 day 5 hours ago
A vulnerability, which was classified as critical, has been found in JetBrains Junie. The impacted element is an unknown function of the component Project File Handler. The manipulation leads to command injection.
This vulnerability is traded as CVE-2026-41153. It is possible to initiate the attack remotely. There is no exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2025-70795 | STProcessMonitor up to 11.11.4.0 IOCTL denial of service (ID 268)
1 day 5 hours ago
A vulnerability classified as problematic was found in STProcessMonitor up to 11.11.4.0. The affected element is an unknown function of the component IOCTL Handler. Executing a manipulation can lead to denial of service.
This vulnerability appears as CVE-2025-70795. The attacker needs to be present on the local network. There is no available exploit.
It is best practice to apply a patch to resolve this issue.
vuldb.com
Grinex exchange blames "Western intelligence" for $13.7M crypto hack
1 day 5 hours ago
Kyrgyzstan-based cryptocurrency exchange Grinex has suspended its operations after suffering a $13.7 million hack attributed to Western intelligence agencies. [...]
Bill Toulas