Critical Linux Kernel’ Double Free Vulnerability Let Attackers Escalate Privileges
Critical Linux Kernel’ Double Free Vulnerability Let Attackers Escalate Privileges A severe double-free vulnerability has been discovered in the Linux kernel’s NFT (netfilter) subsystem, specifically within the pipapo set module. This critical security flaw allows unprivileged attac … Read more Published Date: Jul 10, 2025 (1 hour, 22 minutes ago) Vulnerabilities has been mentioned in this article. […]
GitLab Vulnerabilities Let Attackers Execute Actions by Injecting Malicious Content
GitLab Vulnerabilities Let Attackers Execute Actions by Injecting Malicious Content GitLab has released critical security patches across multiple versions to address several high-severity vulnerabilities that could allow attackers to execute unauthorized actions through malicious con … Read more Published Date: Jul 10, 2025 (1 hour, 33 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-6948 CVE-2025-6168 […]
CVE-2025-7425 – Libxslt Heap Corruption Vulnerability
A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or […]
CVE-2025-7424 – “Libxslt Type Confusion Memory Corruption Vulnerability”
The following table lists the changes that have been made to the CVE-2025-7424 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 10, 2025 Action […]
CVE-2025-7407 – Netgear D6400 OS Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-7407 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 10, 2025 Action […]
CVE-2024-36697 – Allworx System Software Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2024-36697 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Jul. 10, 2025 Action Type […]
Critical Ruckus Wireless Vulnerabilities Exposes Enterprise Wireless Networks
Critical Ruckus Wireless Vulnerabilities Exposes Enterprise Wireless Networks Multiple critical vulnerabilities have been discovered in Ruckus Wireless management products, specifically Virtual SmartZone (vSZ) and Network Director (RND), potentially allowing complete compromise … Read more Published Date: Jul 10, 2025 (1 hour, 35 minutes ago) Vulnerabilities has been mentioned in this article.
Hackers Exploiting GeoServer RCE Vulnerability to Deploy CoinMiner
Hackers Exploiting GeoServer RCE Vulnerability to Deploy CoinMiner A critical remote code execution vulnerability in GeoServer has become a prime target for cybercriminals deploying cryptocurrency mining malware across global networks. The vulnerability, designated C … Read more Published Date: Jul 10, 2025 (1 hour, 54 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-36401
CVE-2025-6211 – “DocugamiReader MD5 Hash Collision Vulnerability”
A vulnerability in the DocugamiReader class of the run-llama/llama_index repository, up to version 0.12.28, involves the use of MD5 hashing to generate IDs for document chunks. This approach leads to hash collisions when structurally distinct chunks contain identical text, resulting in one chunk overwriting another. This can cause loss of semantically or legally important document […]
Ruckus network management solutions riddled with unpatched vulnerabilities
Ruckus network management solutions riddled with unpatched vulnerabilities Claroty researcher Noam Moshe has discovered serious vulnerabilities in two Ruckus Networks (formerly Ruckus Wireless) products that may allow attackers to compromise the environments managed by the a … Read more Published Date: Jul 10, 2025 (1 hour, 11 minutes ago) Vulnerabilities has been mentioned in this article.