HashiCorp Vault Vulnerability Let Attackers to Crash Servers

HashiCorp Vault Vulnerability Let Attackers to Crash Servers A critical denial-of-service vulnerability in HashiCorp Vault could allow malicious actors to overwhelm servers with specially crafted JSON payloads, leading to excessive resource consumption and rend … Read more Published Date: Sep 02, 2025 (2 hours, 50 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-6203

MobSF Security Testing Tool Vulnerability Let Attackers Upload Malicious Files

MobSF Security Testing Tool Vulnerability Let Attackers Upload Malicious Files A critical flaw in the Mobile Security Framework (MobSF) has been discovered, allowing authenticated attackers to upload and execute malicious files by exploiting improper path validation. The vulnera … Read more Published Date: Sep 02, 2025 (2 hours, 53 minutes ago) Vulnerabilities has been mentioned in this […]

CVE-2025-44017 – Gunosy JWT Token Exposure Vulnerability

Affected Products The following products are affected by CVE-2025-44017 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below. No affected product recoded yet

CVE-2025-6507 (CVSS 9.8): Critical H2O-3 Vulnerability Puts Machine Learning at Risk

CVE-2025-6507 (CVSS 9.8): Critical H2O-3 Vulnerability Puts Machine Learning at Risk H2O-3, a widely used open-source platform for distributed and scalable machine learning, has been found vulnerable to a critical flaw that could allow attackers to achieve remote code execution (RCE) … Read more Published Date: Sep 02, 2025 (20 hours, 17 minutes ago) Vulnerabilities has been […]

Why Antivirus Software Flags Your Linux ISO as Malware

Why Antivirus Software Flags Your Linux ISO as Malware The website DistroWatch, known for its coverage of Linux-related developments, has recently highlighted an issue encountered by Linux newcomers: after downloading a Linux ISO image on Windows, the fil … Read more Published Date: Sep 02, 2025 (20 hours, 53 minutes ago) Vulnerabilities has been mentioned in this […]

Apple Is Forcing Its Suppliers to Embrace Full Automation

Apple Is Forcing Its Suppliers to Embrace Full Automation Reports suggest that Apple is restructuring its global supply chain, not merely shifting production away from China as in the past, but instead requiring its partners to embrace full-scale automation. … Read more Published Date: Sep 02, 2025 (21 hours ago) Vulnerabilities has been mentioned in this […]

JetBrains Makes Its Language Server Protocol API Free

JetBrains Makes Its Language Server Protocol API Free The integrated development environment (IDE) tools vendor JetBrains has announced changes to its LSP API—the Language Server Protocol interface—which will now be made available free of charge. In July … Read more Published Date: Sep 02, 2025 (21 hours, 12 minutes ago) Vulnerabilities has been mentioned in this article.

Critical Qualcomm Vulnerabilities Allow Attackers to Execute Arbitrary Code Remotely

Critical Qualcomm Vulnerabilities Allow Attackers to Execute Arbitrary Code Remotely Multiple critical vulnerabilities in Qualcomm Technologies’ proprietary Data Network Stack and Multi-Mode Call Processor that permit remote attackers to execute arbitrary code. These flaws, tracked as … Read more Published Date: Sep 02, 2025 (2 hours, 9 minutes ago) Vulnerabilities has been mentioned in this article.