24h | 7d | 30d

Overview

  • Google
  • Chrome

09 May 2024
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
8.96%

Description

Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture
📌 Chrome 142 Update Patches Exploited Zero-Day Vulnerability CVE-2024-4671 https://www.cyberhub.blog/article/15723-chrome-142-update-patches-exploited-zero-day-vulnerability-cve-2024-4671
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Unity3D
  • Unity Editor

03 Oct 2025
Published
03 Oct 2025
Updated

CVSS v3.1
HIGH (7.4)
EPSS
0.02%

KEV

Description

Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications.

Statistics

  • 1 Post

Last activity: 5 hours ago

Fediverse

Profile picture

Resonite update post: Security:

  • Applied security patch for Unity Security Vulnerability CVE-2025-59489 (reported by @shrikealvaron, @dustysprinkles issue #5731)
    -- See more info here: https://nvd.nist.gov/vuln/detail/CVE-2025-59489
    -- This only applies to the renderer itself
    -- We were most likely completely unaffected, as the renderer is not ran directly by users, but only executed under control of the main process

Locale:

  • Merged Finnish locale update by @Toni Kat
  • Merged Korean locale update by @mirpasec
  • Merged Japanese locale update by @markn2000

Fixes:

  • Added backup & restore mechanism when updating yt-dlp
    -- This fixes yt-dlp breaking completely in some cases when it fails to update itself and corrupts the file (reported by @frooxius, issue #5836)
  • Fixed skinned meshes lagging in screenshots sometimes (reported by @luxkitty, @spexcat , @hamocorp, @jackthefoxotter, @Psychpsyo, issue #151)
  • Reworked logic in invite command on the Headless Server Software to avoid crash (reported by @stiefeljackal, @bredo, @hayden_fluff, issue #1047, fixed by @Jae “awa” J4)
  • Rewrite parts of the handling of autoSpawnItems in the Headless Server Software to restore expected behaviour (reported by @Jae “awa” J4, @scarstrf, issue #1107, fixed by @Jae “awa” J4)

#resonite

  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 7
  • grub2

09 May 2025
Published
25 Sep 2025
Updated

CVSS
Pending
EPSS
0.05%

KEV

Description

A flaw was found in systems utilizing LUKS-encrypted disks with GRUB configured for TPM-based auto-decryption. When GRUB is set to automatically decrypt disks using keys stored in the TPM, it reads the decryption key into system memory. If an attacker with physical access can corrupt the underlying filesystem superblock, GRUB will fail to locate a valid filesystem and enter rescue mode. At this point, the disk is already decrypted, and the decryption key remains loaded in system memory. This scenario may allow an attacker with physical access to access the unencrypted data without any further authentication, thereby compromising data confidentiality. Furthermore, the ability to force this state through filesystem corruption also presents a data integrity concern.

Statistics

  • 1 Post

Last activity: 16 hours ago

Bluesky

Profile picture
[Backport release-25.05] grub2: apply patch for CVE-2025-4382 https://github.com/NixOS/nixpkgs/pull/461466 #security
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • D-Link
  • DIR-816L

14 Nov 2025
Published
17 Nov 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.13%

KEV

Description

A vulnerability was detected in D-Link DIR-816L 2_06_b09_beta. Affected by this vulnerability is the function authenticationcgi_main of the file /authentication.cgi. Performing manipulation of the argument Password results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture
#exploit #vulnerability #zeroday #flaw #POC for CVE-2025-13188 D-Link DIR-816L 2_06_b09_beta CVSS: 8.9 HIGH github.com/scanleale/IO...
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Google
  • Android

18 Nov 2025
Published
18 Nov 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

In bta_hf_client_cb_init of bta_hf_client_main.cc, there is a possible remote code execution due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

Statistics

  • 1 Post

Last activity: 20 hours ago

Fediverse

Profile picture

⚠️ CVE-2025-48593: CRITICAL RCE in Android 13–16 Bluetooth HFP client. Remote, no user action needed—potential for full device compromise. Patch promptly & disable HFP if unneeded. No known exploits yet. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Linux
  • Linux

11 Sep 2025
Published
03 Nov 2025
Updated

CVSS
Pending
EPSS
0.05%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: fs: Prevent file descriptor table allocations exceeding INT_MAX When sysctl_nr_open is set to a very high value (for example, 1073741816 as set by systemd), processes attempting to use file descriptors near the limit can trigger massive memory allocation attempts that exceed INT_MAX, resulting in a WARNING in mm/slub.c: WARNING: CPU: 0 PID: 44 at mm/slub.c:5027 __kvmalloc_node_noprof+0x21a/0x288 This happens because kvmalloc_array() and kvmalloc() check if the requested size exceeds INT_MAX and emit a warning when the allocation is not flagged with __GFP_NOWARN. Specifically, when nr_open is set to 1073741816 (0x3ffffff8) and a process calls dup2(oldfd, 1073741880), the kernel attempts to allocate: - File descriptor array: 1073741880 * 8 bytes = 8,589,935,040 bytes - Multiple bitmaps: ~400MB - Total allocation size: > 8GB (exceeding INT_MAX = 2,147,483,647) Reproducer: 1. Set /proc/sys/fs/nr_open to 1073741816: # echo 1073741816 > /proc/sys/fs/nr_open 2. Run a program that uses a high file descriptor: #include <unistd.h> #include <sys/resource.h> int main() { struct rlimit rlim = {1073741824, 1073741824}; setrlimit(RLIMIT_NOFILE, &rlim); dup2(2, 1073741880); // Triggers the warning return 0; } 3. Observe WARNING in dmesg at mm/slub.c:5027 systemd commit a8b627a introduced automatic bumping of fs.nr_open to the maximum possible value. The rationale was that systems with memory control groups (memcg) no longer need separate file descriptor limits since memory is properly accounted. However, this change overlooked that: 1. The kernel's allocation functions still enforce INT_MAX as a maximum size regardless of memcg accounting 2. Programs and tests that legitimately test file descriptor limits can inadvertently trigger massive allocations 3. The resulting allocations (>8GB) are impractical and will always fail systemd's algorithm starts with INT_MAX and keeps halving the value until the kernel accepts it. On most systems, this results in nr_open being set to 1073741816 (0x3ffffff8), which is just under 1GB of file descriptors. While processes rarely use file descriptors near this limit in normal operation, certain selftests (like tools/testing/selftests/core/unshare_test.c) and programs that test file descriptor limits can trigger this issue. Fix this by adding a check in alloc_fdtable() to ensure the requested allocation size does not exceed INT_MAX. This causes the operation to fail with -EMFILE instead of triggering a kernel warning and avoids the impractical >8GB memory allocation request.

Statistics

  • 1 Post

Last activity: 11 hours ago

Fediverse

Profile picture

turns out yesterdays problem was systemd defines the value of #infinity and there is this CVE cve.org/CVERecord?id=CVE-2025-

  • 0
  • 0
  • 0
  • 11h ago

Overview

  • emmanuelg
  • EG-Series

15 May 2025
Published
15 May 2025
Updated

CVSS v3.1
MEDIUM (6.4)
EPSS
0.06%

KEV

Description

The EG-Series plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's [series] shortcode in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping on user supplied attributes in the shortcode_title function. This makes it possible for authenticated attackers - with contributor-level access and above, on sites with the Classic Editor plugin activated - to inject arbitrary JavaScript code in the titletag attribute that will execute whenever a user access an injected page.

Statistics

  • 1 Post

Last activity: 7 hours ago

Bluesky

Profile picture
Just published a deep dive on the newly disclosed OpenSSL vulnerability for SUSE systems (CVE-2025-4126). Read more: 👉 tinyurl.com/4ftcxc7a #SUSE #Security
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Pending

17 Nov 2025
Published
17 Nov 2025
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

QaTraq 6.9.2 ships with administrative account credentials which are enabled in default installations and permit immediate login via the web application login page. Because the account provides administrative privileges in the default configuration, an attacker who can reach the login page can gain administrative access.

Statistics

  • 1 Post

Last activity: 23 hours ago

Fediverse

Profile picture

🚨 CVE-2025-63747: QaTraq 6.9.2 ships with default admin creds enabled, risking full admin takeover via login page. CRITICAL—change/disable creds & restrict access ASAP. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Microsoft
  • Windows 10 Version 1809

14 Jan 2025
Published
09 Sep 2025
Updated

CVSS v3.1
HIGH (8.8)
EPSS
1.89%

KEV

Description

Windows Telephony Service Remote Code Execution Vulnerability

Statistics

  • 1 Post

Last activity: 7 hours ago

Bluesky

Profile picture
Breaking down the critical Ghostscript patch every sysadmin needs to know. CVE-2025-21250 isn't just another CVE. It's a remotely exploitable flaw in a core component used for PDF processing. Read more: 👉 tinyurl.com/3kwuvt4d #Security #SUSE
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • pgadmin.org
  • pgAdmin 4

03 Apr 2025
Published
04 Apr 2025
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
46.09%

KEV

Description

Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules). The vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy endpoint, where the high_availability parameter is unsafely passed to the Python eval() function, allowing arbitrary code execution. This issue affects pgAdmin 4: before 9.2.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture
#exploit #vulnerability #RCE #zeroday #flaw #POC for Remote Code Execution Vulnerability in pgAdmin 4 CVE-2025-2945 github.com/pgadmin-org/...
  • 0
  • 0
  • 0
  • 8h ago
Showing 21 to 30 of 43 CVEs