24h | 7d | 30d

Overview

  • Linux
  • Linux

06 Jun 2025
Published
03 Nov 2025
Updated

CVSS
Pending
EPSS
0.05%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice Savino says: "We are writing to report that this recent patch (141d34391abbb315d68556b7c67ad97885407547) [1] can be bypassed, and a UAF can still occur when HFSC is utilized with NETEM. The patch only checks the cl->cl_nactive field to determine whether it is the first insertion or not [2], but this field is only incremented by init_vf [3]. By using HFSC_RSC (which uses init_ed) [4], it is possible to bypass the check and insert the class twice in the eltree. Under normal conditions, this would lead to an infinite loop in hfsc_dequeue for the reasons we already explained in this report [5]. However, if TBF is added as root qdisc and it is configured with a very low rate, it can be utilized to prevent packets from being dequeued. This behavior can be exploited to perform subsequent insertions in the HFSC eltree and cause a UAF." To fix both the UAF and the infinite loop, with netem as an hfsc child, check explicitly in hfsc_enqueue whether the class is already in the eltree whenever the HFSC_RSC flag is set. [1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547 [2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572 [3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677 [4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574 [5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u

Statistics

  • 1 Post

Last activity: 9 hours ago

Bluesky

Profile picture
An RbTree Family Drama Talk by William Liu and Savino Dicanosa @cor_ctf about exploiting CVE-2025-38001 — a use-after-free in the network packet scheduler. Video: www.youtube.com/watch?v=C-52... Slides: storage.googleapis.com/static.cor.t...
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Linux
  • Linux

11 Sep 2025
Published
29 Sep 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm: Add error handling for krealloc in metadata setup Function msm_ioctl_gem_info_set_metadata() now checks for krealloc failure and returns -ENOMEM, avoiding potential NULL pointer dereference. Explicitly avoids __GFP_NOFAIL due to deadlock risks and allocation constraints. Patchwork: https://patchwork.freedesktop.org/patch/661235/

Statistics

  • 1 Post

Last activity: 5 hours ago

Bluesky

Profile picture
CVE-2025-39747 drm/msm: Add error handling for krealloc in metadata setup scq.ms/3KIn86y #SecQube #MicrosoftSecurity
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Adobe
  • ColdFusion

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
Pending

KEV

Description

ColdFusion versions 2025.4, 2023.16, 2021.22 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could lead to arbitrary code execution by a high priviledged attacker. Exploitation of this issue does not require user interaction and scope is changed.

Statistics

  • 1 Post

Last activity: 10 hours ago

Fediverse

Profile picture

🚨 CRITICAL: CVE-2025-61808 in Adobe ColdFusion (2025.4, 2023.16, 2021.22 & earlier) allows unrestricted dangerous file uploads—arbitrary code exec, no user interaction. Patch ASAP & lock down uploads! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Microsoft
  • GitHub Copilot Plugin for JetBrains IDEs

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
HIGH (8.4)
EPSS
Pending

KEV

Description

Improper neutralization of special elements used in a command ('command injection') in Copilot allows an unauthorized attacker to execute code locally.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture

Here are the publicly disclosed ones.

Command injection in GitHub Copilot for JetBrains:

msrc.microsoft.com/update-guid

an command injection in PowerShell:

msrc.microsoft.com/update-guid

  • 0
  • 2
  • 0
  • 17h ago

Overview

  • Microsoft
  • Microsoft Office LTSC 2024

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
HIGH (8.4)
EPSS
Pending

KEV

Description

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 17 hours ago

Overview

  • Microsoft
  • Microsoft Office LTSC 2024

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
HIGH (8.4)
EPSS
Pending

KEV

Description

Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 17 hours ago

Overview

  • Ivanti
  • ICS

31 Jan 2024
Published
21 Oct 2025
Updated

CVSS v3.0
HIGH (8.2)
EPSS
94.32%

Description

A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture
MetaRATを利用した日本組織を狙った攻撃キャンペーン | LAC WATCH - 株式会社ラック 攻撃者グループは、初期侵入手段として標的組織のICSに存在する脆弱性(CVE-2024-21893およびCVE-2024-21887)を悪用し、対象機器にマルウェアを設置しました。 www.lac.co.jp/lacwatch/rep...
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Ivanti
  • ICS

12 Jan 2024
Published
21 Oct 2025
Updated

CVSS v3.0
CRITICAL (9.1)
EPSS
94.41%

Description

A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture
MetaRATを利用した日本組織を狙った攻撃キャンペーン | LAC WATCH - 株式会社ラック 攻撃者グループは、初期侵入手段として標的組織のICSに存在する脆弱性(CVE-2024-21893およびCVE-2024-21887)を悪用し、対象機器にマルウェアを設置しました。 www.lac.co.jp/lacwatch/rep...
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Apache Software Foundation
  • Apache Struts
  • org.apache.struts:struts2-core

01 Dec 2025
Published
01 Dec 2025
Updated

CVSS
Pending
EPSS
0.12%

KEV

Description

Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion. This issue affects Apache Struts: from 2.0.0 through 6.7.0, from 7.0.0 through 7.0.3. Users are recommended to upgrade to version 6.8.0 or 7.1.1, which fixes the issue.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture
SIOSセキュリティブログを更新しました。 Apache Struts 2の脆弱性(Important: CVE-2025-66675 (Old: CVE-2025-64775)) #sios_tech #security #vulnerability #セキュリティ #脆弱性 #apache #struts security.sios.jp/vulnerabilit...
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Apache Software Foundation
  • Apache Struts
  • org.apache.struts:struts2-core

10 Dec 2025
Published
10 Dec 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion. This issue affects Apache Struts: from 2.0.0 through 6.7.4, from 7.0.0 through 7.0.3. Users are recommended to upgrade to version 6.8.0 or 7.1.1, which fixes the issue. It's related to  https://cve.org/CVERecord?id=CVE-2025-64775  - this CVE addresses missing affected version 6.7.4

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture
SIOSセキュリティブログを更新しました。 Apache Struts 2の脆弱性(Important: CVE-2025-66675 (Old: CVE-2025-64775)) #sios_tech #security #vulnerability #セキュリティ #脆弱性 #apache #struts security.sios.jp/vulnerabilit...
  • 0
  • 0
  • 0
  • 4h ago
Showing 31 to 40 of 65 CVEs