Overview
- MongoDB Inc.
- MongoDB Server
Description
Statistics
- 9 Posts
Bluesky
Overview
- langchain-ai
- langchain
Description
Statistics
- 3 Posts
- 2 Interactions
Fediverse
A critical vulnerability in LangChain Core (CVE-2025-68664) allows prompt injection and data exposure by enabling attackers to instantiate unsafe objects during serialization and deserialization. This flaw, affecting widely used functions, can lead to secret leakage and potential code execution, with patches available in versions 1.2.5 and 0.3.81.
https://securityaffairs.com/186185/hacking/langchain-core-vulnerability-allows-prompt-injection-and-data-exposure.html
Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection
https://thehackernews.com/2025/12/critical-langchain-core-vulnerability.html?m=1
> A critical LangChain Core vulnerability (CVE-2025-68664, CVSS 9.3) allows secret theft and prompt injection through unsafe serialization; updates fix
Overview
- Xspeeder
- SXZOS
Description
Statistics
- 2 Posts
- 2 Interactions
Fediverse
🔴 CVE-2025-54322 - Critical (10)
Xspeeder SXZOS through 2025-12-26 allows root remote code execution via base64-encoded Python code in the chkid parameter to vLogin.py. The title and oIP parameters are also used.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-54322/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
Overview
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
Cloudflare’s Outages and Why Cool Kids Test on Prod
Every system administrator worth their salt knows that the right way to coax changes to network infrastructure onto a production network is to first validate it on a Staging network: a replica of the Production (Prod) network. Meanwhile all the developers who are working on upcoming changes are safely kept in their own padded safety rooms in the form of Test, Dev and similar, where Test tends to be the pre-staging phase and Dev is for new-and-breaking changes. This is what anyone should use, and yet Cloudflare apparently deems itself too cool for such a rational, time-tested approach based on their latest outage.
In their post-mortem on the December 5th outage, they describe how they started doing a roll-out of a change to React Server Components (RSC), to allow for a 1 MB buffer to be used as part of addressing the critical CVE-2025-55182 in RSC. During this roll-out on Prod, it was discovered that a testing tool didn’t support the increased buffer size and it was decided to globally disable it, bypassing the gradual roll-out mechanism.
This follows on the recent implosion at Cloudflare when their brand-new, Rust-based FL2 proxy keeled over when it encountered a corrupted input file. This time, disabling the testing tool created a condition in the original Lua-based FL1 where a NIL value was encountered, after which requests through this proxy began to fail with HTTP 500 errors. The one saving grace here is that the issue was detected and corrected fairly quickly, unlike when the FL2 proxy fell over due to another issue elsewhere in the network and it took much longer to diagnose and fix.
Aside from Cloudflare clearly having systemic issues with actually testing code and validating configurations prior to ‘testing’ on Prod, this ought to serve as a major warning to anyone else who feels that a ‘quick deployment on Prod’ isn’t such a big deal. Many of us have dealt with companies where testing and development happened on Staging, and the real staging on Prod. Even if it’s management-enforced, that doesn’t help much once stuff catches on fire and angry customers start lighting up the phone queue.
Overview
Description
Statistics
- 1 Post
- 12 Interactions
Fediverse
Unstable stream updates: 27th December 2025
Declarative moss system-model export and import tech preview features
Moss now has the ability to use a declarative `/etc/moss/system-model.kdl` to define installed packages and repositories.
In addition, for users who prefer the classic "imperative" moss experience, it is now possible to `moss state --export` a `system-model.kdl` file of the current system to share with others.
In turn, it is also possible to one-shot `moss sync --import` an existing `system-model.kdl` file.
These features are delivered as a tech preview.
Boulder package recipe version string requirements
The Boulder packaging tool now checks for a valid recipe version string (= anything starting with an integer) and errors out if the version string is not valid.
This is necessary because our `ent` package update checking tool compares version strings to determine whether packages need an update, and will give false positives if we have a version string that looks like e.g. `v0.1.2` (note the `v`).
Highlights
- KDE Frameworks 6.21.0
- KMSCon 9.2.1 (currently not enabled by default)
- NVIDIA graphics driver 590.48.01
- discord 0.0.119
- gamescope 3.16.18
- gstreamer 1.26.10
- linux 6.17.13
- mesa 25.3.2
- sudo-rs 0.2.11
- uutils-coreutils 0.5.0
- vlc 3.22
- vscode-bin 1.107.0
- vscodium 1.107.18627
- wine 11.0-rc3
- zed 0.217.3
Other updates
Other updates include, but are not limited to:
- fastfetch
- inetutils
- inputplumber
- libdrm
- libva
- ryzenadj
- solaar
- tzdata
- wireplumber
Fixes
- Disabled LTO for the build of our recipe version checking tool `ent`, which makes `ent check updates` actually work.
- Fixed a sudo issue where using Super+T to open a cosmic-terminal in a Cosmic sesion would make sudo unable to find any commands
- Made cosmic-greeter fall back to branded background
Security Fixes:
- Patches to networkmanager and networkmanager-openvpn for CVE-2025-9615
New packages
- font-awesome-ttf 6.7.2
- lsd 1.2.0 (next gen ls command)
- swayidle 1.9.0
- yazi 25.5.31 (terminal file manager)
- yubikey-manager 5.8.0
Overview
- Microsoft
- Windows Server 2025 (Server Core installation)
Description
Statistics
- 1 Post
- 3 Interactions
Fediverse
Revisiting CVE‑2025‑50165: A critical flaw in Windows Imaging Component https://www.welivesecurity.com/en/eset-research/revisiting-cve-2025-50165-critical-flaw-windows-imaging-component/
Overview
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post
Fediverse
🟠 CVE-2025-66738 - High (8.8)
An issue in Yealink T21P_E2 Phone 52.84.0.15 allows a remote normal privileged attacker to execute arbitrary code via a crafted request the ping function of the diagnostic component.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66738/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
Overview
- containernetworking
- plugins
Description
Statistics
- 1 Post
Overview
- M-Files Corporation
- M-Files Server
Description
Statistics
- 1 Post
Fediverse
M-Files has released patches for CVE-2025-13008, an information disclosure vulnerability involving session token exposure between authenticated users.
The issue affects several release branches and could allow impersonation within M-Files Web under specific conditions.
No exploitation has been observed publicly, but the potential impact on document confidentiality is notable.
This reinforces the need for:
• Strong session controls
• Log review for unusual user behavior
• Prompt patch deployment
Follow @technadu for unbiased, technically grounded security updates.
Source : https://cybersecuritynews.com/m-files-vulnerability/
#InfoSec #VulnerabilityResearch #SessionManagement #EnterpriseSecurity #TechNadu