Aggregator
ZDI-CAN-27284: Autodesk
8 months 3 weeks ago
A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-28, 85 days ago. The vendor is given until 2025-09-25 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
ZDI-CAN-27229: Docker
8 months 3 weeks ago
A CVSS score 8.2 AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Nitesh Surana (niteshsurana.com) of Trend Research' was reported to the affected vendor on: 2025-05-28, 85 days ago. The vendor is given until 2025-09-25 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
ZDI-CAN-27254: Autodesk
8 months 3 weeks ago
A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-28, 55 days ago. The vendor is given until 2025-09-25 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
ZDI-CAN-27277: Ollama
8 months 3 weeks ago
A CVSS score 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H severity vulnerability discovered by 'Nicholas Zubrisky (@NZubrisky) of Trend Research' was reported to the affected vendor on: 2025-05-28, 85 days ago. The vendor is given until 2025-09-25 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
CVE-2025-3121 | PyTorch 2.6.0 torch.jit.jit_module_from_flatbuffer memory corruption (Issue 149800)
8 months 3 weeks ago
A vulnerability classified as problematic has been found in PyTorch 2.6.0. Affected is the function torch.jit.jit_module_from_flatbuffer. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2025-3121. Local access is required to approach this attack. Furthermore, there is an exploit available.
vuldb.com
CVE-2025-32950 | Jmix up to 1.6.1/2.3.4 /files FileRef path traversal (GHSA-jx4g-3xqm-62vh)
8 months 3 weeks ago
A vulnerability was found in Jmix up to 1.6.1/2.3.4. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /files. The manipulation of the argument FileRef leads to path traversal: '.../...//'.
This vulnerability is handled as CVE-2025-32950. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-32951 | Jmix up to 1.6.1/2.3.4 Header Content-Type cross site scripting (GHSA-x27v-f838-jh93)
8 months 3 weeks ago
A vulnerability, which was classified as problematic, has been found in Jmix up to 1.6.1/2.3.4. This issue affects some unknown processing of the component Header Handler. The manipulation of the argument Content-Type leads to cross site scripting.
The identification of this vulnerability is CVE-2025-32951. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-32952 | Jmix up to 1.6.1/2.3.4 allocation of resources (GHSA-f3gv-cwwh-758m)
8 months 3 weeks ago
A vulnerability classified as problematic has been found in Jmix up to 1.6.1/2.3.4. Affected is an unknown function. The manipulation leads to allocation of resources.
This vulnerability is traded as CVE-2025-32952. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-32979 | NetScout nGeniusONE temp file
8 months 3 weeks ago
A vulnerability was found in NetScout nGeniusONE. It has been classified as critical. Affected is an unknown function. The manipulation leads to creation of temporary file with insecure permissions.
This vulnerability is traded as CVE-2025-32979. Access to the local network is required for this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2025-32982 | NetScout nGeniusONE improper authorization
8 months 3 weeks ago
A vulnerability was found in NetScout nGeniusONE. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to improper authorization.
This vulnerability is handled as CVE-2025-32982. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2025-32985 | NetScout nGeniusONE JAR File hard-coded credentials
8 months 3 weeks ago
A vulnerability classified as critical has been found in NetScout nGeniusONE. This affects an unknown part of the component JAR File. The manipulation leads to hard-coded credentials.
This vulnerability is uniquely identified as CVE-2025-32985. The attack can only be done within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2025-32986 | NetScout nGeniusONE improper authentication
8 months 3 weeks ago
A vulnerability classified as critical was found in NetScout nGeniusONE. This vulnerability affects unknown code. The manipulation leads to improper authentication.
This vulnerability was named CVE-2025-32986. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2025-32981 | NetScout nGeniusONE nGeniusCLI File permission
8 months 3 weeks ago
A vulnerability, which was classified as critical, has been found in NetScout nGeniusONE. This issue affects some unknown processing of the component nGeniusCLI File Handler. The manipulation leads to permission issues.
The identification of this vulnerability is CVE-2025-32981. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2025-44864 | Tenda W20E 15.11.0.6 formSetDebugCfg module command injection (EUVD-2025-13264)
8 months 3 weeks ago
A vulnerability was found in Tenda W20E 15.11.0.6. It has been classified as critical. This affects the function formSetDebugCfg. The manipulation of the argument module leads to command injection.
This vulnerability is uniquely identified as CVE-2025-44864. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2025-44865 | Tenda W20E 15.11.0.6 formSetDebugCfg enable command injection (EUVD-2025-13268)
8 months 3 weeks ago
A vulnerability was found in Tenda W20E 15.11.0.6. It has been declared as critical. This vulnerability affects the function formSetDebugCfg. The manipulation of the argument enable leads to command injection.
This vulnerability was named CVE-2025-44865. The attack can be initiated remotely. There is no exploit available.
vuldb.com
CVE-2025-44866 | Tenda W20E 15.11.0.6 formSetDebugCfg level command injection (EUVD-2025-13272)
8 months 3 weeks ago
A vulnerability was found in Tenda W20E 15.11.0.6. It has been rated as critical. This issue affects the function formSetDebugCfg. The manipulation of the argument level leads to command injection.
The identification of this vulnerability is CVE-2025-44866. The attack may be initiated remotely. There is no exploit available.
vuldb.com
CVE-2025-32983 | NetScout nGeniusONE up to 6.4.0 information exposure (EUVD-2025-12499)
8 months 3 weeks ago
A vulnerability was found in NetScout nGeniusONE up to 6.4.0 and classified as problematic. This issue affects some unknown processing. The manipulation leads to information exposure through error message.
The identification of this vulnerability is CVE-2025-32983. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2025-32984 | NetScout nGeniusONE POST Parameter cross site scripting (EUVD-2025-12498)
8 months 3 weeks ago
A vulnerability, which was classified as problematic, was found in NetScout nGeniusONE. Affected is an unknown function of the component POST Parameter Handler. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-32984. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
GitHub becomes go-to platform for malware delivery across Europe
8 months 3 weeks ago
Phishing has become the go-to method for attackers looking to get past security controls and access sensitive environments in Europe, according to Netskope. Users are now constantly dealing with phishing attempts, which have become so common and credible that even careful people can make mistakes. Adobe is the brand most commonly impersonated by cybercriminals, appearing in 29% of cloud phishing campaigns aimed at stealing credentials for digital services. Microsoft’s brand is the next most impersonated … More →
The post GitHub becomes go-to platform for malware delivery across Europe appeared first on Help Net Security.
Help Net Security