作者:Alex Cloud, Minh Le, James Chua, Jan Betley, Anna Sztyber-Betley, Jacob Hilton, Samuel Marks, Owain Evans
译者:知道创宇404实验室翻译组
原文链接:https://arxiv.org/html/2507.14805v1
摘要
我们研究了一种名为“隐匿学习”的现象,即语言模型可以通...
A vulnerability was found in Medtronic MyCareLink Patient Monitor 24950 and MyCareLink Patient Monitor 24952. It has been classified as critical. Affected is an unknown function. The manipulation leads to empty password in configuration file.
This vulnerability is traded as CVE-2025-4395. It is possible to launch the attack on the physical device. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Medtronic MyCareLink Patient Monitor 24950 and MyCareLink Patient Monitor 24952 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cleartext storage of sensitive information.
The identification of this vulnerability is CVE-2025-4394. It is possible to launch the attack on the physical device. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in GitLab Community Edition and Enterprise Edition up to 18.0.4/18.1.2/18.2.0. This affects an unknown part. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2025-1299. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in GitLab Community Edition and Enterprise Edition up to 18.0.4/18.1.2/18.2.0. Affected by this issue is some unknown functionality of the component Service Desk Email Address Handler. The manipulation leads to incorrect authorization.
This vulnerability is handled as CVE-2025-0765. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in GitLab Enterprise Edition up to 18.0.4/18.1.2/18.2.0. Affected by this vulnerability is an unknown functionality of the component Duo Response Handler. The manipulation leads to exposure of sensitive information due to incompatible policies.
This vulnerability is known as CVE-2025-4976. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in rennf93 fastapi-guard up to 3.0.1. Affected is an unknown function. The manipulation leads to inefficient regular expression complexity.
This vulnerability is traded as CVE-2025-54365. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in bitnamicharts. It has been rated as problematic. This issue affects some unknown processing of the file /opt/bitnami/*/secrets. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2025-41240. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in GitLab Community Edition and Enterprise Edition up to 18.0.4/18.1.2/18.2.0. It has been declared as problematic. This vulnerability affects unknown code of the component API. The manipulation leads to insufficient granularity of access control.
This vulnerability was named CVE-2025-7001. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Kaltura Video Platform up to 11.1.0-1. It has been classified as critical. This affects the function redirectWidgetCmd of the component keditorservices. The manipulation leads to deserialization.
This vulnerability is uniquely identified as CVE-2016-15044. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.