Aggregator
新型隐秘的 Quasar Linux 恶意软件瞄准软件开发人员
1 week 3 days ago
一款此前未被记录的名为 Quasar Linux(QLNX)的 Linux 植入程序,正瞄准开发人员的系统,兼具 rootkit(根木马)、后门和窃取凭证等功能。 该恶意软件套件部署在 npm、PyPI、GitHub、AWS、Docker 和 Kubernetes 等开发及 DevOps 环境中。这可能引发供应链攻击,威胁行为者可借此在代码分发平台上发布恶意软件包。 网...
hackernews
CVE-2025-71222 | Linux Kernel up to 6.18.9 wifi skb_push privilege escalation (Nessus ID 299104 / WID-SEC-2026-0421)
1 week 3 days ago
A vulnerability was found in Linux Kernel up to 6.18.9. It has been declared as critical. Affected by this issue is the function skb_push of the component wifi. Executing a manipulation can lead to privilege escalation.
This vulnerability is tracked as CVE-2025-71222. The attack is only possible within the local network. No exploit exists.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-71221 | Linux Kernel up to 6.18.9 dmaengine mmp_pdma_residue use after free (Nessus ID 299081 / WID-SEC-2026-0421)
1 week 3 days ago
A vulnerability classified as critical was found in Linux Kernel up to 6.18.9. The affected element is the function mmp_pdma_residue of the component dmaengine. Executing a manipulation can lead to use after free.
This vulnerability is handled as CVE-2025-71221. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is advised.
vuldb.com
CVE-2025-71204 | Linux Kernel up to 6.6.123/6.12.69/6.18.9 smb parse_durable_handle_context reference count (Nessus ID 299118 / WID-SEC-2026-0421)
1 week 3 days ago
A vulnerability marked as critical has been reported in Linux Kernel up to 6.6.123/6.12.69/6.18.9. Affected by this vulnerability is the function parse_durable_handle_context of the component smb. The manipulation leads to improper update of reference count.
This vulnerability is traded as CVE-2025-71204. Access to the local network is required for this attack to succeed. There is no exploit available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2025-71220 | Linux Kernel up to 6.18.9 smb ksmbd_session_rpc_close privilege escalation (Nessus ID 299102 / WID-SEC-2026-0421)
1 week 3 days ago
A vulnerability classified as critical has been found in Linux Kernel up to 5.15.199/6.1.162/6.6.123/6.12.69/6.18.9. Impacted is the function ksmbd_session_rpc_close of the component smb. Performing a manipulation results in privilege escalation.
This vulnerability is known as CVE-2025-71220. Access to the local network is required for this attack. No exploit is available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-71202 | Linux Kernel up to 6.18.6 IOMMU Interface vfree privilege escalation (Nessus ID 299070 / WID-SEC-2026-0421)
1 week 3 days ago
A vulnerability was found in Linux Kernel up to 6.18.6. It has been declared as critical. This affects the function vfree of the component IOMMU Interface. The manipulation results in privilege escalation.
This vulnerability is reported as CVE-2025-71202. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-71203 | Linux Kernel up to 6.12.69/6.18.9 riscv array_index_nospec out-of-bounds (Nessus ID 299094 / WID-SEC-2026-0421)
1 week 3 days ago
A vulnerability was found in Linux Kernel up to 6.12.69/6.18.9. It has been rated as critical. The impacted element is the function array_index_nospec of the component riscv. This manipulation causes out-of-bounds read.
This vulnerability is registered as CVE-2025-71203. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is advised.
vuldb.com
CVE-2025-71201 | Linux Kernel up to 6.18.5 netfs_read_unlock_folios buffer overflow (Nessus ID 299223 / WID-SEC-2026-0421)
1 week 3 days ago
A vulnerability marked as critical has been reported in Linux Kernel up to 6.18.5. This affects the function netfs_read_unlock_folios. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2025-71201. The attack can only be initiated within the local network. No exploit exists.
It is suggested to upgrade the affected component.
vuldb.com
严重漏洞或致 30 万个 Ollama 部署面临信息失窃风险
1 week 3 days ago
Cyera 警告称,约 30 万个 Ollama 部署因一个可远程利用、无需身份验证的严重漏洞,易面临敏感信息失窃风险。 Ollama 是一款用于在本地机器上运行大语言模型(LLMs)的开源解决方案,作为一种自托管的人工智能推理引擎,在各组织中广受欢迎。 Cyera 表示,Ollama 中的一个堆越界读取问题,可被利用来访问存储在堆中的敏感信息,包括提示词、消息以及环境...
hackernews
伊朗外交部批评X平台取消伊方账号认证
1 week 3 days ago
发布时间: 2026-0
安卓版Microsoft Teams即将支持SIP协议可以直接连接Zoom和思科WebEx等
1 week 3 days ago
2026年5月6日 11:00软件资讯0400
趋势科技(Trellix)源代码库遭入侵
1 week 3 days ago
网络安全公司趋势科技(Trellix)表示,其部分源代码库近期遭入侵,但几乎未透露该事件的其他信息。 趋势科技称,公司一直在与法医专家合作调查此次入侵事件,并已通知执法部门。 趋势科技在一份声明中表示:“根据我们目前的调查,没有证据表明我们的源代码发布或分发过程受到影响,或者我们的源代码已被利用。” 该安全公司承诺在完成调查后分享更...
hackernews
CVE-2025-71200 | Linux Kernel up to 6.1.161/6.6.121/6.12.67/6.18.7 HS200/HS400 cqhci_irq state issue (Nessus ID 299349 / WID-SEC-2026-0421)
1 week 3 days ago
A vulnerability classified as critical has been found in Linux Kernel up to 6.1.161/6.6.121/6.12.67/6.18.7. Affected by this issue is the function cqhci_irq of the component HS200/HS400. The manipulation leads to state issue.
This vulnerability is referenced as CVE-2025-71200. The attack needs to be initiated within the local network. No exploit is available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2026-23210 | Linux Kernel up to 6.18.9 ice ice_ptp_prepare_for_reset null pointer dereference (Nessus ID 299107 / WID-SEC-2026-0421)
1 week 3 days ago
A vulnerability was found in Linux Kernel up to 6.18.9. It has been rated as critical. Impacted is the function ice_ptp_prepare_for_reset of the component ice. This manipulation causes null pointer dereference.
This vulnerability is tracked as CVE-2026-23210. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-23209 | Linux Kernel up to 6.18.9 macvlan_common_newlink use after free (Nessus ID 299121 / WID-SEC-2026-0421)
1 week 3 days ago
A vulnerability was found in Linux Kernel up to 6.18.9. It has been classified as critical. This affects the function macvlan_common_newlink. This manipulation causes use after free.
This vulnerability is tracked as CVE-2026-23209. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-23208 | Linux Kernel up to 6.18.9 ALSA copy_to_urb out-of-bounds (EUVD-2026-6106 / Nessus ID 299122)
1 week 3 days ago
A vulnerability has been found in Linux Kernel up to 6.18.9 and classified as critical. The affected element is the function copy_to_urb of the component ALSA. The manipulation leads to out-of-bounds read.
This vulnerability is referenced as CVE-2026-23208. The attack needs to be initiated within the local network. No exploit is available.
The affected component should be upgraded.
vuldb.com
CVE-2026-23207 | Linux Kernel up to 6.18.9 IRQ tegra_qspi_isr_thread null pointer dereference (Nessus ID 299087 / WID-SEC-2026-0421)
1 week 3 days ago
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.18.9. The affected element is the function tegra_qspi_isr_thread of the component IRQ Handler. Such manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2026-23207. The attack must be carried out from within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-23206 | Linux Kernel up to 6.18.9 dpaa2-switch kcalloc initialization (Nessus ID 299088 / WID-SEC-2026-0421)
1 week 3 days ago
A vulnerability was found in Linux Kernel up to 5.15.199/6.1.162/6.6.123/6.12.69/6.18.9. It has been classified as critical. This vulnerability affects the function kcalloc of the component dpaa2-switch. The manipulation leads to improper initialization.
This vulnerability is referenced as CVE-2026-23206. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is recommended.
vuldb.com
Critical Palo Alto Firewalls Vulnerability Exploited in the Wild to Gain Root Access
1 week 3 days ago
Palo Alto Networks has disclosed a critical buffer overflow vulnerability in PAN-OS software, tracked as CVE-2026-0300, that is already being actively exploited in the wild. The flaw carries a CVSS 4.0 score of 9.3 (CRITICAL) and allows unauthenticated attackers to execute arbitrary code with full root privileges on affected PA-Series and VM-Series firewalls, with no […]
The post Critical Palo Alto Firewalls Vulnerability Exploited in the Wild to Gain Root Access appeared first on Cyber Security News.
Guru Baran