![]() |
Description: Hunk Companion Plugin 1.9.0 - Unauthenticated Plugin Installation
April 18th, 2025 (1 day ago)
|
![]() |
Description: Tatsu 3.3.11 - Unauthenticated RCE
April 18th, 2025 (1 day ago)
|
![]() |
Description: Apache Commons Text 1.10.0 - Remote Code Execution
April 18th, 2025 (1 day ago)
|
![]() |
Description: Langflow 1.3.0 - Remote Code Execution (RCE)
April 18th, 2025 (1 day ago)
|
![]() |
Description: Ahead of a key hearing in the U.S. government's antitrust case against Google, Mozilla CEO Laura Chambers has warned that some proposed remedies could unintentionally damage Firefox and the broader ecosystem of independent browsers. The hearing, scheduled for April 21, 2025, follows the DOJ's 2020 lawsuit accusing Google of illegally maintaining its monopoly in the …
The post Mozilla Fears Firefox Fallout from Google Search Antitrust Case appeared first on CyberInsider.
April 18th, 2025 (1 day ago)
|
![]() |
April 18th, 2025 (1 day ago)
|
![]() |
Description: Microsoft has announced that support for Office 2016 and Office 2019 will officially end on October 14, 2025, prompting organizations to begin planning their migration to Microsoft 365 Apps. The company emphasizes that continuing to use these legacy versions after the deadline could result in missing critical security updates and experiencing connectivity issues with Microsoft …
The post Microsoft Sets October 2025 Deadline to Replace Office 2016 and 2019 appeared first on CyberInsider.
April 18th, 2025 (1 day ago)
|
CVE-2025-40325 |
Description: In the Linux kernel, the following vulnerability has been resolved:
md/raid10: wait barrier before returning discard request with REQ_NOWAIT
raid10_handle_discard should wait barrier before returning a discard bio
which has REQ_NOWAIT. And there is no need to print warning calltrace
if a discard bio has REQ_NOWAIT flag. Quality engineer usually checks
dmesg and reports error if dmesg has warning/error calltrace.
EPSS Score: 0.02%
April 18th, 2025 (1 day ago)
|
CVE-2025-40114 |
Description: In the Linux kernel, the following vulnerability has been resolved:
iio: light: Add check for array bounds in veml6075_read_int_time_ms
The array contains only 5 elements, but the index calculated by
veml6075_read_int_time_index can range from 0 to 7,
which could lead to out-of-bounds access. The check prevents this issue.
Coverity Issue
CID 1574309: (#1 of 1): Out-of-bounds read (OVERRUN)
overrun-local: Overrunning array veml6075_it_ms of 5 4-byte
elements at element index 7 (byte offset 31) using
index int_index (which evaluates to 7)
This is hardening against potentially broken hardware. Good to have
but not necessary to backport.
EPSS Score: 0.02%
April 18th, 2025 (1 day ago)
|
CVE-2025-40014 |
Description: In the Linux kernel, the following vulnerability has been resolved:
objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq()
If speed_hz < AMD_SPI_MIN_HZ, amd_set_spi_freq() iterates over the
entire amd_spi_freq array without breaking out early, causing 'i' to go
beyond the array bounds.
Fix that by stopping the loop when it gets to the last entry, so the low
speed_hz value gets clamped up to AMD_SPI_MIN_HZ.
Fixes the following warning with an UBSAN kernel:
drivers/spi/spi-amd.o: error: objtool: amd_set_spi_freq() falls through to next function amd_spi_set_opcode()
EPSS Score: 0.02%
April 18th, 2025 (1 day ago)
|